What is the difference between single user mode and rescue mode in CentOS?

Asked by Last Modified  

1 Answer

Learn Linux

Follow 1
Answer

Please enter your answer

Trainer

Rescue mode is typically running off of a ramdisk with fewer commands available. It’s not a full copy of your installed OS; it boots cleanly so that you can trust the utilities. That could be from a DVD, USB device, or from a different grub menu from a known good kernel + initrd image. Most likely it’s...
read more
Rescue mode is typically running off of a ramdisk with fewer commands available. It’s not a full copy of your installed OS; it boots cleanly so that you can trust the utilities. That could be from a DVD, USB device, or from a different grub menu from a known good kernel + initrd image. Most likely it’s from a boot disk. You use this when something is so messed up that you can’t get the OS to boot at all. Single user mode boots from your normal installation but skips all of the things that make the OS boot into multiuser. So, no X, no network services to speak of (like nfsd or samba), potentially no network connectivity at all. You’ll have access to the full suite of utilities, all filesystems, drivers, and can manually start any applications. You’d typically use this for filesystem corruption on critical mount points, forgotten passwords you need to break, or problems with graphical drivers that cause X not to start correctly. Full link: https://www.quora.com/What-is-the-difference-between-single-user-mode-and-rescue-mode-in-CentOS read less
Comments

Related Questions

Which is the best book for the reference of Linux?
Linux: The Complete Reference
Aneeshwara
We are looking for IT Training for Online Training Could you please how i select them
Hi Raheem, You can attend demo classes. Please contact me for your requirement.
Raheem
0 0
8
What is /dev/null in Unix?
It is a bit bucket in Unix where you dump things you don't need. When you need to discard output from your command , you can redirect it to /dev/null. In Unix, an external device is treated as a file....
Furqankhan
0 0
6

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

How to detect duplicate address manually in a network from Linux ?
Below script will help you to detect duplicate IP address in a subnet The key command is the arping command which will send out an ARP packet with DAD (duplicate address detection) If the return...

Linux File System
Linux File system: Right click on Desktop and click open interminal Login to Linux system and run simple commands: Check present Working Directory: $pwd /home/cloudera/Desktop Change Directory: $cd...

UNDERSTANDING PROCESSES - RED HAT ENTERPRISE LINUX
What is a Process An instance of a program is called a Process. Any command that you give to your Linux machine starts a new process. It is possible that for the same program we have multiple processes. Types...
A

Aseem A.

1 0
0

Linux Introdution
Linux is a UNIX-base operating system. Its original creator was a Finnish student name Linus Torvalds, although being ‘open source’ it has change a great deal since its original conception....

Be prepared to get trained--init
Before starting the training,students must be mentally prepared for acceptance of new knowledge. Students must attend training with open minded forgetting the position they are working.This will help...
S

Smartnub Softsolutions

0 0
0

Recommended Articles

Whether it was the Internet Era of 90s or the Big Data Era of today, Information Technology (IT) has given birth to several lucrative career options for many. Though there will not be a “significant" increase in demand for IT professionals in 2014 as compared to 2013, a “steady” demand for IT professionals is rest assured...

Read full article >

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Business Process outsourcing (BPO) services can be considered as a kind of outsourcing which involves subletting of specific functions associated with any business to a third party service provider. BPO is usually administered as a cost-saving procedure for functions which an organization needs but does not rely upon to...

Read full article >

Microsoft Excel is an electronic spreadsheet tool which is commonly used for financial and statistical data processing. It has been developed by Microsoft and forms a major component of the widely used Microsoft Office. From individual users to the top IT companies, Excel is used worldwide. Excel is one of the most important...

Read full article >

Looking for Linux Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you