Every day we offer FREE licensed software you’d have to buy otherwise.

Bitrot Detector 16.1 Giveaway
$24.00
EXPIRED

Giveaway of the day — Bitrot Detector 16.1

Bitrot Detector scans your files and generates digital fingerprints for them.
$24.00 EXPIRED
User rating: 66 (66%) 34 (34%) 47 comments

Bitrot Detector 16.1 was available as a giveaway on July 25, 2016!

Today Giveaway of the Day
$49.95
free today
Aiseesoft FoneTrans is the best iOS transfer software to manage iOS files.

Bitrot Detector scans your files (all of them, or the ones you specify) and generates digital fingerprints for each one (SHA-2 hashes, specifically). It also tracks each files' location and size. After the first scan, Bitrot Detector performs periodic scans, compares fingerprints and lets you know if any files have changed. You can then determine if there were any unwanted changes, and restore any corrupted/deleted files from your backups, while there's still time. (Bitrot Detector is a backup scheme companion, you can use the backup software or scheme you prefer to backup and restore your files.)

It's obvious when a hard drive has crashed or a computer been stolen that a backup needs to be restored. However, more subtle forms of data loss can often go unnoticed. By performing periodic scans with Bitrot Detector, you'll become aware of any subtle data loss, while you can still do something about it.

System Requirements:

Windows XP or later

Publisher:

Domador Software

Homepage:

http://www.domador.net/products/brd/overview/

File Size:

9.8 MB

Price:

$24.00

Comments on Bitrot Detector 16.1

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#17

If anyone would like a program like the GOTD, but taken to its logical, but much more practical extreme, then feel free to check out what I consider to be a programming tour de force: Xinorbis.

http://www.xinorbis.com/features.htm

This program will tell you everything you'd ever want to know about the files on your hard drive--or any other device--including change history, how much space they're taking up, and a laundry list of other intelligence. Run, save, or print reports in a multitude of formats. Install it locally to take advantage of its useful shell extensions, or run it as a portable app. Free!

Hope someone here finds Xinorbis as incredibly useful as I do.

Reply   |   Comment by Robert Garofalo  –  2 years ago  –  Did you find this comment useful? yes | no (+1)
#16

I started scanning a few of my folders, full of different stuff (about 400 GB of data on 500 GB SSD). And I noticed the program is slower with every hour of work. Despite the fact it's running on SSD drive, during 8 hours run it scanned about 100K of files within 8K of folders. This perhaps could be considered as normal, but now, it scans one small file (a few KBs) per second, but when it started, it was scanning a few hundred of such small files per second.

I also turned my AV off, because it was taking 100% of CPU, but now bitrotdetector.exe takes 100% of the CPU.

I also noticed weird thing: my whole drive is 500 GB. When I looked at the statistics of the process bitrotdetector.exe in processmanager, it said that this process read 685 GB of IO data, and wrote 185 GB of IO data, but the scan is not even complete, and my selected folders contains about 400 GB of data, and the scan is not even in 80% complete!

I will test the software more thoroughly, but I feel it contains some glitches or bugs. I definitely need to split my scan into small folders and see how it runs then.

Reply   |   Comment by Rafal Stanilewicz  –  2 years ago  –  Did you find this comment useful? yes | no (+11)

I took a deeper look. It seems the process was reading and writing only two files for 99% of time - it was C:\Users\myuser\AppData\Roaming\Bitrot Detector\BitrotDetector.sqlite-wal which was 190 MB of size and C:\Users\myuser\AppData\Roaming\Bitrot Detector\BitrotDetector.sqlite which was 45 MB of size.
For a few seconds of monitoring, there were about 200 IO operations on real files with my data, and about 180000 of operations on these two files. It means, that the database operations are not very optimal... even sqlite supports transactions, and the program could cache some values before importing them to the database.

I am not impressed.

