Tag Archives: featured

UFD Failure Presents Strange Symptoms

I had one of my 16 GB Mushkin Atom USB Flash Drives (UFDs) fail on me this weekend. Alas, it happened in the middle of a boot-into-restore operation on my Lenovo X220 Tablet.  Because I didn’t think I’d built Rescue Media, I stuck the UFD into the machine while that process was underway. After the restore ended,  because that very same UFD failure presents strange symptoms I blamed Reflect. Wrong!

When UFD Failure Presents Strange Symptoms, Then What?

As is my usual practice when a device presents odd behaviors or symptoms, I go into diagnostics mode. When I dug into the drive using MiniTool Partition Magic (MTPW), I could see 5 NTFS partitions on that device. Each was a miniscule 3.8 MB in size. But no set of contortions would return that device to operation. Diskpart didn’t do it at the command line, nor was MTPW able to return it to working order. When I inserted it into Disk Management, I got the ultimate judgement on its condition shown in this story’s lead-in graphic: “Bad Disk.” That seemed to sum things up pretty nicely.

This is the second UFD I’ve had fail on me in the past 5 years or so. I just counted 28 of them here in my office, in sizes ranging from 8 GB to 128 GB. I use them all the time. The smaller ones are usually bootable with OS images, rescue media, or repair tools. The larger ones act primarily as portable storage for project work when I go on the road. And apparently, they do fail from time to time.

Macrium Reflect Forum Sets Things Straight

I hope I can be forgiven for initially wanting to blame Reflect for trashing the UFD. It did go south on me in the middle of a Macrium operation, after all. Then, I learned more about how Rescue Media works, courtesy of MR forum regulars “Froggie” and “jphughan.” Now, I am inclined to agree with their analysis that the UFD’s failure was coincidental.

Let me explain: it seems that when invoked using the “boot to restore” operation, jphughan told me “the WIM file inside the Rescue Media cached build folder — but that is a folder on (by default) your C partition.”  Given that member jphughan has 8.5K posts on the forums and has reached “Macrium Evangelist” level, I’m inclined to believe he knows what he’s talking about.

And in fact, I saw my system go into Recovery from the usual boot drive (a Plextor SSD) on that PC. Turns out that there’s a sub-older inside C:\Boot that’s named Macrium. It in turn has folders for the drivers it needs, various Windows 10 Assessment and Deployment Kit elements (aka WA10Files) folder, where the all-important boot.wim file for the WinRE version that Macrium uses to boot its Rescue Media resides.

Given that the UFD doesn’t function properly, but the system not only booted and ran its restore, this is the only way to explain how that process occurred. Thus, I concur with my informants from the Macrium Forums that (a) restore ran from the C: drive and (b) the UFD was either dead or died somewhere during the reboot process that proceeded just fine without its help or involvement.

Just goes to show that coincidence is a powerful force, but one that can be reasoned past when needs must.

Facebooklinkedin
Facebooklinkedin

Relearning X220 Tablet Macrium Restore Takes Time

I spent most of yesterday afternoon, and  a fair chunk of the evening, working on an article about repairing damaged, unresponsive or misbehaving MS Office installs. Naturally, I used a test machine for this project. Thus, I could do potentially horrible things to one machine, while writing about them on another. I backed up the old (2012) Lenovo X220 Tablet using Macrium Reflect before starting. That meant I could later restore my pristine OS and Office environment once playtime ended. This morning, I realized relearning X220 Tablet Macrium Restore takes time. Over an hour, in fact, when all was said and done.

Why Relearning X220 Tablet Macrium Restore Takes Time

Two reasons. First, the X220 Tablet is old enough that 300 Mbps is as fast as it can transfer data disk-to-disk. This is true, even when both disks are SSDs. One’s a Plextor mSATA 256GB PX6 SSD, the other is an ancient OCZ Vertex-3 128 GB SSD. The backup only took 8 minutes to lay down. But because a reboot required booting into WindowsPE, then into Macrium’s runtime, then restoring said backup, that part took over 30 minutes to complete.

The second reason falls rather more under the heading of “operator error,” subclass “I didn’t know Reflect could do that!” Let me explain. When I went to run the restore this time, Reflect asked me if I wanted to boot right into its bootable recovery media, ready to run the restore I’d just requested.

Silly me: I said “Yes!” That meant I needed to add the Macrium Recovery entry to my boot menu, build a Macrium Recovery partition, and wait for all that processing to finish before the machine could reboot and run the restore. That took another 15-20 minutes.

Good News, Bad News

I didn’t understand that Reflect would do this on my boot/system disk. The lead-in graphic for this story shows that my C drive layout now sports an 837MB Recovery Partition at the end of the sequence. Thus, the reboot worked after I removed the 8 GB UFD I’d inserted into the X220 Tablet, thinking I needed to build external WinRE media. The restore proceeded to a successful finish after that. That’s the good news.

The bad news is, the software ate my 8GB Mushkin UFD. It now shows up in diskmgmt.msc as “No media” with 0 Bytes capacity. When I tried to reformat it on another PC, I got an error message saying the UFD malfunctioned and could not be mounted. I’ll be sharing this experience on the Macrium forums, but I’m surprised that the program was allowed to (apparently) eat my flash drive. It won’t respond to low-level format commands at the command line, either. (Diskpart reports “an I/O device error.” I think this one is beyond repair.) Weird.

It’s no great loss (the device cost under US$10). But it still shouldn’t happen. I hope to follow up when I learn more. Stay tuned!

Facebooklinkedin
Facebooklinkedin

My Insider Preview Working Routine Revealed

On January 18, I reported here that the Insider Team at MS renewed my Windows Insider MVP (WIMVP) status for 2021. Since that renewal came through, I’ve been keeping an eye on my daily activities and taking notes. Now, I’m prepared to share a mini-expose. It’s what I call “My Insider Preview working routine revealed,” as in the title for this story. I’ll explain what it means, what I do, and how much time it takes to stay involved in the program.  Here goes…

Digging In: Insider Preview Working Routine Revealed

There are 5 major activities involved in the Insider Preview working routine, as far as I can tell. I’ll enumerate them first, then provide some details and ruminations.

  1. Dealing with Insider Preview releases
  2. Reporting on installation and use experiences
  3. Researching news and reports related to Insider Preview Releases
  4. Participating in the WIMVP community
  5. Raising awareness for Windows 10 plus related tools and utilities

1. Dealing with Insider Preview releases

I watch all the release channels — namely Dev, Beta, and Insider Preview, with at least 2 test machines devoted to each channel. Every time a new release comes out, I go through a specific drill, as follows:

  • Download and install the release
  • Observe any issues, hiccups or out-of-baseline behaviors during the install and initial trip to the desktop
  • Perform post-install clean-up, which consists of deleting Windows.old, running file cleanup, and making a fresh backup of the new version in Macrium reflect
  • Report on experience and findings at TenForums.com in the News forum and, if necessary, in the Installation and Upgrade forum
  • Check Event logs and Reliability Monitor for out-of-the-ordinary stuff
  • Report anything interesting or noteworthy to Feedback hub

As occasional updates to IP releases emerge, I repeat the steps above except for post-install clean-up, though I may run DISM /online /cleanup-image /analyzecomponentstore to see if any install packages need cleaning up in the wake of the new update. Sometimes they do, and sometimes they don’t.

I do about 6 of these a week on average, where each one takes anywhere from 15 minutes to an hour if everything works as it should. Sometimes, troubleshooting can take an hour or more, as when troubleshooting installation failures. Right now, for example, I’m dealing with a Bug Check 0xA IRQL_NOT_LESS_OR_EQUAL stop error on Build 21301 on one of my test machines.  I may not get this resolved until after dinner tonight because I have three deadlines to meet today (this article, a story for ComputerWorld, and a blog post for ActualTechMedia).

2. Reporting on installation and use experiences

Once I get the IP release installed and cleaned up, I start using it from time to time. As I observe its behavior and try out commands, programs, apps and utilities, I report any issues I encounter to Feedback hub. This depends a lot on my overall workload and may involve only 10 minutes on some days, and an hour or two on others. Varies a lot.

3. Researching news and reports related to Insider Preview Releases

I read the Windows 10 coverage on at least a half-dozen sites daily to keep up with current events, reported bugs and issues, emerging features and rumors of same. I also keep a partial eye on Microsoft business and tech news, as well as PC software and hardware industry news. This takes me at least an hour a day; longer if I get interested in something and start tracking stuff down. My daily visits include WinAero.com, Windows Latest, MSPowerUser, NeoWin, OnMSFT, Ghacks, ZDNet, Windows Central, and TenForums.com (where I try to read all new threads every day).

4. Participating in the WIMVP community

I belong to the WIMVP Yammer group, and scan its posts daily. We have weekly meetings to discuss Windows 10 topics which I sometimes attend (but not always). When we have online meetings — as we will later this morning — I try to attend those pretty regularly. I make a point of attending our conferences, and used to enjoy the physical ones. Now, like everybody else, I get what I can from their online/virtual counterparts, and look forward to when traveling for a real meet-up is once again possible. This takes me an hour or two a week on average, with 2-3 full days for conferences.

5. Raising awareness for Windows 10 plus related tools and utilities

I’m always on the lookout for good Microsoft-built or third-party tools, utilities, scripts, and whatnot. As I find them, I write about them in my daily reporting, and try to get articles placed to write about them in more detail and depth. You can get an inkling of what I do from my end-of-last-year story here Top 3 2020 Utilities. This is about the most fun I get to have in this role, but seldom takes more than an hour or two a week, sometimes less.

I also give an annual Windows 10 presentation at the Spiceworks SpiceWorld conference, and try to pick up other speaking and presenting gigs as they make themselves available. If you want me to talk about Windows 10 stuff at your conference and I don’t have a conflict, I’d be happy to oblige. Contact me through Ed Tittel Contact Info, where you’ll find an email form that goes straight into my inbox.

Facebooklinkedin
Facebooklinkedin

Pondering Windows Experience Pack Updates

I’m still at the point where it’s all sinking in. Thus, I read with interest at WindowsLatest this morning that “Microsoft is testing another new Windows 10 Experience Pack update.” I went to check update history on one of my Release Preview machines (the Surface Pro 3). And sure enough, I see a corresponding update to match the Experience Pack version info from Settings → System → About shown in the lead-in graphic. That’s got me pondering Windows Experience Pack updates in general, and hoping we’ll see them put to work for something more … err … substantial that screencap tweaks in the near future.

Pondering Windows Experience Pack Updates.update-history

While Pondering Windows Experience Pack Updates, I Hope for More Action

Once I learned that KB4601906 was in the picture for this change, I jumped first to the Microsoft Catalog to see if it was there. No such luck. Likewise, as is often the case, a search on KB4601906 through Google turns up lots of third-party hits, but nothing from MS itself. Clicking on the link in update history, however, is another story. That gets me to an MS Support item named January 12, 2021—KB4598242 (OS Builds 19041.746 and 19042.746). That takes me to a blurb on the wrong Knowledge Base article. A direct search for “KB4601906” at MS Support turns up … nada.

Of course, I learned what I could from WindowsLatest and other similar items from TenForums and other places. @Brink reproduces the Windows Insider blog item that finally sheds a little light on the subject. In that item, Brandon LeBlanc says

We are improving the reliability of screen snipping experience, especially with apps that access the clipboard often.

More importantly, near the end of his post, he goes on to say

…we are testing this new process out with Insiders to deliver new feature improvements to customers outside of major Windows 10 feature updates. Right now, we are starting out with a really scoped set of features and improvements. Over time, we hope to expand the scope and the frequency of releases in the future.

