Skip to main content

Restoring Lost Data on Flash Disk

Once the virus is completely gone from the flash disk, it is time to restore the data hidden (Hidden). Here are the steps:

1. Open Command Prompt, can by clicking Start - Run, type cmd or command (for Windows 98/ME).

2. Once open the command prompt window, then type attrib-h-r-s-a / s / df: (the notes are in the C drive, for example: C: \ Documents and Settings \ Papa> attrib-h-r-s - a / s / df:)

3. Then after the command is typed, then enter.

4. If step no.2 does not work, you move the position of drive C to drive flash disk (usually F), to move the position of the drive, follow these steps, if the position of the flash disk in the computer or laptop is on drive F, then (as an example) and C: \ Documents and Settings \ Papa> F: then enter then will move to drive F: \>

5. Once in position the flash disk drive and then type the same command with step # 2, but for f: who is behind is removed, for example: F: \> attrib-h-r-s-a / s / d, then enter.

6. After this process, now try to check the folders or files on the flash disk.

See also:
Slow performance on computer
Check the unknown device with USB ID
Repair Windows 7 Update Issues

Popular posts from this blog

USB PowerShare Technology

USB Universal Serial Bus (USB) is a standard to establish communication between a computer and different devices. USB allows high speed connection of peripherals to a computer. Using USB, you can connect devices like mice, keyboards, printers, external drives, digital cameras, mobile phones, and so on. USB also supports Plug-and-Play installation and hot swapping.

Keyboard shortcuts to memorize and use

Below are some Keyboard shortcuts we recommend everyone memorize and use. Ctrl + C or Ctrl + Insert and Ctrl + X Both Ctrl + C and Ctrl + Insert will copy the highlighted text or selected item. If you want to cut instead of copy press Ctrl + X  

TCP/IP Model Layers

The TCP/IP model uses four layers that logically span the equivalent of the top six layers of the OSI reference model; this is shown in Figure. (The physical layer is not covered by the TCP/IP model because the data link layer is considered the point at which the interface occurs between the TCP/IP stack and the underlying networking hardware.) The following are the TCP/IP model layers, starting from the bottom. Network Interface Layer As its name suggests, this layer represents the place where the actual TCP/IP protocols running at higher layers interface to the local network. This layer is somewhat “controversial” in that some people don't even consider it a “legitimate” part of TCP/IP. This is usually because none of the core IP protocols run at this layer. Despite this, the network interface layer is part of the architecture. It is equivalent to the data link layer (layer two) in the OSI Reference Model and is also sometimes called the link layer. You may also ...