How to enable and disable write protection in unilroin USB flash drive and others



Whether you call it USB stick, pen drive, jump drive, or thumb drive, there are several ways to turn write protection on and off for both your device and its contents. The approach that works best varies from user to user based on their needs. To proceed, select a method from the list below, read the description, and follow the instructions.

Write protection switch

Some USB flash drives have a write-protection switch on the side or bottom. This mechanism is useful for keeping the contents of you drive safe from malware when you need to view them on a public computer. If your device has this switch, move it to the "Lock" position. This action effectively sets all files, and the device itself, to read only mode.

Using DiskPart to change read-only settings



You can use the Windows DiskPart command line utility to enable or disable read-only mode on your removable disk.

1. Press Win + R to open the Run box . Type
diskpart and press enter.

2. If you receive a User Account Control prompt asking you for permission to continue, click Yes.
3. At the DISKPART> prompt, type list disk and press enter.

From the size of the disk, you should be able to figure out which one is your removable disk. In this example, we know that Disk 1 is our removable USB thumbdrive because its size is listed as 14 GB.

4. Select your removable disk with the select disk command. In this example, we want to work with disk 1, so the command is select disk 1 .



5. You can list the attributes of the disk with the command attributes disk.

6. To clear the read-only attribute (making the disk writable), use the command attributes disk clear readonly .


Or, to set the read-only attribute (making the disk write-protected), use the command
attributes disk set readonly.


7. When you are finished, type exit to quit the program.

Protecting individual files


You can always change the write protection on individual files and folders on your removable disk.

This article is sourced from:
https://www.computerhope.com/issues/ch001617.htm

Here is the end of this tutorial, we know the type of this tutorial needs to welcome question and answer segment we therefore ready to answer any question, use our "Post a comments" box below to ask your questions  











No comments: