Solved

Bad blocks check

Posted on 2004-04-13
6
1,229 Views
Last Modified: 2010-04-26
Is there any cool software to check the hard drive surface?

Thanks
jdff
0
Comment
Question by:jdff
  • 3
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
buckeyes33 earned 250 total points
ID: 10819839
0
 
LVL 10

Assisted Solution

by:Snowguy
Snowguy earned 250 total points
ID: 10819845
0
 
LVL 10

Expert Comment

by:Snowguy
ID: 10819848
Damn slow again LOL...
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 9

Expert Comment

by:buckeyes33
ID: 10819912
lol  :)
0
 
LVL 10

Expert Comment

by:Snowguy
ID: 10819965
You can try spinrite (not for free)
http://grc.com/spinrite.htm
0
 
LVL 3

Expert Comment

by:elantra
ID: 10821291
If you are using XP:

Open up my computer by double-clicking.  Then right click the drive you would like to check.  Then select properties.  Tools tab.  Then click check now.  You'll be told that Scandisk can't run the scan because some files are in use or some such.  It will give you the option of having Scandisk run the next time XP is started.

If you are using Me or below, try using scandisk.  If you can't find it check windows help file for scandisk.

Total Cost: Free.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question