Pages

Wednesday 31 August 2016

Mark Zuckerberg Set To Show Off His Jarvis-like AI To Control His Home Next Month


Few months ago, Mark Zuckerberg became an Ironman cosplay and revealed his plans to build a personal Jarvis. Well, it sounds, Mr. Zuckerberg has been quite serious regarding his AI pet project. He has actually built something that we could call an early man in the timeline of Jarvis.
At the town hall Q&A in Rome, Mr. Zuckerberg announced that his own AI-based version of Jarvis has become intelligent enough to do simple things in his house. For example, controlling temperature, doors, lights, etc. along with assisting him with his work.
“I got it to this point where now I can control the lights, I can control the gates, I can control the temperature — much to the chagrin of my wife, who now cannot control the temperature because it is programmed to only listen to my voice,” he said.
“I’ll give her access once I’m done,” he added. We hope he does it as soon as possible. He planning a demo for his home artificial intelligence system next month.
“I programmed it so now, when I walk up to my gate, I don’t have to put in a code or something like that to get in, or put in a key.”
Mr. Zuckerberg has already acknowledged AI to be an important part of Facebook’s 10-year map down the road. His artificial intelligence plans would definitely fuel the budding Internet of Things technologies to create more advanced home automation systems in the future.
If you have something to add, tell us in the comments below.

FAT32 vs. NTFS vs. exFAT – Difference Between Three File Systems


What Is A File System?

A file system is basically a set of rules used to decide how data is stored and fetched in a storage device, be it a hard drive, flash drive or something else. Like the conventional way we used to store data in our offices in different files, the same method is deployed in computing. A defined set of data called a ‘File’ is stored at a specified location in a storage device. If the file system is kicked out of the computing world, all we will be left with is a large chunk of unrecognizable data in our storage media.
There are many type of files systems available for different types of storage options like the Disk File System, Flash File System, Tape File System, and so on. But for now, I’ll be restricting myself with the three Disk File Systems FAT32, NTFS, and ExFAT.

What Is FAT32 File System?

Standing for File Allocation Table, it’s the oldest and the most experienced file system in the history of computing. The story started in 1977 with the original 8-bit FAT file system intended as an antecedent to Microsoft’s Standalone Disk Basic-80, which was launched for Intel 8080-based NCR 7200 in 1977/1978, a data entry terminal with 8-inch floppy disks. It was coded by Marc McDonald following discussions with Microsoft’s co-founder Bill Gates.
Further utilization of the FAT File System or FAT Structure as it was called referred earlier, was done in Microsoft’s 8080/Z80 platform-based operating system MDOS/MIDAS written by Marc McDonald, who was Microsoft’s first salaried employee. In the subsequent years, the FAT file system advanced to FAT12, FAT16 and finally FAT32 that has been synonymous to the word file system when we have to deal external storage media like removable drives.
FAT32 was a surmount to the limited volume size offered by the FAT16 file system. The 32-bit File Allocation Table was released in August 1995, with the Windows 95 operating system. It allows you to store files of size up to 4 Gigs and the maximum disk size can go up to 16TB.
So, the fatty file system can’t be used to install heavy apps or store large files, that’s why the modern Windows uses a new file system known as NTFS, for which we don’t have to worry about the file size and disk size limits.
The FAT32 file system is perfect for storage devices like flash drives but you’ll have to make sure you don’t have an individual file larger than 4 GB. It has been widely implemented beyond the realm of computers, like gaming consoles, HDTVs, DVD & Blu-Ray players, and practically any device with a USB port. All versions of Windows, Linux support the FAT32 file system, even Apple’s Mac provides complete support it.

What Is NTFS File System?