Reply   |   Comment by Rafal Stanilewicz  –  2 years ago  –  Did you find this comment useful? yes | no (+22)

Rafal Stanilewicz, it has become painfully evident in recent days that Bitrot Detector has some major performance issues when scanning a large number of files. This happens whether those files are large or small. Part of the problem may stem from certain design choices that keep BRD's scan database size small (an important goal, given how quickly scan data could grow if this was not accounted for). Improving performance is the number one priority for Bitrot Detector's next release (which should happen within the next six weeks). The goal will be to keep BRD's database size small, but for it to scan with a quick, consistent speed regardless of the number of files covered by the scan.

All users of Version 2016 Release 1 will get a free, optional upgrade to the next release, including those who installed and registered today's giveaway. Bitrot Detector checks for updates once a week by default, and can also check for this update manually (using the "Check for updates" button in the About tab). Another option is to subscribe to Domador Software's mailing list (low volume) to be notified about this update.

Thanks for the detailed feedback.

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (+1)
#15

FWIW a quick search of this page in Firefox doesn't find the word: "SSD", so thought it worthwhile to mention that data loss does occur, maybe more so on SSDs. It's usually not a lot, though Samsung had problems with a particular drive, but it is enough that companies with lots of data on lots of SSDs do watch for & monitor data integrity. And there are models of SSDs tailored for the enterprise, that are engineered for less data loss, so it is a common concern.

Reply   |   Comment by mike  –  2 years ago  –  Did you find this comment useful? yes | no (+3)
#14

Confusing UI.
Difficult to get a grasp on how to work the program.
No method to manually run a scan without setting a scheduled task?

And then difficult to understand how to get information back out of the program?
No reporting facility?

No mouseover on Path (when it exceeds column width).

So you can determine that a file has changed, been added or deleted, or the like.

Now just what do you do with that knowledge?
If this is archival storage, then something like this may suffice.
A file changed (where is should not have).
So could be an indicator of failing media or malware (assuming you didn't knowingly make a change).
But otherwise ...?

The one post stated the file(s)? physically changed (by the program)?
Not sure how or why that should be, as that would defeat the purpose of the program.

BitrotDetector.sqlite.
Is encrypted or not an sqlite file? Why?

Reply   |   Comment by therube  –  2 years ago  –  Did you find this comment useful? yes | no (+2)

therube, thank you for your feedback. Here are some responses to what your wrote.

Yes, there is currently no way to run a scan without a schedule. Most users would probably be interested in scheduled scans, given that at least two scans are needed for Bitrot Detector to be of any use in detecting file changes, and to have ongoing notifications of potentially-unwanted changes. I'll consider adding an option to turn off a scanning schedule, so that a scan profile's scans are on an exclusively manual basis (with the "Perform Scan Now" or "Perform another" button).

Displaying the full path on mouseover for the paths in the Results window is a great idea. Currently, you can click on one of the paths and the path will appear below, to the right of where it says "Selected item". The full path IS displayed on mouseover in that section, and you can also view it in Windows Explorer by clicking the Show button.

When you notice that a file has been changed or deleted, you can determine if you expected and/or wanted the change or not. If you didn't want that change, that'd be the point where you could look in your backup and restore that file. (Bitrot Detector isn't very useful if one doesn't already use a backup system of some kind.)

Bitrot Detector does not change any of the files it scans. The only files it changes are its own data files, primarily the database where it stores its file fingerprints and scan data, BitrotDetector.sqlite. That file is indeed an SQLite file, though an encrypted one (to help protect fingerprint data from potential tampering by malware).

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (0)
#13

This approach is also used for security purposes.

Reply   |   Comment by Nobody  –  2 years ago  –  Did you find this comment useful? yes | no (-6)
#12

I installed it, went through registering and some testing, I agree with the rest of the guys here, NOT much of a use to this proggie but all the mumbo-jumbo info that many of us may find useless AND a work of warning...! I have a feeling this is intruding a bit much while asking for Windows password and private info, this could may as well be a type of "sniffer" fishing for info while pretending to be part of the functionality of the program, could also just be to collect PC info but makes no sense to me, just a BAD feeling...

