Directory Damage, what can be used for Disk Repair and Virus Detection?

Hi,
My eMac is acting up. Yesterday I started getting these messages that I needed to restart my computer (message was in a brown box window with an icon of a start up button in background).
I did the disk repair using Start up CD and it came back with "invalid key......." or something like that, and when I tried to repair it, it tried to repair the B-Tree's but then said it could not repair the problem.
I have Diskwarrior 3.03 Build 39, on a CD and on my FW Ext HD, which has a clone of my Mac HD.
Diskwarrior could not produce a graph of Mac HD because the directory was damaged. When I did a rebuild it hung on step 9 comparing directories, said there was 7 million + tests. ( I let it hang on step 9 for 15 hrs. to see if maybe it was just taking a long time due to corrupt directory). I finally clicked on Skip and got to the report page. I could do a preview, but the replace button is greyed out. When I was comparing the sizes of each folder, in both preview and original, I got a can not calculate error message on a few of them. The size of Mac HD in preview compared to the one in Original was different by 4 gbs. A week ago I repaired the Mac HD and did a Diskwarrior directory repair on all my HD's.
Before I do any reformatting of HD or other drastic measures, I was wondering what is safe to use for disk repair and virus detection. I know there is Norton System Works 3.0, Norton AntiVirus and TechTool, are these the only ones? Are these safe to use? Are there any other programs that can repair directory damage?
Thank you in advance,
Deb
eMac 2005 1.42GHz Combo Drive 256MB Tiger 10.4 75GB   Mac OS X (10.4)   Western Digital (WD) 160GB FW Ext & WD 320gb Media FW Ext, Creative Speakers

The long-standing rule of thimb has been that if Disk Warrior can't repair a mungled disk directory, then you're looking at reformatting or replacing the hard drive. Since this is a week-old hard drive, I'd suspect the replacement hard drive is itself bad. It might save you grief in the long run to contact the vendor who sold you the drive and inquire about their warrenty. You might want to first run the file system check utility fsck as described in Using Disk Utility and fsck
Directory repair and antivirus protection are different critters. Norton AV is mostly safe (if you don't mind it's track record of false positives) and is used by the IT department at the lab where I work. Norton SystemWorks, AKA Disk Doctor Kervorkian, is most assuredly NOT safe. For every poster reporting something nice about it, you'll find at least 2 dozen cursing it. It has a known track record of detecting problems no other utility finds and of "repairing" drives such that nothing can then read or repair the drive short of low-level reformatting (and occasionally even that fails).
Tech Tool Pro 4 has a good reputation, as does Drive Genius. Tiger OS X 10.4.2 and later include a version of Disk Utility that can for the first time also make effective B-tree and keys out of order and overlapped extent repairs. Still, my personal gut feeling is that if Disk Warrior is choking on the hard drive, you're looking at reformatring while zeros the drive (zeroing should detect and map out bad physical secotrs).
You can also refer to Disk First Aid: What to do when it finds an error and to Handling "overlapped extent allocation" errors reported by Disk Utility or fsck

Similar Messages

  • What can I use for a low battery warning on a Mac Book OSX10.8?

    What can I use for a low battery warning on a Mac Book OSX10.8?

    What you should see above all your windows when your battery gets to low.

  • Appleworks does not work with mountain Lion.  What can I use for drawing and painting?

    Appleworks does not work with mountain Lion.  What can I use for drawing and painting?
    MacBook
    Marian

    Please see this article which examines various possible alternatives to AppleWorks:
    http://rfwilmut.net/aw

  • What can be used for replacing SELECT SINGLE *   ?

    What can be used for replacing SELECT SINGLE *  for improving the performance in the following statements?
    SELECT SINGLE * FROM REGUV
       WHERE LAUFD = G_WLAUFD "RUN DATE ,SY-DATUM
         AND LAUFI = P_LAUFI.  "IDENTICATION NO
    SELECT SINGLE * FROM T100
       INTO CORRESPONDING FIELDS OF G_T100_WA
        WHERE SPRSL = G_T_IALLMESS-MSGSPRA
          AND ARBGB = G_T_IALLMESS-MSGID
          AND MSGNR = G_T_IALLMESS-MSGNR.
    SELECT SINGLE * FROM TBTCO
       INTO CORRESPONDING FIELDS OF TBTCO
        WHERE JOBNAME = FS_JOBNAME.