Another Microsoft proprietary file system was introduced in 1993 with their Windows NT 3.1 coming into existence. It offers inexhaustible file size limits and you won’t run out of it anytime soon. The development started in the mid-1980s as the result of an association between Microsoft and IBM to develop a new age operating system with better performance in terms of graphics. However, their friendship didn’t last longer and the two parted their ways consequently developing their own version of the new file system. IBM made HPFS which was used in the OS/2 operating system and the Redmond created NTFS v1.0 released with Windows NT 3.1.
The NTFS or New Technology File System offers a theoretical file size of 16 EB – 1 KB which is 18,446,744,073,709,550,592 bytes. Well, your files aren’t that much huge, I guess. Its development team included Tom Miller, Garry Kimura, Brian Andrew, and David Goebel. NTFS v3.1 was launched with Microsoft’s Windows XP and it hasn’t been changed much since then, although numerous additions like partition shrinking, self-healing, and NTFS Symbolic links have been added. Also, the implemented capacity of NTFS file system is only 256 TB out the whopping 16 EB – 1 KB which was done with the launch of Windows 8, for which Microsoft ended support last week and Windows Server 2012.
Other notable features include reparse points, sparse file support, disk usage quotas, distributed link tracking, and file-level encryption. The NTFS file system supports backward compatibility with the previous versions and it’s a journaling file system that proves to be an important tool when it comes to reviving a corrupt file system. It maintains a Journal, a data structure which keeps track of any potential modifications to the file system and is used to recover the file system.
This file system is supported by Windows XP and later versions. Apple’s Mac OSX provides read-only support to an NTFS-formatted drive and only a few Linux variants are able to provide write support for NTFS.

What Is exFAT File System?

The exFAT (Extended FAT) is another Microsoft proprietary file system which finds its use in ball games where the FAT32 feels out of breath. Most of the modern digital cameras use exFAT. High capacity SDXC memory cards are now pre-formatted with the exFAT, as it is lightweight in contrast to NTFS and supports file size more of than 4 GB. So, if you have an exFAT SD card you will have no issues while copying full-length HD movies on it which is not the case with FAT32.
Currently, Microsoft holds the US Patent 8321439 for Quick File Name Lookup using Name hash, is a method which escalates file search speed. They’ve not released a complete specification set for the exFAT file system, for which the vendors have to obtain a restricted license from Microsoft. Most of the countries recognize the US Patent Law and thus, any implementation of the exFAT file system is not possible for the vendors which intended to be a part of an open-source operating system or a commercial software.
Microsoft’s stubbornness to make the exFAT available freely has triggered the development of custom implementations of the file system. A FUSE-based version of the exFAT file system, named exfat-fuse, provides read/write operations for many Linux distributions including FreeBSD. A kernel based implementation made by Samsung was accidentally leaked on GitHub but was later published officially.
Launched in 2006, it has the same 16 EB file size limit as NTFS, but it is way lighter as it doesn’t contain many of the extra features that the latter has. Talking about the compatibility, full read and write support is provided by Mac, Android, and Windows operating system but for Linux distributions, the appropriate software facilitates the support.

NTFS vs FAT32 vs exFAT – Comparison

FAT32:

Compatibility: Windows, Mac, Linux, gaming consoles, practically any device with a USB port.
Pros: Cross-platform compatibility, lightweight.
Cons: Limited file size (upto 4GB) and partition size (upto 16TB)
Usage: Removable storage devices.

NTFS:

Compatibility: Windows, Mac (Read-only), Linux (read-only for some distributions), Microsoft Xbox One.
Pros: Inexhaustible limits for file and partition size.
Cons: Limited cross-platform compatibility.
Usage: Best for internal hard drives. Use it for Windows system drive and any other system partition which may be used to install software.

exFAT:

Compatibility: Windows XP and later versions, Mac OSX 10.6.5 and above, Linux (using FUSE), Android.
Pros: Behaves as a fusion between FAT32 and NTFS by providing practically unlimited file size and partition size.
Cons: Microsoft restricts its usage by license obligations.
Usage: Use with external hard drives or flash drives of you want to transfer files larger than 4 GB. Always prefer exFAT over FAT32 if the operating supports it.
Write your views in the comments section below.

