Right under your nose:
Code: Select all
-rwxr-xr-x 1 users 4.0M Aug 23 12:26 fidentify_static
-rwxr-xr-x 1 users 11M Aug 23 12:26 photorec_static
-rwxr-xr-x 1 users 8.3M Aug 23 12:26 testdisk_static
As easy workaround, put the *_static somewhere in a local ext[234] folder, let's say you have /mnt/sda3/ as ext3; then put it here:
/mnt/sda3/bin/testdisk_static (folder "/bin" as in "binaries")
Now create a symlink to your Porteus /usr/local/bin like so, as root:
Code: Select all
# cd /usr/local/bin
# ln -s /mnt/sda3/bin/testdisk_static testdisk
Or create an updated module using my extracted 7.2-WIP as template and replace all old files - especially the binaries - with the recent ones. As I described above.
And one last tip for the future:
You see what files are binaries by their permissions.
Since a tar is a Unix filesystems, binaries will have rwxr-xr-x while text files, html files or man pages will simply have rw-r--r--
Added in 9 minutes 48 seconds:
And by now you should know that Linux not determines which files are executables by their extensions (like DOS or winDOZE does, e.g. .com .exe and such) but if the read and executable bit is set. (A file could be executable but have no read permission thus still could not be executed)
Most easy example:
Code: Select all
guest@rava:/tmp$ echo "echo Hello World" >hello.sh
guest@rava:/tmp$ ls -o hello.sh
-rw-r--r-- 1 guest 17 2023-09-22 08:25 hello.sh
guest@rava:/tmp$ ./hello.sh
bash: ./hello.sh: Permission denied
guest@rava:/tmp$ chmod a+x hello.sh
guest@rava:/tmp$ ls -o hello.sh
-rwxr-xr-x 1 guest 17 2023-09-22 08:25 hello.sh
guest@rava:/tmp$ ./hello.sh
Hello World
guest@rava:/tmp$ chmod a-r hello.sh
guest@rava:/tmp$ ls -o hello.sh
--wx--x--x 1 guest 17 2023-09-22 08:25 hello.sh
guest@rava:/tmp$ ./hello.sh
bash: ./hello.sh: Permission denied