hoc
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
hoc [2021/04/24 17:08] – [Benchmark your cards] Walter Schulz | hoc [2021/05/16 22:09] (current) – [Fight Flash Fraud] Walter Schulz | ||
---|---|---|---|
Line 4: | Line 4: | ||
=== Benchmark with your PC === | === Benchmark with your PC === | ||
- | {{: | + | {{: |
+ | {{: | ||
- | Ipso lorum | ||
{{: | {{: | ||
Line 15: | Line 16: | ||
{{: | {{: | ||
==== Fight Flash Fraud ==== | ==== Fight Flash Fraud ==== | ||
+ | |||
+ | The problem: | ||
+ | Product forgery sadly is wide spread among flash memory devices. And purchasing from " | ||
+ | Memory devices can easily be manipulated and your camera and your PC are not designed to detect that. Both devices expect all connected memory devices to be trustworthy and your camera and PC will act like all memory device information is good as gold. If a scammer overwrites a flash card's internal capacity information to sell a 16 GByte card as a 128 GB (for example) your PC will act like the card capacity is 128 GB. \\ | ||
+ | And this will happen: Everything is just perfect until the card's real capacity (in this case: 16 GB) is reached. But every byte beyond that limit will be written **from the very beginning** of the card. Overwriting essential information and most likely overwriting all the pics/ | ||
+ | |||
+ | What to do? It is strongly recommended to verify card integrity with tools like h2testw or F3/F3 QT right after purchase. Those tools are freeware and easy to use. | ||
+ | |||
=== Windows: h2testw === | === Windows: h2testw === | ||
- | === macOS/OS X/Linux: F3/F3 QT === | + | |
+ | German IT magazine c't published h2testw (freeware) to give Windows users a chance to detect flash fraud. This is the [[https:// | ||
+ | After downloading zipped file you can expand contents anywhere. H2testw.exe runs without installation and does not require admin priviledges. Readme.txt in english is included. | ||
+ | |||
+ | Run H2testw.exe\\ | ||
+ | {{: | ||
+ | Select English to change user interface language.\\ | ||
+ | Select target device = your memory card.\\ | ||
+ | Data volume: all available space. (Number in brackets may be different) | ||
+ | |||
+ | Click button "Write + Verify" | ||
+ | {{: | ||
+ | This warning is just for information. This very small area not tested will most likely not affect fraud detection. Scammers usually don't manipulate device info by a fraction that small. ;-) \\ | ||
+ | |||
+ | After confirming " | ||
+ | {{: | ||
+ | Test run can take quite a while. H2testw is not optimized for pure write/read speed. In most cases data transfer rates will be around 30 percent slower than maximum sequential write limit. | ||
+ | |||
+ | After write cylce h2testw will automatically proceed with read/verify cycle.\\ | ||
+ | {{: | ||
+ | |||
+ | Test result for a card not manipulated by a scammer: | ||
+ | {{: | ||
+ | As stated in test results you will find card filled with *.h2w files. You have to delete them manually. | ||
+ | |||
+ | **If h2testw testrun ends with an error message your card may be manipulated!** Verify test results by a second run and - in case second run gives the same results - contact your seller for refund/ | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | === macOS/OS X/Linux: F3/F3 QT/F3X === | ||
+ | |||
+ | The ruthless internet community created their own versions for Linux and macOS/OS X. | ||
+ | **Linux users** may find f3 included in their distribution or may want to compile their own version from source. F3 is open source. Description will be find here: [[https:// | ||
+ | I will not repeat all the steps here because I think you know what you are doing and a proper documentation already exists! | ||
+ | |||
+ | **Mac users** may not be feeling comfortable compiling on their own. For those users a compiled program is available. | ||
+ | |||
+ | |||
+ | |||
+ | {{: | ||
+ | |||
+ | \\ | ||
+ | |||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | \\ | ||
+ | {{: | ||
+ | |||
+ | \\ | ||
+ | {{: | ||
+ | |||
+ | \\ | ||
+ | {{: | ||
+ | |||
+ | \\ | ||
+ | |||
+ | |||
+ | {{: | ||
===== Data recovery ===== | ===== Data recovery ===== | ||
===== ExFAT ===== | ===== ExFAT ===== | ||
Line 29: | Line 100: | ||
Do not try to use these cards/ | Do not try to use these cards/ | ||
==== First Eye-Fi generation ==== | ==== First Eye-Fi generation ==== | ||
- | They won't work at all. ML's process of checking for a bootable card is incompatible with EyeFi-firmware (yes, your Eye-Fi card has its own firmware). If you want to use first gen Eye-Fi with a camera with ML bootflag set: Nope, it wont work at all. You have to uninstall (=remove cam's bootflag) before using such cards. \\ | + | They won't work at all. ML's process of checking for a bootable card is incompatible with old EyeFi-firmware (yes, your Eye-Fi card has its own firmware). If you want to use first gen Eye-Fi with a camera with ML bootflag set: Nope, it wont work at all. You have to uninstall |
ML devs aren't able to fix this issue.\\ | ML devs aren't able to fix this issue.\\ | ||
- | All other WiFi cards will work just fine! | + | All other tested |
==== Sony 94MB/s 32 GB SDHC ==== | ==== Sony 94MB/s 32 GB SDHC ==== |
hoc.1619276909.txt.gz · Last modified: 2021/04/24 17:08 by Walter Schulz