Solved

Spooky USB HD general query

Posted on 2014-03-26
4
306 Views
Last Modified: 2014-03-26
This is just something which spooked me out. PC #1->plugged in USB HDD, removed it, plugged into PC #2 modified file structure + edited a text file on it on a different PC, plugged it back in to PC #1.
The old file structure was still there, and the text file was the old version.

Re-plugged into PC#1 and the new stuff could be seen (although I don't know what was different about the replug)

I'm curious, I suppose it cached stuff from the USB drive and worked from the cache, but this must be quite a persistent cache, and how do I know when I'm working on the Cache? How do I clear the cache if I want to be sure what I'm looking at?
0
Comment
Question by:Silas2
4 Comments
 
LVL 48

Assisted Solution

by:dbrunton
dbrunton earned 125 total points
ID: 39957073
It appears that PC #1 did not recognize the first disconnection and the reconnection and thus the file structure was the same on reconnection.

Did you do just a straight pull out without informing the OS that you wanted to disconnect the drive?
0
 
LVL 34

Accepted Solution

by:
Dan Craciun earned 125 total points
ID: 39957075
You can click on the "Safely remove hardware" icon next to the clock. This will force the cache to be written to the external device.

HTH,
Dan
0
 

Author Comment

by:Silas2
ID: 39957089
Oh, that's what the safely remove does, it clears the cache! I always wondered what the point was.
So with USB HDD's it's (the OS) really working from a local drive and caching loads of stuff onto that.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39957094
You can also optimize the drive for data safety instead of speed, but you have to do that on every computer you plug it into. Since this question's already closed, I'll let you figure out how to do that on your own.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
how to uninstall LSI SW successful 20 94
Firefox crashing on Mac 3 140
SBS 2011 Backup Drive 8 30
Power supply fan not spinning 12 50
this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question