From f43e54f3a5736f9ce972e0d4889dd42cc0dfff4d Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Tue, 11 Apr 2023 16:42:34 -0700 Subject: [PATCH] Remove unnecessary example and step Per @rustybird's suggestions on #1279 --- user/how-to-guides/backup-emergency-restore-v4.md | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/user/how-to-guides/backup-emergency-restore-v4.md b/user/how-to-guides/backup-emergency-restore-v4.md index ce04ba70..f3ca1129 100644 --- a/user/how-to-guides/backup-emergency-restore-v4.md +++ b/user/how-to-guides/backup-emergency-restore-v4.md @@ -76,11 +76,10 @@ any GNU/Linux system. *compressed*. 1. (Optional) If you're working with binaries that you saved with your backup, - such as `scrypt` or `bzip2`, you can make things easier by aliasing those - binaries now, e.g., + such as `scrypt`, you can make things easier by aliasing those binaries now, + e.g., [user@restore ~]$ alias scrypt="$PWD/scrypt-*/usr/bin/scrypt" - [user@restore ~]$ alias bzip2="/home/user/bzip2-*" 2. Untar the main backup file. @@ -155,10 +154,9 @@ any GNU/Linux system. 8. Enter the decrypted directory, mount `private.img`, and access your data. - [user@restore ~]$ cd vm1/ - [user@restore vm1]$ sudo mkdir /mnt/img - [user@restore vm1]$ sudo mount -o loop vm1/private.img /mnt/img/ - [user@restore vm1]$ cat /mnt/img/home/user/your_data.txt + [user@restore]$ sudo mkdir /mnt/img + [user@restore]$ sudo mount -o loop vm1/private.img /mnt/img/ + [user@restore]$ cat /mnt/img/home/user/your_data.txt This data has been successfully recovered! Success! If you wish to recover data from more than one qube in your backup,