![]() ![]() ![]() Reply to this email directly, view it on GitHub, or mute the thread. You are receiving this because you commented. Supporting the format opcode is optional, so it sounds like controller chose not to support it, and that's okay from a specification standpoint. That's 2001 in hex, and according to the spec, that's an invalid opcode error. That looks like you're using an older version of this tool, so I'm going to assume 8193 is in decimal. Subject: Re: NVME Admin command error: INVALID_OPCODE(2001) ( #84) Same behavior with other Samsung SM/PM version SSDs?Ĭc: Errol Heiman (eheiman) Comment Issuing this command to this SSD on ASUS Z97 with same OS completes successfully. NVME Admin command error:INVALID_OPCODE(2001) Using the very latest version of the tool gives this Desktop]# nvme format /dev/nvme0n1 Here's a similar question which may be of relevance.Thank you for this reply. However, for the truly paranoid, even that may not be enough, as it has been revealed that the NSA can and do intercept hardware deliveries en-route, to be infected with malware. This would mean the motherboard and the hard drive, at a minimum - although be aware that any privileged hardware with any sort of firmware is a possible target - e.g. With that in mind, the easiest and most reliable way to have a high chance of eradicating malware, is to replace all items of hardware which contain any sort of firmware and which could have come into contact with malware. Malware can infect the BIOS (see also the Schneier link above). As we now know from the Snowden leaks, these methods are actively used by the NSA, and probably other governments and criminal entities around the world.Įven discarding the hard drive and replacing it with a new one is not a sure way to remove malware. Malware can and does survive formatting a hard drive e.g. I'm adding this answer to provide an alternative to some of the misleading (and in some cases, totally incorrect) answers on here. I should just point out and warn you that what I say above is mainly true, however it is possible that malware was installed by taking advantage of a flaw / security hole on your machine - For example, a while ago, there was a bug with WMF images, so if you just selected a picture that had the virus attached, it was possible that Windows would get infected whilst generating the preview. When a file is in the recycle bin, it is not really deleted and can still be run (in fact, some viruses hide out in the recycle bin system folder).Įven if the file has not yet been written over, a proper delete (NOT recycle bin) would mean that it cannot be executed. ![]() The first simply moves it to the recycle bin (where you can then choose to delete), The second basically skips out the recycle bin. exe that contains code which will install a backdoor, the file itself is classed as a virus but will do no damage unless it is run.Īs for formatting your hard drive / reinstalling Windows - if you copy all your data back without knowing where/what the virus is, there is a chance it still there, but as pure data, not doing any damage until it is executed. Malware in general is only a problem when it is run.įor example, If you have a. But if you use a disk wiping utility like DBAN or write zeroes to the drive, you are guaranteed to be rid of the malware, unless you get reinfected from the original source or some other infected device.īefore you wipe your hard drive, be sure to backup all your data, and from that point forward, treat the entire backup as a possible source of infection, until you've thoroughly scanned all the backed up files with several top-rated antivirus/anti-malware tools. Modern malware can spread via USB flash drives and network shares, and is sometimes self-propagating (that is, it is executed via some automated mechanism and it and replicates on its own, without your intervention).įor the most part, if you reformat your drive, you should be safe. ![]() As removable media has advanced, so have viruses, trojans, worms, and other malware. Now MBR viruses seem to be less common, but they do still exist.īack in the day, MBR viruses spread via floppy disks. In addition to what the others have said, used to be a lot of MBR viruses that you couldn't remove simply by reformatting-you had to also overwrite the master boot record. ![]()
0 Comments
Leave a Reply. |