Checking USB flash drives and flash memory cards for correct functionality
USB memory sticks and flash memory cards are part of the equipment of almost every mobile IT user today, but media defects can cause data loss. A small tool by the name of F3 helps.
USB sticks and flash memory cards are small, lightweight, and available in a variety of storage capacities, but even though they have no mechanical components, and some sticks even have a metal housing, the memory is not completely wear-free. Some flash storage media, often offered for low prices online, can fail to reach the advertised capacity. This shortcoming is really annoying when your important data is suddenly gone or you can no longer access the medium because of memory cell failure.
To spare yourself this mishap, you need only two things: Linux and the F3 program. F3 uses a read and write test to verify the integrity of the memory cells of your flash media and thus prevent unpleasant surprises.
The program, which hails from Brazil, is available from a no-frills website as a source code archive . Start by downloading the ZIP archive and unpacking it in a directory of your choice. Next, change to the newly created
f3-2.2 subdirectory and compile the software in a terminal using the
make linux command.
Buy this article as PDF
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.