?
Solved

Spooky USB HD general query

Posted on 2014-03-26
4
Medium Priority
?
320 Views
Last Modified: 2014-03-26
This is just something which spooked me out. PC #1->plugged in USB HDD, removed it, plugged into PC #2 modified file structure + edited a text file on it on a different PC, plugged it back in to PC #1.
The old file structure was still there, and the text file was the old version.

Re-plugged into PC#1 and the new stuff could be seen (although I don't know what was different about the replug)

I'm curious, I suppose it cached stuff from the USB drive and worked from the cache, but this must be quite a persistent cache, and how do I know when I'm working on the Cache? How do I clear the cache if I want to be sure what I'm looking at?
0
Comment
Question by:Silas2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 49

Assisted Solution

by:dbrunton
dbrunton earned 500 total points
ID: 39957073
It appears that PC #1 did not recognize the first disconnection and the reconnection and thus the file structure was the same on reconnection.

Did you do just a straight pull out without informing the OS that you wanted to disconnect the drive?
0
 
LVL 35

Accepted Solution

by:
Dan Craciun earned 500 total points
ID: 39957075
You can click on the "Safely remove hardware" icon next to the clock. This will force the cache to be written to the external device.

HTH,
Dan
0
 

Author Comment

by:Silas2
ID: 39957089
Oh, that's what the safely remove does, it clears the cache! I always wondered what the point was.
So with USB HDD's it's (the OS) really working from a local drive and caching loads of stuff onto that.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39957094
You can also optimize the drive for data safety instead of speed, but you have to do that on every computer you plug it into. Since this question's already closed, I'll let you figure out how to do that on your own.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question