No News Is … No News

I get it now, and think I already understood this. MS is working with the Windows Experience Pack as a way to deliver new feature improvements without resorting to a semi-annual feature upgrade. They’re still testing and haven’t done anything serious or significant with this yet. But they will, someday. Soon, I hope. Stay tuned!

 

Facebooklinkedin
Facebooklinkedin

Insane GPU Prices Make Recycling Old Tech Sensible

It’s time for me to refresh my desktop PC. The old motherboard runs a Z170 chipset with a Skylake I7-6700 processor. The former made its debut in August 2015 and the latter one month later. If memory serves, I built this machine in mid-2016. That makes the technology more than 5 years old, and the PC closing in fast on that age. I’ve been planning a new build for a while now. I just went back to check parts prices. For me, given a still working Nvidia GTX 1070 card in the current build,  today’s insane GPU prices make recycling old tech sensible.

What Insane GPU Prices Make Recycling Old Tech Sensible?

If memory serves, I paid around US$500 for my GPU when I bought it over 5 years ago. Guess what? That same card costs costs US$500 now! A more modern Nvidia 2070 card goes for around US$1,000. And the latest generation, top-of-the-line 3080 cards cost US$1,800 and up. I’m serious: these prices are really nuts!

Wait and See Is All I Can Do

I’d already planned to re-use my case. Other items in my planned bill of materials include a Ryzen 5 5600X 6-core CPU (US$420), Noctua NH-U12A cooler (US$150), MSI Meg X570 Unify mobo (US$400), 32GB (2×16) DDR4-3200 (US$155), 2xSabrent PCie 4.0 M.2 1 TB SSD (US$340), and a Seasonic Platinum PX-850W PSU (US$170). Total price, sans GPU: US$1,635. That’s more than I spent on my last build, but includes two fast, sizable SSDs and a beefier power supply.

As for a new GPU, it’s on hold until prices come down. I can live with the 1070 GTX until 2070/3070 prices recede from 4 figures. Or, I can wait for a windfall — or a wild hair — and take the plunge at another time. There’s no hurry.

For the moment, I can really and truly assert once again that current GPU prices are just crazy. Sigh. It’s always something, right?

Facebooklinkedin
Facebooklinkedin

19043 aka 20H1 Early Tryout How-to

Here’s an interesting experiment for those with a spare test machine handy.  Note that this machine must run Insider Preview Beta or Release Preview Channel Build 19042.782 with KB4598291 installed. I found a handy collection of DISM commands from poster “moinmoin” at DeskModder.de. If run in an administrative Command Prompt or PowerShell session, the PC will advance to 21H1, as shown in the lead-in graphic for this story. It serves, therefore, as a 19043 aka 20H1 early tryout how-to for adventurous insiders.

Working Through 19043 aka 20H1 Early Tryout How-to

Essentially, the following sequence of commands does piecemeal what a full-blown enablement package does behind the scenes. In fact, DISM runs a series of .mum files, which are XML files that provide instructions to the Windows Update Installer for performing specific updates. Honestly, I’m not sure how “moinmoin” figured this sequence out. I’m guesssing he worked from analysis of other, earlier enablement packages. But that sequence worked on my Lenovo X380 Yoga test machine, which had been running 19042.782 for a few days.

Please, look below for the sequence of commands. Warning: Those using German versions of Windows should get them from the original post. I’ll provide instructions on how to modify the command text for other languages afterward. It’s safe to assemble, then cut’n’paste these commands one at a time in PowerShell. That’s how I “upgraded” my Lenovo test PC, in fact.

Putting DISM Commands together

In fact, all these commands start with same master prefix string. Simply append the other sub-strings and fire them off at the command line to do your thing.