    If you need all the fields and you know that only one record exists then u need to use select single * only. You can improve the performance by specifying key fields in the where clause of select statements. If the structure of the work area or internal table in which you are fetching the data is same as that of the database table then no need to use corresponding fields clause.
    Best Regards,
    Vibha
    *Please mark all the helpful answers

  • Is variable offsets can be used for characteristics, text and formulas?

    hi all,
    can anyone let me know whether variable offsets can be used for characteristics, text and formulas.
    if so cany one send me examples of using offsets to my email id [email protected]
    regds
    hari

    You use offsets on dates (0CALMONTH, 0FISCYEAR, 0DAT and so on) and of course the corresponding texts.
    If you have 0CALMONTH in your query and you want to do the same thing not only for the current month but for the past twelve months, they you just minus 1, 2....11,12 for each selections, and at the same time you can create text variable for the description of each month.
    thanks.
    Wond

  • What are the uses for Macbook pro and Macbook air?

    Hi! I am deciding between MBA and MBP and need to know what the different uses for each one was. Like what would you use the MBA for and what would you use the MBP for?? All opinions welcome!!

    They're actually pretty comparible in what they can do if you're talking about the base model of both (say 13") with 4GB RAM. At that level, the Pro has the advantage if you're going to watch or burn DVD's or CD's, as the Air has no optical drive. But otherwise, they're pretty much the same--full-sized, backlit keyboard, camera, beautiful screen, etc. If you're going for more than a basic 13" Pro, then things start to change. For example, you can get up to 8GB RAM on the Pro, and a huge hard drive, you can also get a 15" or 17" size. You will be paying a lot for these, but, obviously, if you're going to be working on, say, making videos (which you may then want burn onto disk) the Pro is very much what you'll want.
    However, if you don't need or want any of that--if, for example, you plan to do the usual programs (word processing, games, web surfing, music, etc.), then you really won't see much difference between the two. At 4GB RAM and a 13" screen, the big difference is going to be thickness and weight, not power. And in this the Air will have the advantage--it's really amazingly slim, light and with a SSD, faster (you pay extra--a lot extra--to get SSD on the Pro).
    Just to make the point, I switched from a 13" Pro to an 11" Air. My hard drive size is half what it was with a Pro, but I was barely taking up half of that amount on the Pro, and so have plenty of room on my 128GB Air (you can get 256GB for the 11" if you order it online). Absolutely everything my Pro did, my Air does (sans optical drive), only faster and lighter and more compact--meaning it takes up less table space, slips in and out of my bag faster, balances on my lap easier, etc. But there was no interruption of service--I switched pretyt seamlessly from 13" Pro to 11" Air.
    The Pro offers you more options for power, screen size, HD size and optical drive. But it's really pretty surprising how few of us need that much power, that much room, or the optical drive. It's very freeing to realize that less can be more than enough.

  • What is the use for lock object and how to use the lock objects

    Hi Guru's,
    I am new to ABAP .Can you please clarify the that what is the use of lock object and how to use the loct object .what is use of the Deque & Enque  function modules .

    hi ,
    below are some minfo about lock objects :
      Lock Objects
    These types of objects are used for locking the access to database records in table. This mechanism is used to enforce data integrity that is two users cannot update the same data at the same time. With lock objects you can lock table-field or whole table.
    In a system where many users can access the same data, it becomes necessary to control the access to the data. In R/3 system this access control is built-in on database tables. Developers can also lock objects over table records.
    To lock an object you need to call standard functions, which are automatically generated while defining the lock object in ABAP/4 dictionary. This locking system is independent of the locking mechanism used by the R/3 system. This mechanism also defines LUW i.e. Logical Unit of Work. Whenever an object is locked, either by in built locking mechanism or by function modules, it creates corresponding entry in global system table i.e. table is locked. The system automatically releases the lock at the end of transaction. The LUW starts when a lock entry is created in the system table and ends when the lock is released.
    Creating Lock Objects
    Lock object is an aggregated dictionary object and can be defined by using the following steps:
    o From initial data dictionary screen, enter the name for the object, Click Lock object radiobutton and then click on Create. The system displays a dialog box for Maintain Lock Objects screen
    o Enter short text as usual and the name for primary table.
    -Save
    -Select Tables option
    From this screen you can:
    Select secondary tables, if any, linked by foreign key relationship.
    Fields for the lock objects. This option allows you to select fields for objects (R/3 system allows locking up to record level). Lock object argument are not selected by user but are imposed by the system and includes all the primary keys for the table.
    1) Exclusive lock: The locked data can only be displayed or edited by a single user. A request for another exclusive lock or for a shared lock is rejected.
    2) Shared lock: More than one user can access the locked data at the same time in display mode. A request for another shared lock is accepted, even if it comes from another user. An exclusive lock is rejected.
    3) Exclusive but not cumulative: Exclusive locks can be requested several times from the same transaction and are processed successively. In contrast, exclusive but not cumulative locks can be called only once from the same transaction. All other lock requests are rejected.
    Also, last but not the least, locking the object is logical (locking with any enqueue ) .so, you have to use the lock object while trying to access from second program .
    reward if helpful ,
    Regards,
    Ranjita