Sunday 28 August 2016

Check out why keyboard is not arranged in alphabetical order


We use keyboard every day, be it our desktop, or laptop, or tablet or smartphone. But have you ever wondered as to why the keyboard is not arranged in alphabetical order?
The reason goes back to the time of manual typewriters. These typewriters in earlier days did have the keys arranged in alphabetical order. However, it was later discovered that the people typed so fast that the mechanical character keys got jammed very easily with this arrangement.
To prevent this, the keys were randomly positioned so that the weaker fingers were needed more frequently. This meant that people typed at a speed which the machine could handle. As a result, the ‘QWERTY’ keyboard came into existence that we find and use today.
The QWERTY keyboard layout was devised and created in the 1860s by the creator of the first modern typewriter, Christopher Sholes, a newspaper editor who lived in Milwaukee. Originally, the characters on the typewriters he invented were arranged alphabetically, set on the end of a metal bar which struck the paper when its key was pressed. However, once an operator had learned to type at speed, the bars attached to letters that lay close together on the keyboard became entangled with one another, compelling the typist to manually unstick the typebars, and also regularly blotting the document. A business associate of Sholes, James Densmore, suggested splitting up keys for letters commonly used together to speed up typing by preventing common pairs of typebars from striking the platen at the same time and sticking together.
There are varied opinions on this rearrangement of letters in the keyboard. The logic of the QWERTY layout was based on letter usage in English rather than positioning of letter in the alphabet. However, some sources assert that the QWERTY layout was designed to slow down typing speed to further reduce jamming. Also, the QWERTY keyboards were made so one could type using keys from the top row of the keyboard. On the other hand, there are sources who assert the rearrangement worked by separating common sequences of letters in English. Apparently, the hammers that were likely to be used in quick succession were less likely to hinder with each other. This random arrangement eventually became standard in computers later followed by the devices made after that.

Friday 26 August 2016

Foster Mother Cages Four-Year-Old Girl In The Bush For Five Months

A 28-year-old woman, Mary Matthew, has been arrested by the men of the Ondo State Police Command for allegedly caging a four-year-old foster daughter in a kiosk inside the bush for over five months in Imafon village in the Akure-South Local Government Area of Ondo State, Punch reports.
Mary said she ‘quarantined’ the victim, identified as Precious Michael, when she suspected that she had witchcraft and was infected with the Human Immunodeficiency Virus, which reportedly killed her mother last year.
The suspect, who was arrested in June, was said to be a relative of the late Precious’ mother. She reportedly brought the girl to Imafon in December 2015, after her mother died.
Parading the suspect at the headquarters of the command in Akure on Thursday, the state Commissioner of Police, Mrs. Hilda Harrison, said the suspect was arrested following a tip-off.
She said, “Mary and her husband, who alleged that the girl was possessed, decided to lock her outside the house. On receipt of the information, the personnel attached to the Juvenile Welfare Centre of the police command visited the scene and met the girl in the cage as reported.
“She (Precious) was immediately rescued and taken to the police clinic for medical attention, while the suspects are under interrogation and will soon be charged to court.”
Harrison explained that the victim would be taken to the welfare home of the Ondo State Ministry of Woman Affairs and Social Welfare.
Mrs. Olayemi Ojumu (ASP), who led the team that rescued the victim, told our correspondent that Precious tested negative to HIV.
She said, “When we got to the village, we saw the girl with a swollen body. She was holding a loaf of bread. She had defecated on her body inside the cage where she was kept in the bush. They didn’t allow her to come out to live with them. They gave her food and water inside the cage.
“When we asked Mary about the condition of the girl, she told us that Precious’ mother died of HIV in Enugu State and she discovered that she (Precious) had been infected with HIV by her deceased mother. She said she did not want Precious to infect her own children and that was why she kept her in the cage.”
Ojumu, who reportedly donated blood to save the life of the victim, said after she was rescued in June, she was taken to the police clinic in Akure where she recuperated.
Precious, who spoke with our correspondent, said, “They said I am a witch and I have HIV. They put me outside.”
The suspect, who admitted to have committed the offence, said she thought Precious was HIV positive and that was why she isolated her to avoid the spread of the virus in the village.
Mary, a farmer and an indigene of Enugu State, said she confined the victim to a corner in her shop, where she put her in the morning and released her in the evening whenever she came back from the farm.
She explained that she confined the victim to the shop because she noticed that the minor had swollen legs, a symptom which killed her mother.

Wednesday 24 August 2016

All You Need To Know About SSDs And How It Work

What is SSD?

An SSD (solid-state drive or solid-state disk) is a nonvolatile storage device that stores persistent data on solid-state flash memory.

What is Inside SSD?

SSD (solid state drives) is an integrated circuit under the hood which is used to store data. Their electronic interface is compatible with the block input/output interface used by HDD. You can just swap your old hard drive with a new SSD in a matter of a few minutes, provided, you are skilled enough to successfully open your computer hardware. And with no moving parts, they are way faster and strong enough to take shocks. They won’t mind even if you are careless enough to drop them from your table.

