Skip to main content

Repair your sd card from (cmd)

reapir

Sd card is world smallest storage media. Sd card is an ultra small flash memory drive used to provide high capacity of memory.SDXC is a more recent standard that allows cards 32 GB to 2 TB in size.Manly sd card used in portable devices like camera, handheld computer, audio, ipodand on many mobile phones.We can repair sd card simply by our-self there is no need for expensive data recovery or repairing shop.Sd card first uses in 1999.An SD card typically measures 32 x 24 x 2.1 mm and weighs approximately 2grams.But,When your SD card is damaged or corrupted due to certain reasons, your data will usually become inaccessible. If you tried to open it on your computer, Windows will remind that the card is not accessible because the file or directory is corrupted and unreadable



Repair Sd card

cmd repair


1 . Open your pc or laptop

2. Connect your sd card via card reader (Note: Don't connect it with usb)

3. After connected note the name of your sd card drive Ex; f drive, g drive etc.

4.Then open cmd

5. Type following command :-    chkdsk sd card drive name: /f
    Ex: -chkdsk i: /f

Comments

Popular posts from this blog

Anonymous Hacker Serve 16 Year In Jail For Exposing Steubenville rapists - Is That Justice

News Compressed : A anonymous hacker exposed the gang rapist of teenager of Steubenville, Ohio by hacked into the high school’s football sports fan site Roll Red Roll and found evidence of the 2012 rape case & also uploaded a video that showing the evidence of rape case but instead of look out those evidence federal government get anonymous hacker who help to expose those rapist in jail for 16 year and rapist still walks free. --------------------------------------------------------------------------------- I don't know what the hack is wrong with federal government and we can see and everyone can see it clearly the person who exposed the rapist of 14 year old girl and help minor are now himself faces jail for 16 year just for hacking a website for helping a minor( Meanwhile the rapist exposed by hacker are already free ) Means everything he did for exposing those rapist is waste The court finds him guilty in this case the defense of hacker  Deric Lostutter said t...

Our Mine Group Hacked Vine Celebrity Amanda Cerny Vine Account

Our Mine Group Hacked Vine Celebrity Amanda Cerny Vine Account News Compressed : Amanda cerny the famous television celebrity  mostly for their vines and the   former Playboy Playmate of the Month for the month of October in 201  has been reportedly hacked by the team of our mine .  The hacker posted some a clip to inform about hack and posted to contact  our-mine team  to gain access on that account it's also be seen that amanda cerny vine verification batch has also been removed. The Team of our mine who mainly targeted  high profile accounts and this time they targeted the famou s celebrity mainly for their vines is Amanda Cerny. It was said to be hacked by Saudi Arabia group of OurMine. This is not the first time for OurMine the last month the pokemon go SEO was vicitm before that Google's CEO Sundar Pichai, Facebook's CEO Mark Zuckerberg, Twitter CEO Jack Dorsey, Twitter's ex-CEO Dick Costolo, Facebook-owned virtual reality...

How To Locate a Person Whom You Are Chatting On Internet

Hello geeks! We are back again with a new trick on a new day that helps this time i want to teach you how to track person means get it's location whom you are talking on Internet. Means Locate a stranger or your friend on social network like facebook , twitter etc. Location of a person we are communicating helps us get a relevant friend other than this it will help you to tackle spam& abuses of person. It might help you a lot in freelancing when we are communicating with some-one for business purpose on internet we might have some doubt about that person which can easily be cleared by tracking him. What is Social Spam Social spam is unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information. wiki How to Track First we w...