Reply   |   Comment by Opinionated  –  2 years ago  –  Did you find this comment useful? yes | no (+1)

Opinionated, Bitrot Detector indeed asks for the Windows password because it is needed (unfortunately) in order to create a scheduled task in Windows' Task Scheduler (in certain versions of Windows). This task opens Bitrot Detector at scheduled times, in case it isn't running already. The goal is to make sure BRD's scheduled scans aren't missed, but are performed at their scheduled times. Fortunately, newer versions of Windows don't require a password to create a Task Scheduler task. (You can try this out yourself by going to Start -> All Programs -> Accessories -> System Tools -> Task Scheduler. Try creating a new scheduled task. If it asks you for a Windows password at the end, then Bitrot Detector would also need to know the Windows password to create a Task Scheduler task.)

That being said, Bitrot Detector doesn't NEED to create a Task Scheduler task, or know your Windows password. If Bitrot Detector is already running (and your computer is also running), BRD will start a scheduled task at the scheduled time. But if it isn't running, it'll be up to you to open it up so it can perform your scans.

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (+3)
#11

Just to give an idea of how say a text files hash changes here are two examples of a 256sha hash.

What the hell is this program used for.
255fb479f3ca2759c273474b7f1f1c5bdbdef2ddf5833d80ae7362136c3f0a92

What the hell is this program used for
15535b2e71ab0943611fa0ec7fd4c3f47f8ee74f433021bc8cd9a9587c09832c

The only difference between the two is the period at the end of the sentence, yet there is a massive difference in the hash.

For those who wish to play around with various hashes and text the following link is useful:-
http://www.sha1-online.com/

Reply   |   Comment by Seb  –  2 years ago  –  Did you find this comment useful? yes | no (+3)

Seb, that's indeed how hashes work. A minor change to the input (a period in this case) will produce a large change to the hash. This might not seem so useful in the example you gave, but thanks to this, Bitrot Detector can compare ALL the versions of each file that it has ever scanned WITHOUT having to store a full copy of each and everyone of the old versions. For example, instead of storing a copy of a 650 megabyte file (such as .iso file for a full CD-ROM), Bitrot Detector stores 32 bytes (a 256-bit SHA-2 hash) which serve as a fingerprint for that file. Then, the next time it scans this file, Bitrot Detector will generate and store another 32-byte fingerprint (instead of 650 MB). Just by comparing those fingerprints, BRD can tell you whether the file has changed, regardless of whether the change is a single bit, several bytes, or many megabytes. (It doesn't tell you *which* part of the file changed, or how much it changed, but for that you can compare the current copy of the file with the one in your last backup.)

Different kinds of programs are needed to see the actual differences between two files of the same kind. A text editor is needed to compare text files, a photo editor to compare photos, an audio editor for sound/music files. However, Bitrot Detector can detect any changes to any of these different kinds of files, and one can review those changes (and see if they're undesirable changes) with the corresponding program.

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (+6)

Andres Cabezas,
It needs a huge amount of complex development work to make it a really useful program, probably AI..
In fact the way Windows works makes it pretty well impossible to be useful without a huge amount of input by the user.
I agree with your description of how it functions but do not see it as a practical and useful program.
My granddaughters a Cabezas. :-)

Reply   |   Comment by Seb  –  2 years ago  –  Did you find this comment useful? yes | no (-4)

Seb, except the site you name is SHA1 which is being phased out due to it being insecure as it is possible to craft bit changes to produce the same SHA1 hash. SHA2 is the new goto hash algorithm as used in Bitrot Detector given away here today.

Reply   |   Comment by TK  –  2 years ago  –  Did you find this comment useful? yes | no (-2)
#10

Thought this would be a nice replacement for M5Checksum and upgrade to SHA-2. Nope. You can't comtrol the SHA-2 files or put them with the files or move them to a USB stick or do anything useful to me. It takes over and does what it thinks is best..

The market already has plenty of "Folder has Changed" tools that will do what this does.

https://www.raymond.cc/blog/3-portable-tools-monitor-files-folders-changes/

Deleted in disgust.

Reply   |   Comment by Mememe  –  2 years ago  –  Did you find this comment useful? yes | no (+2)

Does anyone know of a WIndows Explorer addon (Comes up when you right-click a file in windows explorer) to generate a file containing SHA-2 Checksums... All the selected files will have a checksum generated into a txt file. The one I use can only do MD5, SHA1 or SFV.

Reply   |   Comment by Mememe  –  2 years ago  –  Did you find this comment useful? yes | no (-4)

Mememe, Bitrot Detector is aimed at a different kind of use than you have in mind. It looks like you'd like to generate, view, and store SHA-2 checksums for individual files. Though Bitrot Detector generates and stores them, it doesn't currently display them, though that may change in the future.

I looked at the tools in the link you provided. They seem very useful. The main difference between them and Bitrot Detector is that they're all real-time monitoring tools. They'd need to be running in order to detect that a file or folder has changed. Bitrot Detector is more of a "snapshots in time" tool. It can detect that changes took place, regardless of when such changes happened, and even if Bitrot Detector wasn't running at the time the changes took place.

Realtime monitoring of watched folders is a potential, future feature, though there are other development priorities for now (such as improving Bitrot Detector's scanning speed).

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (-2)

Mememe, it may be possible to export the SQLite tables of hashes using suitable sqlite utility/tool

Reply   |   Comment by TK  –  2 years ago  –  Did you find this comment useful? yes | no (-1)

TK, right now that won't be possible since the SQLite database is encrypted. The ability to export hashes will likely be added to an upcoming Bitrot Detector upgrade.

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (0)
#9

A tool like this is for "integrity management", that is, checking the integrity of your files that should not change on a regular basis. For example, you might want to scan a document folder to help detect if ransomware has encrypted your files (though this detection would be too late to be of much use), or more useful, to determine if an adversary or malware has changed a configuration file that shouldn't be changed. Bitrot Detector shouldn't be making any changes to your files itself. Rather, it calculates "hash values" of the files/folders you specify, and then compares them each time the program is run to detect if any changes have occurred.

Reply   |   Comment by Doug A  –  2 years ago  –  Did you find this comment useful? yes | no (+3)
#8

To paste the registration code: click inside the License Key text box, then press the Ctrl + V keyboard combination to paste it (assuming that you have already copied it to the clipboard).

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (-1)
#7

I have some comment about this program - please forward them to the authors.

Bitrot = change a few bits of a file, WITHOUT user changing it.

So the program should not detect "user-changed" files (it should monitor the date of last modification), and the file size (if the file size is different, FOR SURE the content will differ as well).
It should also detect "amount" of changed bytes, and if the amount is greater than a few, most likely the file has been changed by some program, not bitrot process. There should be an option, to exclude files which are changed more than 1% of content.

Also, the progress of the scan could be more clear. Now it requires some clicking around, to see how many folders/files had aready been scanned...

Tutorial could be either more about concepts, or more technical. As of now, it's seemed pretty useless to me.

Of course, that's my personal opinion, and should be treated as such.

Reply   |   Comment by Rafal Stanilewicz  –  2 years ago  –  Did you find this comment useful? yes | no (-3)

Rafal Stanilewicz, thanks for your feedback!

There is unfortunately no way to determine whether a file on a computer was changed interactively by a user or changed by a program operating on its own. A program on a computer can't tell whether it is being used by a human or used by another program to edit data.

Due to its underlying design, Bitrot Detector can't currently determine how much data was changed in a file, just that the file's contents changed in some way. Bitrot Detector stores a 32-byte fingerprint of a file's contents on each scan, and compares those fingerprints to determine if changes have occured. In order to determine how much a file has changed, BRD would have to store a copy of the original file, and a copy of the changes detected on each scan. This could use up a lot of space on the hard drive, whereas by only storing fingerprints, BRD uses little space. However, this feature is worth considering, and maybe users could have the option of determining which files BRD should store a copy of in order to perform detailed comparisons (such as the %age that has changed.)

BRD already detects changes to modification dates and file sizes. (That data is also collected, along with the 32-byte fingerprints, on each scan.)

I'd like for Bitrot Detector to be as clear and easy to use as possible, so I'll definitely look into ways to improve the scan status/statistics window. I'll also look into the tutorial as well.

Thanks again!

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (+4)
#6

Tried to set up a basic profile and it want's me to manually type in all the file paths to scan. Honestly A browse button is needed I can't remember all the intricacies of the path to each file. This just broke the use of this program to zero use. So no profiles for me. Guess I could use the click to scan everytime and remember what files to exclude to speed it up. Nope I just won't use this program it is not user friendly as it claims. Who in the hell wants to manually type file paths in any program with all the nuances and symbols to get to the right folders? Perhaps the Linux guys might like this they have to do a lot of file path typing as for me this became useless the minute I had to start typing c:/xxxowner/programfiles/user/blah blah blah blah/blahblahblah/blahblahblah/blahblah blah.bla then do it again and again all the while making sure it's absolutely correct.
Nope making profiles was just sloppy programming or is it I'm to lazy to go look and write down all the paths for all the files I want to be continually scanned or I could let it always scan everything and with 4 terrabytes drives How long would that take every day? I'm going to uninstall this one and wait on it to mature before letting it bird dog my computer.

Reply   |   Comment by nomadss1  –  2 years ago  –  Did you find this comment useful? yes | no (-1)

nomadss1, I'm not sure what you're referring to, as far as having to type a lot. Maybe you're referring to the "2: File types" tab in the "Create a scan profile" window, where one can select specific extensions to include, or type in the extensions manually. However, in the first tab ("1: Folder"), you can click on the "Add a folder" button to select a folder to include in the scan (by clicking around). You can include additional folders by clicking on the "Add a folder" button again. Also, if you don't want to select a folder individually, you can check the "(My) Documents" line which is already displayed in the first tab, and scans will cover anything in the My Documents folder (and any subfolder).

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (-1)

nomadss1,
Equally unsure as to where the typing is necessary, it allows used to select folders when you're setting up a profile using a folder browser.
Not so much "sloppy programming" as sloppy reviewing!

Reply   |   Comment by Seb  –  2 years ago  –  Did you find this comment useful? yes | no (-3)
#5

Download, install and registration probblem free. First impression is that the GUI is very bland, there is no help file and the tutorial isn't much help. Ran a scan of my main drive which took quite a while to complete, but scan time would depend on the number and size of files it has to scan. Then I uninstalled a little used program and installed two new programs and after rebooting ran the scan again. The results were disapointing, it did not detect the uninstallation or the installation of software and said no significant changes detected - The changes were very significant ... From the not very informative blurb I got the impression this would detect any changes to files/folders on the drive and produce a report with the details ... It didn't, as far as I can see this doesn't really do anything to merit taking up space on my drive. It's also quite heavy on resources. Not worth keeping and uninstalled. Maybe I missed something, feel free to enlighten me if I did.

Reply   |   Comment by Lenny  –  2 years ago  –  Did you find this comment useful? yes | no (+13)

Lenny, thanks for trying out Bitrot Detector, and for taking the time to provide feedback.

Yes, Bitrot Detector is a bit bland right now, and bare bones as far as help files and tutorials are concerned. With every bit of feedback, I'm getting a better idea of what kind of supplementary information may be needed to help everyone make the most out of Bitrot Detector.

The results you describe are indeed disappointing. Just to confirm: did you select the WHOLE hard drive for scanning (for example, C:) as opposed to just My Documents or your Windows user folder? Assuming you did, Bitrot Detector should have scanned the Program Files folder along with the rest of the har drive, and detected the little used program the first time around, then detected its absence the second time around. BRD did not consider the new programs you installed to be "significant changes", as you're adding new data to the drive, as opposed to deleting or modifying existing data. (It's easier to recover from "extra" data than from missing data.) It's worth considering adding the option for BRD to explicitly notify users of additions to certain key folders (such as Program Files) and to consider these additions significant. However, the new files installed by the two new program should have been detected and listed in the "All items: New" category in the scan results window.

If BRD didn't detect the little-used program you later uninstalled, there may be some permission issues to investigate, to see if Windows blocks Bitrot Detector's access to certain files by default.

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (0)
#4

Nice idea but the problem with this program is that a lot of files are continously changing in the computer especially the system files. The program is going to report on a lot of file changes.

Reply   |   Comment by Brian Clark  –  2 years ago  –  Did you find this comment useful? yes | no (+6)

Brian Clark, This is said with tongue in cheek since I've never used "Bitrot Detector", however, by reading the description, both here and elsewhere, if you do your due diligence with "Bitrot Detector" or any other program of it's type it could be one of the more valuable programs on your computer.

I concur; many programs, on any computer, are modified not only on a daily basis, but some on a regular basis, minute by minute, hour by hour, however, if one does their due diligence with this program it could be quite valuable. Is there another program, of it's type, that does it better? I don't know; never used a program like this before.

You could for example eliminate all .txt files from the scan after your first scan because no malicious program I've ever seen modifies .txt files, although some do add .txt files and it would be nice to know if a .txt file has been added in addition to another program either being added or an existing one being modified.

What I get out of your comment is that it's too much bother to use this program. If that's the case then don't use it, however if one does their due diligence with a program like this it could prove to be quite valuable.

Reply   |   Comment by JonE  –  2 years ago  –  Did you find this comment useful? yes | no (0)
#3

What I do is run the free CrystalDiskInfo 7.0 in the background on my old laptop. If it finds, while monitoring the health of my S.M.A.R.T. hard drive a bad sector with possible Data loss, I run a Live USB program called SpinRite 6.0 by GRC. SpinRite then usually, completely and thoroughly, repairs the bad sector and saves all or all but a few bits of the Data restoring my hard drive or other removable media. What does this do? I don't get it.

Reply   |   Comment by Glen C  –  2 years ago  –  Did you find this comment useful? yes | no (-15)

Glen C, No similarity between "Bitrot Detector" and "SpinRite"; SpinRite checks and repairs the physical aspects of your Hard Drive while Bitrot Detector checks files on your Hard Drive for modification. No similarity between the two what so ever.

"SpinRite", in my opinion, is the top program of it's type. I haven't used "Bitrot Detector" yet and so can give no opinion.

Reply   |   Comment by JonE  –  2 years ago  –  Did you find this comment useful? yes | no (+5)

JonE, Thanks. I snapped after I woke up.

Reply   |   Comment by Glen C  –  2 years ago  –  Did you find this comment useful? yes | no (-5)

Glen C, The solution you're describing (CrystalDiskInfo + SpinRite) detects low-level hard disk damage. Bitrot Detector is aimed more at the file level, to detect (potentially unwanted) changes to individual files. On rare occasions, these changes will be the result of a damaged hard drive, but usually they'd be caused by accidentally deleting, moving, or editing files. (Such changes could also be the result of viruses and malware.)

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (-1)
#2

Does nothing but crash during install.

Reply   |   Comment by L Jenkins  –  2 years ago  –  Did you find this comment useful? yes | no (+5)
#1

Downloaded and installed in the hope that there would be a good help file included with the program, but no.

Informed me that there was a tutorial which I didn't really get the hang of, not enough detail.

It goes on about "more subtle forms of data loss" in the blurb on this page but no detail as to how and when this can occur.
I do know that I have lost data within Windows with no apparent explanation as to why, this program will inform me that it has happened but a hash will not help me recover it.

It does and records a hash of files, it repeats the process later and if it finds a difference it will report it.
It is appears to be what the program does, and I have no idea what use this can be put to.

Maybe someone can enlighten me as to the use of this program, I'm totally confused.

One point, it wanted my Windows password before commencing the scan, and I don't use one and I've no idea how important this is to the program.
But then I'm totally confused by the program anyway.

Reply   |   Comment by Seb  –  2 years ago  –  Did you find this comment useful? yes | no (+27)

Seb,
I think the use is this. If you usually back up say your photos to another disk by mirroring all the files. Then at some point unknown to you some of your original photos are damaged (this has happened to me). When you do another mirror both your orginal and your backup are the damaged version - thus photo is lost. This program may inform you that damage has occured either to the original or the backup so you can restore the damaged files before both your copies have the same damage.

Reply   |   Comment by David Murphy  –  2 years ago  –  Did you find this comment useful? yes | no (-2)

Seb, Microsoft Windows ALL DESKTOP VERSIONS are inherrantly unstable over long periods of operation and will subtly (or not so subtly) crash parts of itself until it becomes unusable and NEEDS to be rebooted or could simply reboot out of the blue after weeks of hibernating or standby and back without rebooting, both states, crashed sub-structures and out of the blue reboots can cause data corruption that is not a physical error that hard drive SMART or CRC checks could report or ECC could correct transparently.

While this program could potentially detact such bitrot it will also detect the masses of files that are routinely altered during system or program updates or during normal operation of the computer and having to manually decide what are good or bad changes is beyond the scope of MOST users and certainly beyond the remit and spare time of a system administrator! The program needs some inbuilt AI to be able to self determine what are false positive bitrot detections and what are genuine cases of bitrot! Without that the stress alone would make ones computer unusable, or one would learn to simply ignore this program crying bitrot detected when it was just normal operational changes!

The usual enterprise solution to these woes is store user files on a RAID protected with incremental backup service, windows or linux server that is a known quantity and is more stable than the desktop and is rebooted within the time scale necesary to keep it running correctly. The Desktop systems are restarted daily as a matter of company policy and energy consumption reduction and reducing out of hours unsupervised access. This kind of policy mitigates the need for wholesale bitrot detection. Some programs perform very specific bitrot/file manipulation detection on specific data types that rarely change in normal operation and even those can become a pain when they hash an executable on a removable drive and then notice the drive is removed on next reboot and reports the executable is no longer on the system, it then asks should it keep or remove the hash data and firewall rules etc...

If it wanted your password before commencing the scan it is possible it was creating an elevated scheduled scan task with your full credentials or starting a service in your name rather than the other built in names like SYSTEM or NT AUTHORITY for scanning whilst logged out.

Reply   |   Comment by TK  –  2 years ago  –  Did you find this comment useful? yes | no (-3)

David Murphy, this is precisely one of the common situations where Bitrot Detector can prevent data loss. With mirrored file backups, all the files that are present *right now* will be backed up. However, any files that were deleted *since* the last backup would be lost when a new backup is performed. In the time between each mirrored backup, Bitrot Detector would tell you which files have been deleted or changed, giving a user the opportunity to go and copy the file from their last backup. This way, it will be included in the next backup. This is one of the kinds of subtle data loss that Bitrot Detector seeks to prevent.

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (-2)

TK,
Totally agree, my present OS is five years since installed and I'm starting to see file corruption.

Unfortunately, this program can only report on file corruption it cannot do a recovery, very little use in reality as far as I can see.

Feel that if it was a really useful program it would have a very good explanation and help file, it has nothing suggesting the programmers are not really sure of its usefulness or function.

Reply   |   Comment by Seb  –  2 years ago  –  Did you find this comment useful? yes | no (-4)

Andres Cabezas, so what you are saying is that not only do we have to confirm move to recycle bin, empty recycle bin then confirm Bitrot detector if we wanted to delete a photo that was not good enough to keep? I presume the detection by BD will occour at a later time than when the deletion initially happened so one has to either remember every file name deleted in order to confirm with BD that the deletion was desired... After the first hundred false positives I can see most people either getting fed up with the extra nagging and removing the program or dismissing the file deleted alert and ignoring the program. Windows does have a callback you can register on selected folders to track changes to the folder contents and confirm user intent to remove the file from the hash database there and then.

Technically a file deletion or file modification even if done by malware is NOT Bitrot. Bitrot is the loss of data due to hardware or filesystem failure of some kind. With SSD the state of a bit decaying over time due to electron leakage or ionising radiation and consumer SSD drives not investing expensive flash resources on ECC and CRC storage.which magnetic and optical storage do have so bitrot in magnetic and optical storage is trackable without resource heavy sceduled SHA2 hash comparisons.Sadly not by any current consumer level operating system though. Windows will tell you of a fatal bitrot incident on magnetic and optical media and on high end enterprise class SSD. Failing consumer RAM can also cause undetected Bitrot, but usually becomes apparent by frequent unexplained crashes and BSODs

Reply   |   Comment by TK  –  2 years ago  –  Did you find this comment useful? yes | no (-1)

Seb, use par2 or multipar to create recovery archives for your files that you know you only want to store (eg. pictures and such). They can be used to recover files when data corruption happens.

Just taking snapshots of a file checksums and telling the user that there has been corruption or change to the file is utterly pointless if there is no option to recover the original file.

Reply   |   Comment by steveju  –  2 years ago  –  Did you find this comment useful? yes | no (-1)

David Murphy,

That reminds me of a program called crc32. Which creates crc numbers for each file so the user can check to fibd out if tge file has been changed.

Reply   |   Comment by Brian Clark  –  2 years ago  –  Did you find this comment useful? yes | no (-1)

TK, detection of the deleted photo by Bitrot Detector would take place the next time that it scans the folder that contained that photo. Bitrot Detector doesn't currently detect changes in realtime. It might do so, eventually, to help keep Bitrot Detector usage from becoming tedious due to false positives.

I really appreciate your comment about false positives. That could definitely be a drawback. One additional countermeasure, at least in the case of photos, would be to store thumbnails, low-resolution versions of the photos which don't take up much space, but which could help a user quickly determine whether to be concerned once BRD tells them a photo was deleted. Creating such thumbnails could be processor-intensive, so such a feature would need to well thought out. Among other things, it'd need to be an optional feature. If it eventually makes it into Bitrot Detector, it probably won't happen for several releases.

Regarding bitrot, yes, literal, actual bitrot is rarer that other causes of data loss, but I still wanted to use that term as part of the program's name. Like you, I also wish Windows used and natively supported file systems that have a greater focus on data integrity, something like ZFS. Maybe someday...

Reply   |   Comment by Andres Cabezas  –  2 years ago  –  Did you find this comment useful? yes | no (0)
Add a comment
Facebook comments

iPhone app giveaways »

Drop The Chicken Giveaway
Drop The Chicken is a fun filled, addictive and challenging puzzle game.
$0.99 ➞ free today
SciPro Math Giveaway
"SciPro Math" is an extraordinary scientific calculator, designed for portable devices.
$9.99 ➞ free today
ShotDoctor Giveaway
A personal trainer on your wrist that gives immediate feedback after each shot to eliminate poor habits.
$4.99 ➞ free today
Storm Rain Sounds Giveaway
The new Storm is the most organic relaxing way to listen to sounds of rain and storms on IOS.
$0.99 ➞ free today
Live Mix Giveaway
The Revolutionary Cut Based Mixer and Editor for Live Photos, Videos, GIFs and Still Photos.
$1.99 ➞ free today

Android app giveaways »

Photo Editor Pro Giveaway
Photo Editor Pro offers everything you want to edit pictures.
$2.99 ➞ free today
Poker Hand History Keyboard | poker shorthand tool Giveaway
This keyboard is designed for live poker players to record hands at the table faster and more effectively.
$0.99 ➞ free today
GPS Speed Pro Giveaway
Can track your speed,distance,time,location and also can get start time,time elapsed,avg speed,max speed,altitude.
$1.19 ➞ free today
Second grade Math - Addition Giveaway
Practice and improve math skills!
$2.89 ➞ free today
BlockerX Pro - Porn Blocker App /Best Porn Blocker Giveaway
Is your work/studies affected by too many distractions?
$4.99 ➞ free today