Memory:

Early versions of SSDs were based on DRAM volatile memory which furnished faster access and low latency but the only problem was that the data couldn’t be retained in the memory in the absence of power supply. It was in 2009 when SSDs based on NAND flash non-volatile memory were introduced which propelled their widespread adoption. Although, they are slower than the ones based on DRAM but they can still outrun conventional HDDs. And the biggest advantage is that the data remains intact even if you cut off the power supply.
NAND memory is made up of floating gate transistor cells which retain their charge states in the absence of power supply. Floating gate contains the electrons and the charged state is represented by binary bit 0 and discharged state by 1. Binary bit 0 represents data is stored in the NAND flash. The cells are arranged in a grid fashion and the grid is known as a block. An individual row in a block is called Page with sizes 2K, 4K, 8K, or 16K. Each block contains 128-256 pages, so the approximate size of the block varies between 256KB to 4MB.
NAND Flash is either Single Level Cell (SLC) which stores only one binary bit in one floating gate transistor and Multi-Level Cell (MLC) which stores two bits. Clearly, the latter one has more storage capacity but it comes at a price, they wear out faster. MLC type NAND flash memories are cheaper than SLC and are used in industry grade solid state drives (after making some modifications) which require more storage capacity but it degrades more quickly.

Controller:

It’s responsible for how data gets stored in a flash memory. It is designed for various requirements and could be loosely clubbed into two groups, one for low duty-cycle environments like flash drives, SD cards, camera, etc. in which constant read/write operations are not required. The other environment is high duty-cycle which requires constant read/write operations to be performed on the memory, like Solid State Drives.
Flash Controller acts as the middle man between the storage media and the computer. It is an embedded processor that is responsible for the performance of an SSD. Each time a computer wants to access the flash memory to perform a read/write operation, the flash controller comes into action.
The controller also manages the flash memory cells. Efficient handling of the storage cells is must as SSDs support a limited number of read/write cycles, about 10 thousand, and it would be wise enough to deploy something which makes sure that all the cells used equally in order to preserve the lifespan of the flash media, otherwise, some cells will become inoperable and some will be left unused throughout the lifetime of the SSD. Manufacturers use a technique known as wear-leveling to make sure that the degradation of the flash memory happens uniformly over time by programming the controller to utilize all the cells efficiently.
Another task the controller is assigned is known as Garbage Collection. In this process, when the write operation has been performed on every memory block for one time, the controller checks the initial blocks for the pages that will be required by the computer. It then copies those pages to a new block and leaves the existing block (known as a Stale block) to be erased and filled with new data.
The controller manages other important operations like introducing error-correcting code (ECC) which is the bit sequence of data stored and helps in data recovery in case it gets corrupted. Controller also maps bad sectors in the flash memory which are caused due damage occurred to the SSD. These can be logical bad sectors which can be repaired or physical bad sectors which represent permanently damaged parts of the flash memory and cannot be repaired. Controller uses the ECC to perform Memory Scrubbing operation which involves scan and repair of corrupt data in different locations of the memory.

Cache:

A small amount of DRAM volatile memory is used as a cache to store wear leveling data and to maintain a block placement directory. It improves the performance of the SSD but at the same time it increases the power consumption.

How SSDs work?

If we talk at the basic level, inside a solid state drive, transistors are in a sequential fashion. Initially, all the transistors are set to value 1 (not charged). When saving operation begins, the current starts flowing through the chain of transistors and the value for some transistors becomes 0 as data is saved in them. In the grid, each intersection of the rows and columns is called cell which comprises of two transistors, one as the control gate and the other one as floating gate. The current flows into the floating gate and the electrons flow into the control gate. So, a net positive charge is created which interrupts a current flow. Similarly, we can have a unique pattern of 1s and 0s by applying precise voltage values.

Difference between SSD and HDD:

Advantage of SSD over HDD:

Fast Booting Time: Solid State Drives can tap their back over the speediness they offer when there is a need for  lightning fast OS boot-up. A typical consumer-grade SSD can boot your Windows OS in almost half the time it takes for spinning disk.
Quick Read/Write: Around 500 megabytes per second for an average SSD in comparison to 150 megabytes per second by a hard drive. SSDs can be beneficial to you if you’re a graphic designer who uses heavy video editing software or some hard-core gamer on a spy mission.
Low power consumption: These flash storage devices are designed to use less in comparison to their traditional alternatives. So, your laptop’s battery will last longer and you’ll be able to save some cash on your electricity bill.
Reduced noise pollution: Rotating hard drives are known to make sounds which are sometimes annoying when you are in the middle of something that requires a lot of concentration power. SSDs can make a great difference on that note, you won’t even notice these silence loving drives in action.
Shape and Size: Their integrated circuit can be fitted in a compact casing, but they’re designed to fit in the pants of the conventional HDDs. They can be installed right out of the box in the same slot where your old hard drive sits.

