473,396 Members | 1,754 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

files on my new flashdrive

I recently bought a flashdrive, just a cheap one from the dollar store, 16 gig, nothing fancy. I loaded a file onto it to print off for later and when i plugged it into my computer, there were three or four other files on it aside from the one that I had loaded. Now, I am what you may call severely technologically challenged, but I thought that the only file I should have seen was the one I had put on there? There was one labeled samsung something, which none of my devices are samsung devices. When I opened the folders there was a different code in each folder and one was in chinese I guess, it was asking my if I wanted to translate, but when i selected English, nothing happened. Anyways, my question is this, are there supposed to be other files on a brand new flashdrive if I did not upload them myself? If not, what are those codes for???
Mar 16 '19 #1
4 3204
dev7060
636 Expert 512MB
Well, to be honest I have never experienced anything like that with any of my flash drive. I have used Sony and San Disk but never found anything extra other than the files I put there.
Also, I have seen this video https://youtu.be/26fN2ANjQNs?t=315 , where there is a file present already. I guess, it may happen when you buy stuff from different sources other than the official one.
I would suggest to format the drive and scan it with an antivirus before proceeding to do anything. Also, you can always refer to their customer support for any query. They can explain you the things much better.
Mar 16 '19 #2
Luuk
1,047 Expert 1GB
@dev7060: I do not think the dollarstore is giving much 'customer support' (but I might be wrong)

I have seen some software on an USB device. It was some software to encrypt the contents of this drive. I did see it as an 'extra' feature., but I never used it.

If you do not trust it, always format the (usb-)drive
Mar 16 '19 #3
Thanks you guys. My concern is that my boyfriends phone appears to have been hacked somehow and it IS a samsung, but im not sure how any files from his phone would have ended up on his flash drive when the phone hasnt been connected to any of the same devices. Weve gotten him a different phone ans set up all new accounts but that doesnt seem to have helped anything. Im not real sure what to do or where to start with all of this.
Mar 17 '19 #4
gits
5,390 Expert Mod 4TB
well - i think the issue with the flash drive and the phone seem more to be 2 different issues to me. i bought drives as well where some software was stored on - and it was little tools for backup-help or encrypting content on the device as was told already. i never use such and format new drives right away out of paranoia not using software that i dont know where it comes from.

having said that - of course you could construct a scenario where a hacked phone can have something to do with such. imagine, for example, your phone is connected to a pc for loading - it basically has the chance to communicate with that device - if not a 'load only' option was chosen - then the device does have access to the pc and/or the pc has access to the device - depending on how the security settings are, there is a potential to corrupt either device that way.

if anything is transfered from the device - may it be over usb, bluetooth or cloud - it is a potential risk - since what is transfered can be corrupted and thus can corrupt the receiving device as well. Same goes for anything transfered to the device - over the mentioned ways or from the app stores or any other sources.

a hacked account is usually a much worser scenario - since if an attacker gets access to a user's data in the cloud and is able to corrupt the data there - this can lead to an 'infection' of anything that has access to that data - since the nature of that is - to be used as a kind of central data-store. So a user connects with all his/her devices to that (because thats why users use the cloud) - thus it can lead to a corruption of all that devices as well. securing any account is thus one of the most important things all users should be aware of.

a relatively good article can be found here:

https://www.techlicious.com/tip/how-...s-been-hacked/
Mar 18 '19 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Mike | last post by:
I am sure that I am making a simple boneheaded mistake and I would appreciate your help in spotting in. I have just installed apache_2.0.53-win32-x86-no_ssl.exe php-5.0.3-Win32.zip...
5
by: Anand K Rayudu | last post by:
Hi all, I am trying to find a way to get the files recursively in a given directory, The following code is failing, can some one please suggest what could be problem here from os import...
44
by: Xah Lee | last post by:
here's a large exercise that uses what we built before. suppose you have tens of thousands of files in various directories. Some of these files are identical, but you don't know which ones are...
0
by: Tom Lee | last post by:
Hi, I'm new to .NET 2003 compiler. When I tried to compile my program using DEBUG mode, I got the following errors in the C:\Program Files\Microsoft Visual Studio .NET 2003\Vc7 \include\xdebug...
18
by: JKop | last post by:
Here's what I know so far: You have a C++ project. You have source files in it. When you go to compile it, first thing the preprocessor sticks the header files into each source file. So now...
3
by: pooja | last post by:
Suppose i have created a class c1 with f1()in c1.cpp and included this c1.cpp in file1.cpp file , which is also having main() by giving the statement #include "c1.cpp". the same i can do by...
18
by: UJ | last post by:
Folks, We provide custom content for our customers. Currently we put the files on our server and people have a program we provide that will download the files. These files are usually SWF, HTML or...
3
by: aRTx | last post by:
I have try a couple of time but does not work for me My files everytime are sortet by NAME. I want to Sort my files by Date-desc. Can anyone help me to do it? The Script <? /* ORIGJINALI
2
by: Chocolade | last post by:
I have a console application project wich inside im creating array of jpg files from a directory and then im formating the files and make new files and i want to reneame/move/copy the new files with...
2
by: eneyardi | last post by:
Im copying a file to a flashdisk from a laptop, it only show the file folder, no file inside it. ive tried to show/hide files using folder option and cmd. copy the same file again, same thing happen...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.