  • What can i use for adobe flash player i cant do my face book and i cant see some movies either can anyone help me please as i am new to this thanks

    Hi can any one please help me.... I cant do my face book or watch some movies. My ipad2 needs adobe flash player and it wont allow that application to be downloaded has any one got any suggestions please. Please help me as im a newbie at this thanks..

    There is no flash player for iPad and likely wont be in the near future. Some people use Skyfire and other apps as ways to view flash on a remote server, but reviews are mixed.
    Facebook works fine on the iPad browser, but you can also use dedicated apps. Games such as Farmville are also available in app forms, as is YouTube. What movie sites are you trying to view?

  • JSF 2 composite comp. backing class: what can I use for the decode method?

    Hello, everybody!
    I want to convert a JSF 1.2 custom component to a JSF 2.0 composite component. This JSF 1.2 custom component uses a renderer where I take some actions in the decode method. So, I would like to know what I could use to replace the well known decode method when writing a backing class for a JSF 2.0 composite component.
    Thank you.
    Marcos
    Edited by: Marcos_AntonioPS on May 21, 2010 11:59 AM

    Let's try with org.havi.ui.HStaticText

  • SP 2013 Client Object Model: What credentials to use for Office 365 and sites behind ADFS 3.0?

    I'm using the SharePoint 2013 Client Object Model to access a site that is either in Office 365 or behind an ADFS 3.0 login screen, is it sufficient to use the new SharePointOnlineCredentials credentials
    or do I need other types of credentials for the sites behind ADFS 3.0 ? Is so, what type of credentials would I use for the sites behind ADFS 3.0?
    using (ClientContext ctx = new ClientContext(siteUrl))
    ctx.Credentials = new SharePointOnlineCredentials("some user", "a secure string password");
    while (ctx.HasPendingRequest)
    ctx.ExecuteQuery();
    // etc.

    Hi,
    According to your post, my understanding is that you want to know the ways to get credential either in Office 365 or sites behind ADFS 3.0.
    For Office 365, you can use SharePointOnlineCredentials Object to get credential. For SharePoint sites behind ADFS 3.0, you can use NetworkCredential Object:
    ctx.Credentials = new NetworkCredential(UserName, Password, Domain); 
    The link below will provide more information about using the ADFS FedAuth Token programmatically through the SharePoint Client Object Model:
    http://samirvaidya.blogspot.com/2013/05/using-adfs-fedauth-token.html
    Best regards
    Patrick Liang
    TechNet Community Support

  • Can't use normal disk repair tools on iSCSI target?

    Hi all,
    I wonder if anyone can help?
    We are using a QNAP NAS box attached by iSCSI to a single Mac running Snow Leopard (normal not server) running ATTO's Xtend SAN iSCSI initiator to mount a single 12TB iSCSI volume.
    The single volume (which is now named 'fixme') has developed some index issues that need repairing.  However both Disk Utility and Diskwarrior fail when run, saying the disk could not be unmounted as it is 'still in use'.
    No other apps are running (I've even tried quitting Xtend SAN) and I've been using "lsof /Volumes/fixme" in terminal to list what files are accessing that volume - apparently none.  I've disabled spotlight indexing too just in case and am now stumped.   I tried booting into safe mode but Xtend SAN doesn't like that (get java errors, so apparently something's not loading it needs).  Tried a second mac, same result.
    Basically it appears we just can't repair this volume.
    Screenshot here:
    http://dl.dropbox.com/u/6545060/Hostedfiles/Screen%20shot%202012-01-07%20at%2012 .15.16.png
    Anyone got any ideas?
    Thanks - Jon