Disadvantages of SSD over HDD:

Pocket burning price: Over the years, there has been a drop in the price of SSDs, but still, their magnetic disk grandpas are way cheaper. The most probable reason is that they’re not much popular like the hard drives and the technology needs to become more mature. Maybe in the coming years, we could see NAND flash replaced by some other memory type providing more affordable solid state drives in the market.
Data loss due to power-cut: Although, they’re more reliable than their spinning counterparts. Their sensitive nature is reflected when there is a power cut. Aborted write operations and even complete loss of data may be observed in the case of power interruption.
Limited life span: The biggest disadvantage of having an SSD is that it loses its writing abilities over time. This is because it is not possible to change a single bit value in an SSD. For that purpose, a large block of data needs to be erased and rewritten. When an erase cycle is performed for a cell, some charge is left in it. This charge increases the resistance of the cell and eventually, no current is able to pass through it. Thus, it becomes of no use.
I told you about wear leveling technique which is implemented to address this issue. But that’s not a full-proof solution, it only slows down the degradation process by making the SSD wear out evenly. It involves complex algorithms which are difficult to test exhaustively and may lead to the loss of data caused due to firmware bugs. One important thing to be noted is that this problem doesn’t affect the reading abilities of the SSD as no charge value is altered during a read operation.
One game-changing approach used by the manufacturers is a hybrid drive which is based on a method known as SSD Caching, not to be confused with cache memory inside SSD. In this, frequently used data and applications are copied to the SSD which acts as the cache memory. The HDD acts as the main storage device which keeps all the data. So, we have a lightning fast storage media along with gigs of space to store our music, movies, and games.
These non-mechanical drives may have the advantage of speediness over the spinning hard drives but the old horses are still cheaper these modern sports cars. New technologies like HAMR (Heat Assisted Magnetic Recording) are being developed for hard drives which will help them in retaining their throne in the market. Hard Drives have done a tremendous job in revolutionizing the computing world. With the pace of time and increased demand for high-speed storage media, SSDs pose themselves a potential candidate for the future of storage. Recently, Samsung has launched PM1633a 15TB SSD which could be seen as the initial steps to the bright future of these solid state media.

Tuesday 23 August 2016

Difference Between: Viruses, Worms, Ransomware, Trojans, Bots, Adware, Spyware and Spam

Viruses: They also have the ability to replicate themselves, but they do damage files on the computer they attack. Their main weakness lies in the fact, they can get into action only if they have the support of a host program, otherwise they’re just like a defeated warrior. They stick themselves to songs, videos, and executable files and travel all over the internet. W32.Sfc!mod, ABAP.Rivpas.A,Accept.3773 are some of the examples of Virus programs.

File Viruses
Macro Viruses
Master Boot Record Viruses
Boot sector Viruses
Multi-Partite Viruses
Polymorphic Viruses
Stealth Viruses
Worms: These programs have the ability to replicate themselves. Their sole objective is to increase their population and transfer themselves to another computers via the internet or through storage media, all the work is done like a top secret mission hiding their movement from the user. They don’t cause any harm to the computer, their replicating nature consumes hard drive space, thus slow down the machine. Some of the notable worms are, SQL Blaster which slowed the internet for a small period of time, Code Red took down almost 359,000 websites.
Ransomware: These type of malware alter the normal operation of your machine, thus barring you to use it properly. Thereafter, these programs display warning messages asking for money to get your device back to normal working condition.
Trojans: Basically, Trojans are no Viruses, and are not meant to damage or delete files on your system. Their sole task is to provide to a backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permission. JS.Debeski.Trojan is an example of Trojan.
They are named after the ‘Trojan Horse’ tale, in which Greeks entered the city of Troy with the help of a wooden horse which was meant to be a gift, but turned out to be a sweet poison, as depicted in the movie Troy.
some of the examples of Trojans.
Remote Access Trojans
Data Sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
Security Software Disabler Trojans
Denial-Of-Service Attack Trojans
Bots: Bots or Robots are automated processes that are designed to interact over the internet without the need of human interaction. They can be used for good and bad intentions. An evil minded person can create a malicious Bot that is capable of infecting the host on its own. After transmitting itself to the host device, a Bot creates a connection with central servers which act as the command centers for the infected hosts attached to that network, called Botnet.
These Bots can be seen as the advanced form of Worms, their infection rate and tactic is more effective than those of Worms.
Adware: Adware are used to display advertisements in the programs. They generally come attached with software programs that are free to use as they are the only source of revenue for the developers of those software programs. Adware can’t be completely called as Malware as they have no intention to harm your machine, they only track what advertisements you’re more interested in, so as to display the relevant advertisements on your screens.
Spyware: These programs also come attached with other freeware software, track your browsing and other personal details and send it to a remote user. They can also facilitate installation of unwanted software from the internet. Unlike Adware, they work as a standalone program and do their operations silently.
Spam: You get very irritated when you receive unwanted emails from unknown senders, these are called Spams or junk mails. And the process of flooding the internet with the same message is called Spamming, is done for the purpose of commercial advertising. These junk mails may sometimes contain Viruses or Trojans that enter your system as soon as you open the mail.

Different methods to repair corrupted SD card or pen drive

Change the drive letter

Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason the files on it can’t be accessed. To resolve this issue, you can assign the drive letter to your device.

Here are the simple steps to fix the corrupted pen drive or memory card by assigning a correct drive letter:
  1. Connect your storage media to your computer.
  2. Right Click on My Computer/ This PC. Click Manage in the drop down menu.
  3. Click Disk Management in the left side and wait for a few seconds so that Windows can load the Virtual disk service.
  4. Right Click on your storage media and click Change Drive Letter and Paths.
  5. Click the drive letter (it will turn blue) and click Change.
  6. Select the drive letter from the drop-down list. Click Ok.

Try to use it on another PC

Maybe the issue is specifically on your PC. Try connecting your SD card or pen drive to another computer. Hopefully, it may work and you’ll be able to backup your data from it.

Reinstall the drivers

There are times when the drivers that runs your pen drive get corrupted and our PC will not be able to detect your storage media. You can reinstall drivers by these simple steps:

  1. Right click My Computer/ This PC. Click Manage.
  2. Click Device Manager on the left side.
  3. Double-Click Disk Drives in the list. Right Click on the name of your pen drive.
  4. Click Uninstall. Click Ok.
  5. Disconnect your storage media and restart your PC.
  6. Connect your pen drive again. Your PC will detect it.

Repair corrupted SD card or Pen Drive using Windows Explorer

This is the most commonly used procedure to repair a connected storage media to your computer.
  1. Open My Computer or This PC.
  2. Select the corrupted drive and Right Click.
  3. Click Format in the drop down menu.
  4. Click Restore Device Defaults in the popup window.
  5. Click Start to begin the format process. You can uncheck the Quick formatoption if you want the computer to deep scan the drive/card for errors but this will take time. So, uncheck it only if you fail in the first attempt.
  6. Click Ok in the next dialog box which will warn you that the data will be lost. The format process will complete in a few moments and you will have your error free SD card or pen drive.

Repair corrupted Pen Drive or SD card using CMD

This process involves Windows command prompt which is commonly known as CMD. In this, you have to enter some CMD commands and Windows will forcefully format your corrupted pen drive/SD card.

  1. Connect the corrupted pen drive or SD card to your computer.
  2. Hover your mouse on the Start button and Right Click.
  3. Click Command Prompt (Admin). A CMD window will open.
  4. Type diskpart and press Enter.
  5. Type list disk and press Enter. A list of all the storage devices connected to your computer will be displayed.
  6. Type select disk <the number of your disk> and press Enter. (Example: select disk 1). Important: Make sure you enter the number correctly. Otherwise, you may format your internal hard drive. You can type list diskagain to check whether you are going correctly. There will be a star (asterisk symbol) before the name of the selected disk.
  7. Type clean and press Enter.
  8. Type create partition primary and hit Enter.
  9. Type active.
  10. Type select partition 1.
  11. Type format fs=fat32 and press Enter. The format process will finish in a few minutes. You can write ntfs instead of fat32 if you want to carry files larger than 4 gigabytes. Don’t close the CMD