Need to copy my Mac Data via Ubuntu or Knoppix, for resueing my data

Posted on 2012-09-06
Last Modified: 2014-11-02
Hi @ all,

my Mac Air does not boot up, errors on the hard drive, not physically, but filesystem.

Diskwarrior does not work.

When I boot with Knoppix, I can see the hard disk and I can see the data, but I can not access it directly as I do not have the permission on my private folder.

How can I access my data, or also fix the errors within the filesystem?
Question by:dr-goebel
    LVL 87

    Expert Comment

    I suggest, rather than trying with Knoppix, use the PartedMagic LiveCD instead. It is more suited for such tasks. Try mounting the partitions once it is up and running, and you may be able to copy the data to a USB device or network share:

    Author Comment

    Thanks, I will try, which tool can I use to copy data?
    Do I need to perform special tasks, as I can normally not access my users directory due to permissions....
    LVL 87

    Expert Comment

    There is a mount utility in the taskbar. Just use that and you can select which devices you want to mount. After that the file-manager will open and you should just be able to copy from one location to another. If though you have been using encryption on your MAC file-system you may not be able to do much. In that case, provided you have a backup somewhere of your encryption keys, you might be able to get access by setting up your MAC OS on another HD, connecting the failed disk to that as a 2nd or external disk, and then importing the keys to your new installation. But as I'm not a MAC user I wouldn't know how that would be done. If you don't have the keys, there probably isn't any chance of recovering the data.
    LVL 3

    Accepted Solution

    From within Knoppix, and as root, change the permissions of the  of folder containing your data.

    chmod -R 777 /Private  ( or whatever the folder is )

    install dropbox.    on the Knoppix

    move the data into dropbox.

    install dropbox on a working mac, and login with the same credentials .

    Acces your files.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    In this article we will discuss some EI Capitan Mail app issues and provide some manual process to resolve them.
    Set up iPhone and iPad email signatures to always send in high-quality HTML with this step-by step guide.
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now