Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

      July 2, 2025

      The impact of gray work on software development

      July 2, 2025

      CSS Intelligence: Speculating On The Future Of A Smarter Language

      July 2, 2025

      Hallucinated code, real threat: How slopsquatting targets AI-assisted development

      July 1, 2025

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025

      Everwild’s cancellation has me worried for one of my favorite dev teams and Xbox itself — It needs creative new games to thrive and refresh its identity

      July 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025
      Recent

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025

      From Flow to Fabric: Connecting Power Automate to Microsoft Fabric

      July 2, 2025

      Flutter Web Hot Reload Has Landed – No More Refreshes!

      July 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025
      Recent

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»Linux Data Recovery: How to Salvage Lost or Corrupted Files

    Linux Data Recovery: How to Salvage Lost or Corrupted Files

    May 1, 2025
    Linux Data Recovery: How to Salvage Lost or Corrupted Files
    by George Whittaker

    Data loss is a nightmare for any computer user, and Linux users are no exception. Despite the robust architecture of Linux operating systems, disasters can strike in the form of accidental deletions, corrupted partitions, or failing storage devices. Whether you’re a system administrator, developer, or everyday Linux user, understanding how to recover data can be the difference between a minor inconvenience and a major setback.

    This guide will walk you through the practical strategies and essential tools for recovering lost or corrupted files on Linux.

    Understanding Data Loss on Linux

    Common Causes of Data Loss

    Data loss can occur for various reasons:

    • Accidental Deletion: Files removed with rm or cleared trash.

    • Filesystem Corruption: Caused by improper shutdowns, power failures, or software bugs.

    • Partition Issues: Misconfigured or overwritten partition tables.

    • Hardware Failures: Hard drive degradation, bad sectors, or failing SSDs.

    How Deletion Works on Linux

    Linux filesystems like ext4 don’t immediately erase data when a file is deleted. Instead, the filesystem marks the file’s space as free. Until that space is overwritten, the data may be recoverable. This behavior is the cornerstone of most recovery techniques.

    First Steps After Data Loss

    The most critical step is to minimize system activity on the affected drive. Any write operation can potentially overwrite recoverable data.

    Disconnect and Mount Read-Only

    If the loss happened on a secondary drive, physically disconnect it and mount it read-only on another machine:

    sudo mount -o ro /dev/sdX1 /mnt/recovery

    Create a Disk Image

    Use tools like dd or ddrescue to create a complete image of the drive for analysis:

    sudo dd if=/dev/sdX of=/mnt/external/backup.img bs=4M status=progress

    Or with ddrescue, which handles read errors more gracefully:

    sudo ddrescue /dev/sdX /mnt/external/recovery.img /mnt/external/logfile

    Work from the image to preserve the original drive.

    Boot from a Live Environment

    To avoid using the target system, boot into a Live Linux distribution like:

    • SystemRescueCD – tailored for system repair.

    • Ubuntu Live CD – user-friendly and widely available.

    Go to Full Article

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow to Build Custom Distributions from Scratch
    Next Article Last Week in AI #308 – The Leaderboard Illusion, ChatGPT Glazing, Qwen 3, Ernie X1

    Related Posts

    News & Updates

    Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

    July 2, 2025
    News & Updates

    Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

    July 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Overwatch 2 joins up with Street Fighter 6 in this dream-come-true collaboration

    News & Updates

    Swift Apprentice: Beyond the Basics [SUBSCRIBER]

    Learning Resources

    Artix Linux: Introduzione di XLibre nelle Build Sperimentali

    Linux

    CVE-2024-8988 – PeepSo Core: File Uploads Plugin WordPress Insecure Direct Object Reference

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CISA Adds Two New Exploited Vulnerabilities to Its Catalog: CVE-2024-38475 and CVE-2023-44221

    May 5, 2025

    CISA Adds Two New Exploited Vulnerabilities to Its Catalog: CVE-2024-38475 and CVE-2023-44221

    The Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) Catalog, adding two vulnerabilities, CVE-2024-38475 and CVE-2023-44221, that are …
    Read more

    Published Date:
    May 02, 2025 (2 days, 17 hours ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-29824

    CVE-2025-30406

    CVE-2024-38475

    CVE-2023-44221

    CVE-2025-6853 – Chatchat Space Langchain-Chatchat Path Traversal Vulnerability

    June 29, 2025

    Submit a new story – Echo JS

    May 5, 2025

    CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks

    April 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.