    Hi all,
    I wonder if anyone can help?
    We are using a QNAP NAS box attached by iSCSI to a single Mac running Snow Leopard (normal not server) running ATTO's Xtend SAN iSCSI initiator to mount a single 12TB iSCSI volume.
    The single volume (which is now named 'fixme') has developed some index issues that need repairing.  However both Disk Utility and Diskwarrior fail when run, saying the disk could not be unmounted as it is 'still in use'.
    No other apps are running (I've even tried quitting Xtend SAN) and I've been using "lsof /Volumes/fixme" in terminal to list what files are accessing that volume - apparently none.  I've disabled spotlight indexing too just in case and am now stumped.   I tried booting into safe mode but Xtend SAN doesn't like that (get java errors, so apparently something's not loading it needs).  Tried a second mac, same result.
    Basically it appears we just can't repair this volume.
    Screenshot here:
    http://dl.dropbox.com/u/6545060/Hostedfiles/Screen%20shot%202012-01-07%20at%2012 .15.16.png
    Anyone got any ideas?
    Thanks - Jon

  • Asset used for both repairs and asset under construction

    i had doubt for example if we purchase cement bag through po and half of this is used for repairs of old building and remaining half is used for construction of new plant which is to be capitalised how this can be done in sap.
    thanks in advance.........................

    Another solution would be to use WBS elements.
    Have WBS elements for the separate projects.
    Code part of the PO to the construction WBS and part to the expense WBS, if you know in advance that half the bag will require a different account assignment.
    If you do not know until after acquisition that half the bag was utilized for repair, for example, reclassify that amount from investment measure WBS/AuC to expense cost center.  You can do this either before or after Project System settlement into investment measure.
    The audit trail is not perfect however, since the acquisition transaction (PO based materials document) still believes the entire cost amount was to be capitalized.
    Not a problem if immaterial, but maybe consider going back and correcting MM transactions if material and if policy procedure requires.
    Regards

  • What is everyone using for managing iPads and iPhones for an Active Directory network. We also have a BES server

    I am seeking a solution to manage iphones and ipads for my enterprise. A few are currently being used. I will need to go back and shut them down to gather the appropriate information necessary to manage them going forward. Looking for manageability, security remote wipe logging. Pretty much what I can do with a Blackberry on a bes seerver. I see several products available. Can someone point me to one that they are happy with?

    The Identity Service for Active Directory 10.3.0 is only available on Windows because it uses .Net functionality to work with AD. Even if you run everything else on Linux, you would still need a Windows server for the AD Identity Service.
    You can download it from edelivery.oracle.com as part number V14368-01. You can also find it on that site by performing a media pack search for:
    Select a Product Pack: Oracle Fusion Middleware
    Platform: Microsoft Windows (32-bit)
    Then navigate down into "Oracle® Application Server 10g Release 3 (10.1.3) Media Pack v31 for Microsoft Windows".
    The package is "Oracle WebCenter Interaction Identity Service for Active Directory 10.3.0 for Microsoft Windows".

  • HI WHAT CAN I USE FOR CLEANING UP DUPLICATES FOR A MAC OS X 10.6.8, HI WHAT CAN I USE FOR CLEANING UP DUPLICATES FOR A MAC OS X 10.6.8

    Hi, does anyone know of any free software like Gemini that i can use to clean up my duplicates for Mac OS X Version 10.6.8?

    Duplicate what? Documents? Photos? Music? Something else? If you're talking photos or music are these managed by iPhoto, Aperture, Lightroom or similar?

  • What are you using for Fan speed AND temp monitor?

    Thanks to Bosskiller, my rig seems to be running a bit stabler now!  Knock on wood.  Is there any program other than MSI's core center that monitor fan speed AND temp?   I used to use MBM but it's no longer being supported and CoreCenter doesn't seem all that popular here? 

    Quote from: BOSSKILLER on 25-September-08, 00:42:40
    http://www.cpuid.com/hwmonitor.php
    http://www.alcpu.com/CoreTemp/
    Actually how accurate is the temp reading on HWMonitor for your MSI board?  One thing I noticed is that w/ Coretemeter the temp reading was around 48-50c on Rig#1 and almost 58-60c on Rig#2 (That's my HTPC w/ EXTREMELY tight spacings so still work in progress as far as cooling's concern!) but using HWMonitor I got 31c CONSISTENTLY on both rigs!     I'll love to think that I'm indeed running this cool but feeling the exhaust air, I think this 31c reading is not real...

Maybe you are looking for