Skip to main content

Featured Post

Google Ends the 16GB Android Era: What the New 32GB Minimum Means for Everyone

Google has quietly but decisively ended the era of 16GB Android smartphones. With the rollout of Android 15, any phone that wants to ship with Google apps—including essentials like the Play Store—must now have at least 32GB of internal storage and 2GB of RAM. Devices that fall below this threshold are relegated to the lighter, stripped-down Android Go Edition, or lose access to Google Mobile Services (GMS) entirely This change is more than a technical footnote. It signals a major shift in the Android ecosystem, with far-reaching implications for developers, manufacturers, retailers, marketers, and consumers alike. Why Google Raised the Bar Apps Are Heavier, Expectations Are Higher The days when 16GB could comfortably house the Android OS, a handful of apps, and some photos are long gone. Modern apps—especially those with rich media, AI features, and offline capabilities—are significantly larger. Even so-called “lite” apps have grown in size, and the Android system itself continues to ...

How to remove Write protection from a Flask disk using command prompt

When a disk is write protected, you are only left with the optio to view its content. The Flash disk becomes uneditable(readonly form)

You can clearly see that the device has free space when you view it in the list of drives in your pc but you can't access it.

For normal write protection locks, it is easy to remove. It becomes harder when your flask disk has a virus.

This guide will help you remove write protection from any flash disk in 4 or 5 simple steps.


1. Insert your flash disk to your PC. Ensure it is detected.

2. Go to your windows search page and type command prompt

3. Select run as administrator from the options listed below the app name

4. When the commn prompt window opens, type "diskpart" and press enter.

5. Type "list disk" and press enter. This displays all the disks in your system

6. A list of disks will be displayed as shown:









7. Type "select disk {number" For example  "select disk 2" if it is the disk you would like to remove write protection from. You will get a confirmation "Disk 2 is now the selected disk."

8. Type "attributes disk clear readonly" and press Enter to remove the write protection.

You will get a confirmation on successful removal of write protection. 









9. Type exit to close the command prompt window


Note: There are cases when this process fails. If that happens, use third party applications like EASEUS to format your drive and recover data.



Comments

Contact Form

Name

Email *

Message *

Popular posts from this blog

This is why you need to buy an external drive: Ow-tech solutions

Outline of the Article Introduction to the importance of data backup Risks of relying solely on internal storage Advantages of external drives for data backup Storage capacity Portability Security Types of external drives available HDD (Hard Disk Drive) SSD (Solid State Drive) Hybrid drives Considerations when choosing an external drive Capacity requirements Speed and performance Compatibility Comparison with cloud storage options Security concerns Internet dependency Tips for effective data backup using external drives Regular backups Organizing files Encryption and password protection Cost-effectiveness of external drives compared to other backup solutions Conclusion Heading Subheading Introduction Importance of data backup Risks Relying solely on internal storage Advantages Benefits of external drives for backup Types HDD, SSD, Hybrid drives Considerations Capacity, speed, compatibility Comparison With cloud storage options Tips Effective backup strategies Cost-effectiveness Externa...

Possible causes of Hacking and how to stay safe from them - ow-tech solutions

Possible causes of Hacking and how to stay safe from them How many times have you heard someone complaining about mysterious posts on their social media platform? Probably several. If you are lucky to have not experienced any of these things, it's time to find out what puts you at risk of being a victim.  There are around four or five main instances that can get you into the harsh hands of hackers. Let's get to it. 1. Insecure websites There are tons of unsafe websites out there with content that can drive you right into the hands of hackers. When you visit such websites and submit personal data or click on the promotional pop-ups of links, you'll be getting into one of those traps.  The links to such sites are common on social platforms. You are promised huge gifts or rewards upon clicking on them.  I hate to say it but these hackers have taken advantage of pornography and gaming websites where they link their pages. These sites have many visitors and are a great spot to...

This is what I do to take good care of my Headphones - Ow-tech Solutions

 Buying a headphone was one of the things I was excited about when I got my first one. Having used earphones for a long time and getting tired of the frequent cable damage, I had to make a change. The headphone was a very cheap one, the P47 wireless headphones, which is one of the most common and cheapest headphones today. I had no money but wanted to get the experience. On getting the headphone, I became a celeb in my neighborhood, all eyes on me. Let's drop the fantasizing. I used the headphone for slightly over a year. By then, the Bluetooth function was no more since the battery had been damaged, one handle was broken and patched up with insulating tape and the speakers had been repaired several times. I had no idea how to take care of the headphones. I literally learned my lesson the hard way.  From my experience, these tips can be helpful if you want to take good care of your headphones and use them for a long time. 1. If wireless, do not overcharge. If one thing is sure...

Sponsored Links

View More