Solved

Hard Drive bad sector marking

Posted on 2001-09-09
8
856 Views
Last Modified: 2010-08-05
I often find that bad sectors usually occur near the beginning of the hard drive and if you partition the first 10% out the drive it can be as good as new.

But what I'd like to know is there a utility where you can manually mark parts of the hard disk as bad sectors, because I often find that certain parts are slow to read or there is a group of bad sectors with good sectors in between where it would be beneficial to mark the whole lot.

Dave  UK
0
Comment
Question by:dtbslb
8 Comments
 
LVL 47

Expert Comment

by:dbrunton
ID: 6468173
Listening.
0
 
LVL 32

Accepted Solution

by:
jhance earned 200 total points
ID: 6468266
As long as the BOOT sector is not damaged you are correct and a drive can be used with bad sectors.  In fact, most drives come from the manufacturer NEW with bad sectors mapped out.  If you have a section of the drive with a lot of bad sectors you are also correct that putting them in a "bad" partition will keep them out of your way.

Be careful, however, as a drive that is developing bad sectors is in danger of failure.  

The SCANDISK application maps out bad sectors at the filesystem level but a more useful utility is the Low Level Formatter (LLF) utilities that most drive vendors make available on the support web sites.  These utilities can map out bad sectors at the low-level format so that the filesystem doesn't even attempt to use them. By the way, it can also often recover bad sectors that were only bad because their formatting was damaged.

Another tool that does this really well is Gibson Research's SpinRite.  This program has been around almost since the invention of the IBM PC but it's an awesome utility.  See http://www.grc.com and click on SpinRite.
0
 
LVL 7

Expert Comment

by:pbessman
ID: 6468850
What Jhance said is correct.  Another consideration to remember is that many drives ship with "reserve" sectors so that if any should actually be marked bad, your system may still be able to report the drive at full capacity.
0
 
LVL 10

Expert Comment

by:kiranghag
ID: 6481648
in this case it is better to use utilities supplied by the manufacturer. they are tailermade to chekc the drive and can often identify weak areas in a better manner. general utilities dont work here.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 30

Expert Comment

by:VirusMinus
ID: 7816641
Dear questionner/expert(s)

No comment has been added lately, so it's time to clean up this TA.
I'll leave a recommendation in the Cleanup topic area that this question is to be:

- Answered by: <jhance>

Please leave any comments here within the next seven days.

==> PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER ! <==

VirusMinus
Cleanup volunteer
0
 
LVL 32

Expert Comment

by:jhance
ID: 7816735
Agree with that....

Note that NO reply was EVER made by dtbslb here.  I suggest you "clean up" his account also...
0
 
LVL 30

Expert Comment

by:VirusMinus
ID: 7818754
well whaddaya know, i got 1 right..
im new at cleanup, this is my first time, so pls excuse me if i get a few wrong. Im sure u know i just make the recommendation, the final cleanup is done by the mods.
I'm adding posts for corrections in the cleanup TA, so dont worry, u'll get the points for the Qs u've answered, and i've recommended otherwise.
Nice meeting ya, jhance...

Thanks
VM

(-) (-)
 <
\__/
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7864363
Per recommendation, force-accepted.

Netminder
EE Admin
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now