vovaam.blogg.se

Untar a file .bz2
Untar a file .bz2








untar a file .bz2

#Untar a file .bz2 archive#

You can also use -j to create a tar.bz2 archive file.įor example, to create a backup of your web server directory, execute: tar -cjf 2 /var/www/html The tar command uses -c to create a compressed tar archive file. Now all the files will be extracted under /opt directory. To extract files in a defend location, use -C option followed by the destination directory. The above command will extract tar.bz2 file content in current directory. So we can use -xjf options with the tar command to extract a. As this is a also tar compressed file, You also need to use -x command line option. You can use Linux tar command with option -j to extract bz2 file. Command to list the content of tar.bz2 without extracting it.In this tutorial, you will learn the followings: tar.bz2 extension and can be unpacked using the tar command with the -j option. The tar command is used to create an archive of multiple files or directories and the bzip2 compression algorithm is used to reduce the size of the archive. It is commonly used for distributing large files or groups of files as a single archive, which is smaller in size compared to the original files, making it easier to transfer and manage. The process ¶īackups require a lot of discipline and rigor from the system administrator.A “tar.bz2” file is a compressed archive file created using the tar command in Unix/Linux and the bzip2 compression algorithm. These operations consist of saving information in a file, on a peripheral or a supported media (tapes, disks.

untar a file .bz2

The backup preserves the source of information after the operation.The archive destroys the information source after the operation.There are two principles, the backup and the archive. In addition, the administrator must regularly check that the media are still readable. The backup media should be kept in another room (or building) than the server so that a disaster does not destroy the server and the backups. No system is infallible, no human is infallible, so to avoid losing data, it must be backed up to be able to restore after a problem. Destruction: voluntary or involuntary.The backup allows you to protect yourself from the following: The backup will answer a need to conserve and restore data in a sure and effective way. You should get a feel for this as the chapter unfolds, but you can always refer back to this note for clarification if you need to. The device can be either external media or a local file. Throughout this chapter the command structures use "device" to specify both a target location for backup, and the source location when restoring. NoSleep.sh - A simple Configuration ScriptĬonfigurar los repositorios locales de Rocky Verifying DISA STIG Compliance with OpenSCAP - Part 2 Protocolo de inicio de sesión con autenticación sin contraseña de rsync Host-based Intrusion Detection System (HIDS)Ĭonfiguración del servidor web Apache para múltiples sitiosĬompression compress, gzip, bzip2, lzip and xzĪdd a file or directory to an existing backupĮxtract a group of files from a tar backup using regular expressions (regex)īash - Conditional structures if and case Utilizando rsync para mantener dos equipos sincronizados Building and Installing Custom Linux KernelsĪutomatizar procesos con cron y crontab enĪutomatic Template Creation - Packer - Ansible - VMware vSphere










Untar a file .bz2