![]() I didn’t switch over to the physical environment until after I had gotten DoubleKiller running in Wine, as described below. Note that I was working in an Ubuntu virtual machine, running in VMware Player on a Windows 10 host. But the general solution appeared to involve installing Wine in Ubuntu, and then running DoubleKiller in Wine. My search did not turn up specific guidance on that. This post focuses on getting DoubleKiller to work in that Linux setting. The other post presents the overall development of the Ubuntu file comparison computer. The general idea was that this might give me relatively early notice that ransomware was starting to encrypt my system - especially if the Linux system conducting this comparison was not infected by the ransomware (which mostly seemed to infect Windows systems). This semi-manual process allowed me to conduct an occasional visual inspection of what had changed on my data drive. In Windows, my preferred file comparison scheme involved Beyond Compare, for making sure that the target drive contained all of the files stored on the source drive, and DoubleKiller Pro, for identifying and removing duplicates (usually consisting of files that had been in one folder but had now been moved to another). As described in another post, I was setting up an old computer to function as a file comparison and text indexing station. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |