View Full Version : what will hapen if i remove the hdd while the computer is turned on?
heyyy
July 20th, 2009, 07:57 AM
its probably a stupid thing to do but im curious...
please answer if you really know what your talking about
Malta paul
July 20th, 2009, 08:21 AM
Always turn the power off before working on your computer.
To answer your question, if you unplugged the power plug from the HD first nothing will happen, but don't push your luck!
:)
toupeiro
July 20th, 2009, 08:25 AM
Logically or physically?
Assuming you don't have a server with hot-swappable hard drives (noticeable by the very large lock releases and handles on the front of a slideable chassis) let me reaffirm your hypothesis. Yes, it is a stupid thing to do. I'm going to stretch further than my obligatory "strong recommendation against" and go for a very straightforward "don't ever do this!"
If you're very, very lucky, nothing will happen. If you're somewhat average lucky, you'll just corrupt your file system. Know, however, that you are well within the realm of frying hardware. Not just your hard drive, but your motherboards disk controller and possibly more.
Grenage
July 20th, 2009, 08:27 AM
If you happen to be writing at the time, there is a chance it will get a little corrupt. If it's not writing at the time, the chance of any damage occurring is quite low.
As for the OS; it may continue to function if what it needs is stored in memory. Once it tried to access someone on the drive, it would all go to hell.
toupeiro
July 20th, 2009, 08:30 AM
If you happen to be writing at the time, there is a chance it will get a little corrupt. If it's not writing at the time, the chance of any damage occurring is quite low.
As for the OS; it may continue to function if what it needs is stored in memory. Once it tried to access someone on the drive, it would all go to hell.
Your prognosis ultimately depends on what he means by "unplug" If you want to assume he means power, fine. I won't make that assumption.
Grenage
July 20th, 2009, 08:32 AM
It would be pretty much the same story whether he pulled the data, power, or both at the same time.
toupeiro
July 20th, 2009, 08:36 AM
It would be pretty much the same story whether he pulled the data, power, or both at the same time.
I sure wish I had photo's of that scorched ribbon cable I pulled out of an old AMD Thunderbird. I am "pretty much" sure that wouldn't have happened if power wasn't hooked up when they accidentally missed a pin plugging it back in. ;)
Don't play with fire in the first place and you'll be much better off.
Grenage
July 20th, 2009, 08:39 AM
Well with plugging it back in, that does add an extra dimension ;)
Bottom line, Mr Opening Poster; don't do it!
heyyy
July 20th, 2009, 08:50 AM
lets say that i only have rythmbox(without playing music) on and its on screensaver for about 15 minutes and then completely remove the hdd(lets say.. for 5 minutes) and then you put it back on,while the computer is still on and in screensaver.
According to these circumstances.. what will happen?
russo.mic
July 20th, 2009, 08:54 AM
This like asking "what would happen If I were to cut my thumb off while holding a gun pointed at my head?"
My vote is to try it and find out. Might as well put a new pair of shoes on before you shoot yourself in the foot.
Are you thinking of doing this? Or have you already done it?
varun1786
July 20th, 2009, 09:04 AM
I tried that a yr back when i had windows. My system just froze. I switched the power off connected the hdd back on an it started. Din notice any problems but scandisk insisted that i scan my harddisk, i skipped it, and it still works to this day.
heyyy
July 20th, 2009, 09:06 AM
This like asking "what would happen If I were to cut my thumb off while holding a gun pointed at my head?"
My vote is to try it and find out. Might as well put a new pair of shoes on before you shoot yourself in the foot.
Are you thinking of doing this? Or have you already done it?
no,but i think someone in my home already done it while i was away and im trying to find out if this is possible
scrapmetal
July 20th, 2009, 09:07 AM
Do not do it.
Have done it by mistake.
Hey we are all human.
Over the years results have been dead hard drives, a motherboard and possibility a number of power supply early retirements.
heyyy
July 20th, 2009, 09:11 AM
Do not do it.
Have done it by mistake.
Hey we are all human.
