This sequence of commands appears to have altered some of the file system metadata structures. At a data recovery company, this is one of the worst scenarios we encounter, where attempts, all well-meaning have been made to recovery the data.
This is a reminder of why we always secure an image...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.