That master prefix string is:

Dism /Online /Add-package:C:\Windows\servicing\Packages\

The 8 suffix strings are (do not grab the numbers and the period that follows them — they’re to help you find stuff, not for command-line use):

1.microsoft-windows-product-data-21h1-ekb-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
2.microsoft-windows-product-data-21h1-ekb-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum
3.microsoft-windows-product-data-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
4.microsoft-windows-product-data-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum
5.microsoft-windows-updatetargeting-clientos-21h1-ekb-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
6.microsoft-windows-updatetargeting-clientos-21h1-ekb-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum
7.microsoft-windows-updatetargeting-clientos-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
8.microsoft-windows-updatetargeting-clientos-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum

Even for German (and other languages) the first command above stays the same. The German version of the second command above reads

Dism /Online /Add-package:C:\Windows\servicing\Packages\microsoft-windows-product-data-21h1-ekb-package~31bf3856ad364e35~amd64~de-DE~10.0.19041.782.mum

Note that the bolded language code for German German de-DE is embedded near the end of the string. To invoke the proper files for other languages substitute your language code where it appears. For example, a French speaker in France would use fr-FR, and a French speaker in Belgium fr-BE, and so forth. This applies to elements 2-8 for all languages, and is performed using string substitution on the German language version of the commands.

Necessary Precautions Beforehand

It’s probably wise to make a backup of your test PC’s OS image before you try this sequence of commands out. Also, make sure you have a working, bootable USB flash drive from which you can restore that backup. That way, should the worst happen, and your PC get bricked by the updates, you can boot to the UFD and restore the backup without too much muss, fuss, or lost time. Just because it worked on my Lenovo X380 Yoga doesn’t mean it will also work on your test PC. Better to have the backup and restore tools and not need them, than to not have them and suffer from their absence. Enjoy!

Facebooklinkedin
Facebooklinkedin

Build 19043 Becomes Likely 21H1 Candidate

The rumors started flying yesterday, first at WindowsLatest. But I couldn’t find evidence through the data they provided to back that up in the Windows registry. Then, this morning Sergey Tkachenko at WinAero.com came out with some more tangible proof in the form of registry key/value names to demonstrate that 21H1 action is afoot. I’m now inclined to agree that Build 19043 becomes likely 21H1 candidate for a Spring release.

Strong Hints Mean Build 19043 Becomes Likely 21H1 Candidate

In his story, Tkachenko proposes a string value  of Microsoft-UpdateTargeting-ClientOS vb_release_svc_prod3 10.0.19043.782 for an ultimate value of the Microsoft-Windows-21h1Enablement key. Just for grins, I searched on that value, and found nothing like it in either of my Release Preview (Build 19042.782) test machines.

Careful reading of his post leads me to  this analysis. Because 19041 became 20H1 and 19042 20H2, he’s guessing that 19043  matches up to 21H1. But so far, I’ve seen no hard evidence to support this assumption. That said, I do believe he may be right. I’ve seen nothing whatsoever to contradict equating 19043 with 21H2, either. And indeed, it is shared by many other Windows followers online.

How Much Longer Before We Know?

If you believe poster “moinmoin” at WindowsModder.de, an enablement package could appear as soon a next Patch Tuesday (February 9).  And if not then, he says, surely on or before the following Patch Tuesday (March 9).

It all depends on how this latest Release Preview update goes within the Insider Preview population that downloads and uses KB4598242. This test of the enablement package’s stability and usability, based on telemetry from its installers, could have a major impact on when 21H1 sees the light of day. If things go well, and no major issues or errors manifest, then sooner. If contrariwise, then later. We’ll see!

[NOTE}: To get the complete details on the Registry information from the lead-in photo from this story, right-click that image and select “View Image” (Firefox). Or, use your browser’s syntax to view the image by itself. Then you can read the values on-screen. HTH.

OK, Then: It’s Settled (January 24, 2021)

Thanks to a sequence of DISM commands that German-speaking Windows wizard “moinmoin” has shared at DeskModder.de, we now know how to “upgrade” PCs running Insider Beta or Release Preview channel build 19042.782 (or higher, presumably). I share all those details in a new article here entitled 19043 aka 20H1 Early Try-out How-to. I’d have to say this locks in the 19043/20H1 nomenclature conclusively, unless MS introduces a seismic shift in naming conventions between now and when 21H1 goes public.