Over the years results have been dead hard drives, a motherboard and possibility a number of power supply early retirements.
im not saying that ill do it.
im just checking my options...
heyyy
July 20th, 2009, 09:15 AM
lets add one more condition:
what if when i remove it,install it on another computer(normally this time),do some reading and then install on the first computer(while its turned on)?
varun5049
July 20th, 2009, 09:17 AM
I have done that with my external Hdd a couple of times...
Turning the power off usually doesn't do any harm...
But if u are writing into your system while you do that you'll end up frying up your Harddisk...
thats it... Nothing more than that..
well we could do with one more observation..
Just let me know what happened when you actually do that..
Elfy
July 20th, 2009, 09:23 AM
moved to cafe as it's not a support thread.
calrogman
July 20th, 2009, 09:35 AM
If you do attempt this for whatever reason, please be sure to umount the hard drive. If you are running Linux from the hard drive at the time, please ensure that you have booted the kernel with the "toram" parameter.
heyyy
July 20th, 2009, 09:54 AM
the truth is that i think my younger brother did it while i was away and now im trying to figure it out <--is there a way to know?
Grenage
July 20th, 2009, 09:56 AM
Not really; bit of a random thing to suspect.
CaptainMark
July 20th, 2009, 10:14 AM
Im wondering more why the heck do you want to find out?
heyyy
July 20th, 2009, 10:24 AM
Im wondering more why the heck do you want to find out?
because i have a lot of important data in there,things that my brother dont want to see
Grenage
July 20th, 2009, 10:26 AM
If you're bothered about privacy, use encryption.
heyyy
July 20th, 2009, 10:39 AM
If you're bothered about privacy, use encryption.
as a newbe here id appreciate some links related to this
but the question remains if someone has an idea like what to look for.
could i check for some clues in the "log file viewer" ?
gn2
July 20th, 2009, 10:45 AM
lets add one more condition:
what if when i remove it,install it on another computer(normally this time),do some reading and then install on the first computer(while its turned on)?
If it's an IDE hard drive and you connect it to a live molex plug, you will release the magic smoke and kill the drive stone dead.
Same if it's a SATA drive with a molex power socket.
Grenage
July 20th, 2009, 10:53 AM
I would recommend you try something like TrueCrypt, it's a decent encryption program. If you have trouble with that, there is an easy interface called "Easy Crypt" which should be available in the main repository.
There is no way to know if your brother did unplug it. It can't write to a log file if the drive has been unplugged.
heyyy
July 20th, 2009, 11:08 AM
I would recommend you try something like TrueCrypt, it's a decent encryption program. If you have trouble with that, there is an easy interface called "Easy Crypt" which should be available in the main repository.
There is no way to know if your brother did unplug it. It can't write to a log file if the drive has been unplugged.
why truecrypt its not on the repos?
Grenage
July 20th, 2009, 11:32 AM
TrueCrypt is available as a DEB file from the main site. Easy Crypt is another interface for truecrypt.
t0p
July 20th, 2009, 11:45 AM
why truecrypt its not on the repos?
Truecrypt is the best encryption app I know of. Read its documentation and you'll see what it can do. I don't know why it isn't in any repos, but this is one of the very few times I'd recommend a user go download a package from a site somewhere. There's a .deb available at www.truecrypt.org (http://www.truecrypt.org).
Encryption is the way you need to go to protect your files from prying eyes. Taking out the hard disk and hiding it is obviously an option. But I'd say a pretty crap option. Your brother may find the hidden disk; he won't find your truecrypt passphrase (unless you write it down somewhere - which is, of course, a very stupid thing to do).
Easy Crypt is another interface for truecrypt.
