Solved

Spooky USB HD general query

Posted on 2014-03-26
4
303 Views
Last Modified: 2014-03-26
This is just something which spooked me out. PC #1->plugged in USB HDD, removed it, plugged into PC #2 modified file structure + edited a text file on it on a different PC, plugged it back in to PC #1.
The old file structure was still there, and the text file was the old version.

Re-plugged into PC#1 and the new stuff could be seen (although I don't know what was different about the replug)

I'm curious, I suppose it cached stuff from the USB drive and worked from the cache, but this must be quite a persistent cache, and how do I know when I'm working on the Cache? How do I clear the cache if I want to be sure what I'm looking at?
0
Comment
Question by:Silas2
4 Comments
 
LVL 48

Assisted Solution

by:dbrunton
dbrunton earned 125 total points
ID: 39957073
It appears that PC #1 did not recognize the first disconnection and the reconnection and thus the file structure was the same on reconnection.

Did you do just a straight pull out without informing the OS that you wanted to disconnect the drive?
0
 
LVL 34

Accepted Solution

by:
Dan Craciun earned 125 total points
ID: 39957075
You can click on the "Safely remove hardware" icon next to the clock. This will force the cache to be written to the external device.

HTH,
Dan
0
 

Author Comment

by:Silas2
ID: 39957089
Oh, that's what the safely remove does, it clears the cache! I always wondered what the point was.
So with USB HDD's it's (the OS) really working from a local drive and caching loads of stuff onto that.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39957094
You can also optimize the drive for data safety instead of speed, but you have to do that on every computer you plug it into. Since this question's already closed, I'll let you figure out how to do that on your own.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now