Facebooklinkedin
Facebooklinkedin

Exorcizing Zombie Adobe Flash Player Elements

Some Windows 10 users may see a Flash Info logo show up on their desktops. Don’t worry: that’s Adobe’s way of telling you the Flash Player remains active on your PC, and needs to be removed.  I wrote about Flash end-of-life (EOL) and removal techniques on December 29. That story reported the EOL date falling at year’s end. Apparently not everybody has worked through its various uninstall possibilities yet, either.  The TenForums thread “Strange Logo on Desktop” turns out to be an admonition from Adobe to make Flash Player go away. Alas, the process doesn’t work 100%. Thus, I’ll explain how one goes about exorcizing zombie Adobe Flash Player elements.

Exorcizing Zombie Adobe Flash Player Elements.flash-info-logo

Here’s what the Flash Info log looks like: a faded Flash logo with the “i” (information) element superimposed.

Several Flash Player Uninstall Options Available

Flash shows up in lots of places, apparently. Likewise, uninstalling it requires a variety of removal techniques.  Adobe’s warning for its Flash Player Uninstaller hints at this. It reads: “These instructions are NOT applicable to Flash Player included with Microsoft Edge or Internet Explorer on Windows 8 and later or with Google Chrome…” It advises those users to check out the Flash Player Help page for disabling same.

There’s also an uninstaller available via the Microsoft Update Catalog. Counter-intuitively KB4577586 is named “Update for Removal of Adobe Flash Player.” When downloading this item, be sure to grab the one that matches your current Windows version. Note: apparently, there is no such update for Windows 10 Version 20H2.

If Adobe Flash Player shows up in Programs and Features, you can use its built-in uninstall functions to get rid of it. Or you could turn to a third-party product like Revo Uninstaller to do the job instead.

Exorcizing Zombie Adobe Flash Player Elements May Require Manual Efforts

After running the afore-linked KB4577586, the original poster for the TenForums thread that prompted this story reports that the icon remained on his desktop. On top of everything else on screen, it wouldn’t get out of his way. Should that happen, one can remove the Macromed folder and its contents from these two parent folders:

1. C:\Windows\System32
2. C:\Windows\SysWOW64

Savvy readers will recognize that these folders are where Windows keeps 32-bit elements, tools and utilities for use on 32- and 64-bit systems, respectively. You may need to run a special-purpose delete utility to remove these folders or you can boot into command line recovery mode and delete them that way. Your choice. Either way, that should result in exorcizing zombie Adobe Flash elements that may still be hanging around your system. Et voila!

Facebooklinkedin
Facebooklinkedin

Restoring Missing 21292 N&I Taskbar Item

Here’s an interesting learning adventure. Upon introducing Windows 10 Build 21286, MS also introduced a News and Interests (N&I) taskbar item. I covered this topic on January 8. But after upgrading my Lenovo X220 Tablet to a newer Dev Channel release, N&I disappeared. Remembering a related WinAero.com story, I followed its activation advice. And that, dear readers, is how I found myself restoring missing 21292 N&I taskbar item a few minutes ago. Here’s the deal…

Going About Restoring Missing 21292 N&I Taskbar Item

Restoring or activating N&I requires the third-party ViVe tool. Helpfully, it can enable or disable Windows 10 A/B and hidden features. Download ViVe from Github, where the latest release is v0.2.1. For myself, I just observed that v0.2.0 also works. That’s because  I just used it successfully on my X220T, not yet realizing a newer release is available.

After you download the ZIP file, extract it into a folder. Next, run an administrative cmd or PowerShell session from that folder. Then, execute the following sequence of commands:


vivetool addconfig 29947361 2
vivetool addconfig 27833282 2
vivetool addconfig 27368843 2
vivetool addconfig 28247353 2
vivetool addconfig 27371092 2
vivetool addconfig 27371152 2
vivetool addconfig 30803283 2
vivetool addconfig 30213886 2

Note: If using PowerShell, prepend the string “.\” before each command or it won’t work.