Don't bother with easycrypt. It has been rendered obsolete by truecrypt's excellent gui.
hessiess
July 20th, 2009, 11:57 AM
Truecrypt was covered in detail on Sccurity Now 41.
http://twit.tv/sn41
Grenage
July 20th, 2009, 12:03 PM
Oh Christ, not Steve Gibson!
willmsbrt1
July 20th, 2009, 12:07 PM
when you boot up go to bios ,
when in bios go to security and place a boot password on it it , if it was removed and placed into another pc the bios ( boot ) password will not allow a user to open unless it is password opened , no matter what pc the hd is insatlled in , use a password that you will remember though as it will lock the drive to all unless the proper boot password is used ,
as for the first question it would depend on the hard drive itself , make and model would help with this , if it is a newer unit , post 04 or so it most likely could be hot swapped as it was starting to become more of a norm during this time , check the mfg infor on the drive and google and you can find out ,
the bios log will also tell you if and when it was a clean shutdown or not , as in time date and , power loss , user requested , so on, question though , are we talking windows or ubuntu ?? ubuntu > system > administration > system log and you will know when the drive was ran , watches everythin
heyyy
July 21st, 2009, 02:31 PM
when you boot up go to bios ,
when in bios go to security and place a boot password on it it , if it was removed and placed into another pc the bios ( boot ) password will not allow a user to open unless it is password opened , no matter what pc the hd is insatlled in , use a password that you will remember though as it will lock the drive to all unless the proper boot password is used ,
as for the first question it would depend on the hard drive itself , make and model would help with this , if it is a newer unit , post 04 or so it most likely could be hot swapped as it was starting to become more of a norm during this time , check the mfg infor on the drive and google and you can find out ,
the bios log will also tell you if and when it was a clean shutdown or not , as in time date and , power loss , user requested , so on, question though , are we talking windows or ubuntu ?? ubuntu > system > administration > system log and you will know when the drive was ran , watches everythin
i think the bios password implies only for the computers main unit boot up not for the drive specific..
heyyy
July 21st, 2009, 02:34 PM
and i repeat my qusetion :why truecrypt is not on the repos?
Grenage
July 21st, 2009, 02:36 PM
Then let us repeat our answer: "We don't know".
Maybe the authors didn't want it on the repositories.
dmizer
July 21st, 2009, 02:49 PM
the truth is that i think my younger brother did it while i was away and now im trying to figure it out <--is there a way to know?
If your drive is SATA II and your mainboard SATA controller supports hotswap, not much would happen other than a system freeze.
If your drive is IDE, you would most likely have a non-functional computer. Disconnecting/connecting IDE cables while powered destroys drives and destroys main boards.
IF your drive is SATA II and your brother disconnected it, read it from another system, and plugged it back in, then there would be no logs and no way to prove that this was done.
As to why truecrypt is not in the repos: I'm not positive, but that level of encryption is illegal in many countries outside of the U.S. Truecrypt is released under their own custom license. The truecrypt license is not approved by the FSF or OSI.
Source: http://brainstorm.ubuntu.com/idea/10062/
heyyy
July 21st, 2009, 03:29 PM
If your drive is SATA II and your mainboard SATA controller supports hotswap, not much would happen other than a system freeze.
If your drive is IDE, you would most likely have a non-functional computer. Disconnecting/connecting IDE cables while powered destroys drives and destroys main boards.
IF your drive is SATA II and your brother disconnected it, read it from another system, and plugged it back in, then there would be no logs and no way to prove that this was done.
As to why truecrypt is not in the repos: I'm not positive, but that level of encryption is illegal in many countries outside of the U.S. Truecrypt is released under their own custom license. The truecrypt license is not approved by the FSF or OSI.
Source: http://brainstorm.ubuntu.com/idea/10062/
thanks
after some thought i couldn't resist any more and tried it
i put out the hard drive and then back in... nothing happened
everything worked fine and no sign on the log viewer that it happened...
as for truecrypt if it is only a licence thing ill give it a try
bodhi.zazen
July 21st, 2009, 05:12 PM
You are playing with fire if you do that.
A computer is an electrical device and if you are working on the internals trun it off and disconnect it from the power supply.
Otherwise you risk shorting your circuits / motherboard (speaking from personal experience), or worse serious electrical injury or death.
After your fry your first component, and see the sparks and smoke , you probably will not do that again, at least now without proper precautions and personal insulation and a fire extinguisher.
Thread closed.
Powered by vBulletin® Version 4.2.2 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.