Method and device for realizing safe operation of file system
A file system and security operation technology, applied in the computer field, can solve problems such as the inability to support system file write operations, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] In this invention, see figure 2 As shown, the disk 20 is divided into at least two partitions: a read-only partition 21 and a read-write partition 22 . After the Linux operating system is started and running, the read-only partition 21 is in the read-only state, and the read-write partition 22 is in the read-write state. In this way, the directories located in the read-only partition 21 can support read operations but not write operations, and the directories located in the read-write partition 22 can support both read operations and write operations. For example, files with high requirements for safe operation in the Linux file system can be stored in the read-only partition 21, such as, the etc directory under the root directory is stored in the read-only partition 21, so that the etc directory under the root directory only supports reading Operations do not support write operations, and the directories in the Linux file system that have low security requirements or...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


