?
Solved

corrupt block bitmap

Posted on 2004-10-10
1
Medium Priority
?
1,405 Views
Last Modified: 2016-10-27
I used PartitionMagic to create a new partition in the free space I thought i had at the end of my hard drive.  When I rebooted, I found that my primary c: partition had been truncated and cleared, and my computer would no longer boot XP Pro.  When I went to recover the data, I used Acronis Partition Recovery and it told me that I had a corrupt block bitmap, but i found that all of my files were still intact.  I was wondering how I would be able to fix this corrupt block bitmap without writing the other files on my hard drive.
0
Comment
Question by:canadian0
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 59

Accepted Solution

by:
LeeTutor earned 1000 total points
ID: 12276473
Have you tried running chkdsk from the Recovery Console?

http://support.microsoft.com/default.aspx?scid=kb;en-us;314058
Description of the Windows XP Recovery Console
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Check out what's been happening in the Experts Exchange community.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question