I’m not sure how that’s relevant? If the default folder was “Camera” or “Pictures” or whatever else your malware would just scan those directories and any real attack likely already does. You’ve only described how having malware on your machine compromises your machine, not exactly a groundbreaking revelation.
Windows hasn’t been my main os for a while but I’m fairly certain you can mount/unmount drives without rebooting. That’s certainly the case on Linux, and my distro definitely tells me what processes are locking drives when applicable.
Windows hasn’t been my main os for a while but I’m fairly certain you can mount/unmount drives without rebooting.
I work in IT for a living. Sometimes something keeps your drive locked. Windows does not confess. I wasn’t talking about linux user experience because most people don’t use linux like we do.
I’m not sure how that’s relevant? If the default folder was “Camera” or “Pictures” or whatever else your malware would just scan those directories and any real attack likely already does. You’ve only described how having malware on your machine compromises your machine, not exactly a groundbreaking revelation.
Windows hasn’t been my main os for a while but I’m fairly certain you can mount/unmount drives without rebooting. That’s certainly the case on Linux, and my distro definitely tells me what processes are locking drives when applicable.
I work in IT for a living. Sometimes something keeps your drive locked. Windows does not confess. I wasn’t talking about linux user experience because most people don’t use linux like we do.
try making the disk offline and online again using diskmgmt.msc, always worked for me
you also can usually find which process is using the disk. sometimes it’s a windows system process which is very stupid tho
Hmm something does not add up to me very well