Cut’n’paste these commands into the window. Please execute each one individually. Next, you’ll need to restart your PC. Voila! The N&I item reappears in the Taskbar. At least, it did on my X220T PC.

8 Commands Too Much? Try Some Batch Files

OTOH, if you prefer, WinAero offers a ZIP file in its story. It  activates all necessary settings from one batch file, and deactivates them from another.

And remember, N&I only appears in Build 21286 or higher-numbered Dev Channel Insider Preview releases at the moment.

More About the ViVe Developers

Note: the authors of ViVe are Rafael Rivera and somebody named Lucas/thebookisclosed/albacore. Both are active Windows developers and toolsmiths. Rivera is also an occasional contributor to Thurrott.com (which is where I first came across him and his work). The other person is also the author of the excellent Managed Disk Cleanup utility, also available on GitHub.

Facebooklinkedin
Facebooklinkedin

MTPW Data Recovery Works Eventually

This is not a dig at the Data Recovery Tool in  MiniTool Partition Wizard (MTPW). When I entitled this item MTPW Data Recovery works eventually, I only meant to observe that it takes FOREVER to recover the contents of a damaged or corrupted drive.

I just learned this the hard way, when something corrupted both drives in my Wavlink ST334U dual drive dock. One of the two drives involved was a Toshiba 8TB unit with approximately 4 TB worth of production PC backups. Thus, I really wanted to recover some — but not all, at north of 100GB per image — of those files. The lead-in screencap for this story shows Data Recovery scanning to recover the contents of the other drive. It’s a mostly disposable 500GB unit that incorporates two Samsung EVO m.2 SSDs into a pseudo-array on a Syba SATA adapter card. Note that it plans to take 4:25 to recover 207.17 GB in 4119 files.

How Long, When MTPW Data Recovery Works Eventually?

Hmmm. Let’s see 4:25 for 207 GB means 19.787 times longer to recover 4 TB. That’s roughly 89.4 hours. Which in turn is 3 days, 17 hours, and 24 minutes. Of course, that’s way too freaking long for most ordinary people to wait for the whole thing to complete. Especially me.

Turns out that you can manipulate the left-hand menu in MTPW Data Recovery, and instruct it to recover only the files you tell it to by clicking checkboxes. And, as it turns out, by expanding listing items with a plus sign (“+”) to their left. Eventually, you get a map of what the recovery utility finds on the drive, and can pick what you like.

In my case, I liked the following:

1. About 1.5 TB worth of the most recent backups
2. About 2.5 GB worth of legal work archives
3. About 124 GB worth of info snapshotted from a now-retired E: drive

Thus, of the 4-plus TB worth of holdings on that 8 TB drive, I decided to recover under 1.7 TB. How long did this take? Somewhere in the neighborhood of 30 hours. Long enough that, when I copied the recovered files from the 4 TB HGST drive I pressed into service to receive them back to their original home, that process took 2:43:00.

What About the Other Drive?

I let Data Recovery scan for about an hour, then checked over the drive’s contents. It’s always been a scratch drive, so I was able to confirm there was nothing on that drive I couldn’t live without. So, I quit out of Data Recovery and MTPW. Next, I opened Disk Management, where the drive showed up as RAW at full capacity with an E: letter assignment. I changed it back to its original M: assignment to produce this screencap:

With the right drive letter in place, I can recreate the drive.
[Click image for full-sized view.]

Next, I right-clicked on its box, and then selected “Format” from the pop-up menu. I named it Syba.5 (Syba dual SSD adapter with 0.5 TB of storage space, give or take). The formatting operation took a surprisingly long time to finish (almost a minute) with the following result:

Even on a Quick Format, it took almost a minute for this drive to format.
[Click image for full-sized view.]

OK, then. I guess I’m back in business. Now if I can only figure out what went wrong in the first place, so I don’t do this to myself again. Sigh.

Facebooklinkedin
Facebooklinkedin