Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to solve the situation that EXT3 MYSQL files have been maliciously deleted?

2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >

Share

Shulou(Shulou.com)06/01 Report--

[description of data recovery failure]

The operating system and application environment of the client server is redhat4.6 mysql, and the database is used to store the registration information of teachers and students. Every day, the linux script will pack the database files into tar.gz and back up to other local data partitions. After the backup is successful, the backup files of the previous day will be deleted. The system was maliciously encountered on a certain weekend, and all database files (including backups) were deleted.

[data recovery failure analysis]

This case belongs to ext3 file system data deletion. Theoretically, if the number of deleted files is relatively small and there are few write operations after deletion, the success rate of recovery will be higher, but if the number of deleted files is relatively large, then the possibility of full recovery of the data will be very small.

[data recovery process]

1. First of all, the user's data hard disk is completely mirrored, and the original media is in good physical condition.

two。 Determine the storage path of the original database file and backup file according to the relevant data information provided by the user, and determine that the database file has been backed up successfully on the last day according to the system log and other information. at the same time, it is found that the partition where the database backup file is located seldom writes after the file is deleted, while the system partition where the original database file is located has generated new system and temporary files after file deletion.

3. This paper mainly analyzes the partition where the database backup file is located, traces the file inode node back to the state before data deletion according to the relevant information of the backup file left by the file system, and migrates the backup file out.

4. Extract the recovered tar.gz file, and attach the database file to the corresponding database environment to verify the database record, confirm that the data is correct, and then deliver it to the customer for verification.

[data recovery results]

Data recovery takes a total of 3 hours, including 1 hour for mirroring the original disk and preliminary detection, and 2 hours for database backup file information search, recovery and verification.

[server storage security recommendations]

1. Operating system passwords should be set to be robust to increase the security of data storage and applications.

two。 The backup of database files should not be directly backed up to the local hard disk, but should be backed up to other storage through the network and other means.

3. After the data is lost, the operation of the partition where the lost data is located should be stopped as soon as possible to ensure the possibility of data recovery.

[data recovery performance pledge]

1. Free testing (test report can be issued)

two。 Sign a confidentiality agreement with the customer to keep the customer's data strictly confidential (no additional confidentiality fee)

3. Professional engineers provide data recovery services free of charge if not successful

4. The whole recovery process will not have any write operation to the customer's storage to ensure the data security of the original media.

5. Issue a recovery report after data recovery, and keep the data backup for 7 days free of charge

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Database

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report