Increase an NTFS partition while decreasing & moving EXT4

About one year ago I installed Ubuntu 12.04 LTS on a friend’s machine that came with Windows 7 Home Premium 64 bit pre-loaded.  It is a refurbished Lenovo Thinkpad T430s to be precise.  I decreased the NTFS partition to about 40GB and gave the rest of the 500GB drive to  dual boot Ubuntu (leaving the Lenovo Recovery and Win7 recovery partitions intact).  Long story short (and no fault of 12.04 LTS which has been running very well) the friend and spouse needed more space on the NTFS Windows 7 partition (because everyone loves a bloated Win7 install).

Here are some steps to make this work.  The best piece of advice I found was this, “Use Linux tools to resize Linux partitions and Windows’ tools to resize Windows’ partitions” (gparted’s support for NTFS resizing is/was deemed experimental which is why I decided to use PWHE 8.11) and of course it goes without saying but I’ll say it, “backup your $***”:

  1. backup the EXT4 ‘home’ folder of the Ubuntu user.
  2. boot gparted live to backup/copy the 3 NTFS partitions (MS recovery / Win7 “C:” / Lenovo recovery) onto an external drive.
  3. gparted resize and move EXT4 partition to give an equal split for NTFS and EXT4.
  4. Unallocated space must now be “to the right” of the nearly full NTFS partition.
  5. Burn Partition Wizard Home Edition (8.11) via Ubuntu & Unetbootin to a USB key.
  6. Boot into PWHE 8.11 and “extend” the NTFS partition to reclaim about 100GB for Win 7.
  7. Test both OSes. It is now an even split between NTFS & EXT4 ~230GB each.


Unetbootin, Vista 32bit hell and other stories

Zoe had a friend who was having some computer problems and I suppose to some extent I brought this upon myself. Thankfully, I now have a strategy. Of course this is probably like 10 hours where I am far too deep in to start strategizing, but I now have a strategy.

Lets pretend for a moment you have a 32 bit Core-Duo laptop running Windows Vista Home 32bit that is infected with malware and viruses and acting generally poorly, what do you do?  Well, my friend, you take your 8GB flash key that has an already built 9.04 Ubuntu Kernel on it, you boot it from that and run ClamAV using the ClamTK GUI.  It works.  It found a couple of viruses on the backup HD and  I feel safer about backup data as well as my data on my Windows 7 machine.  Thankfully, since I’m principally running OS X and 9.04 MythBuntu these days we’re highly prone to viruses, but nonetheless, I was concerned about re-infection with her external USB hard drive as well as her 4GB Flash Key.

Step 1) Use Unetbootin to load a flash key with a bootable version of the Linux of your choice

Step 2) Boot up the sick (dying) notebook with that USB flash drive

Step 3) Scan all files with ClamAV under Linux, then backup all data

Step 4) Wipe the old computer clean and re-install Windows (this part is oh so familiar) & leave ~ 20GB for a separate EXT3 Linux partition

Step 5) Institute a backup as well as best practice anti-virus procedures

Step 6) Install Linux in the 20GB spare rescue partition in case this happens again!

Step 7) After about a year  Windows XP will be gunked up again, so repeat! (see Step 1)