Kingston will be closed Thursday, Friday, Saturday and Sunday in observance of the Thanksgiving Holiday.
All orders placed after 11:00 am (PST) on Wednesday November 25th, will not be processed until Monday November 30th.

We wish you and your Family a Happy Holiday!

FAQ(자주 묻는 질문)

기타 질문

ElectroStatic Discharge, ESD is simply the discharge of built up static electricity.ESD should not be taken lightly as this is one of the few things an individual can do to damage or destroy their computer or hardware components.It is like when you rub your feet on the carpet and you touch something metal.ESD can occur without the user feeling a shock and will occur when only working on the inside of the computer or handling hardware.

How to help prevent ESD
The best method of preventing ESD is to use an ESD wrist strap or a grounding mat or table.However, because most users do not have access to these items, we have included the below steps to help reduce the chance of ESD as much as possible.

  • Standing – We recommend that you are standing at all times when working on the computer. Setting on a chair can generate more electrostatic.
  • Cords - Make sure everything is removed from the back of the computer (power cord, mouse, keyboard, etc).
  • Clothes - Make sure not to wear any clothing that conducts a lot of Electrical Charge, such as a wool sweater.
  • Accessories - To help reduce ESD and help prevent other problem, it is also a good idea to remove all jewelry.
  • Weather - Electrical storms can increase the ESD risk; unless absolutely necessary, try not to work on a computer during an electrical storm.In very dry areas, the air itself becomes a part of the electrostatic build-up mechanism every time there is an air flow (wind, air conditioning, blower) passing over an insulated surface.Do not let high humidity levels build a false confidence, and beware of corrosion problems with interconnects and other electrical interfaces.

To learn more about ESD and how to protect your electronics, please refer to the below site.

ESD Association
http://www.esda.org/aboutESD.html

FAQ: KTC-Gen-ESD
Secure Erase User Guide for Linux
This guide will walk you through securely erasing your Kingston SSD using Linux tools

SATA Secure Erase Procedure

Warning
Please make sure to have a full backup of any important data before you proceed!

Prerequisites
• You must have root privileges.
• You must have your SSD connected to the system as a secondary (non-OS) drive.
• You must have lsscsi and hdparm installed. You may need to install them with your distribution’s package manager.
• Your drive must not be in a security freeze.
• Your drive must not be password protected.

Instructions
1. Find the device name (/dev/sdX) of the drive you wish to erase:
# lsscsi

2. Make sure drive security is not frozen:
# hdparm -I /dev/sdX | grep frozen

If the output shows "frozen" (instead of "not frozen") then you cannot continue to the next step. You must try to remove the security freeze by trying one of the following methods:

Method 1: Put the system to sleep (suspend to RAM) and wake it up. On most distributions the command to suspend is:
# systemctl suspend

Now issue the hdparm command again. If it worked the output will show “not frozen” (instead of “frozen”).
Method 2: Hot plug the drive. This is done by physically unplugging the SATA power cable from the drive and plugging it back in while the system is powered on. You may need to enable hot plug in BIOS. Not all systems support hot plug.

Now issue the hdparm command again. If it worked the output will show “not frozen” (instead of “frozen”).

3. Set a user password on the drive. The password can be anything. Here we are setting the password to “p”:
# hdparm --security-set-pass p /dev/sdX

4. Issue the secure erase command to the drive using the same password:
# hdparm --security-erase p /dev/sdX

This command may take a few minutes to complete. The drive password is removed upon successful completion.
If the secure erase is interrupted or otherwise fails your drive may become security locked. In this case you can remove the security lock using the command below and then try the secure erase procedure again:
# hdparm --security-disable p /dev/sdX

SATA Secure Erase Example



NVMe Secure Erase Procedure

Warning
Please make sure to have a full backup of any important data before you proceed!

Prerequisites
• You must have root privileges.
• You must have your SSD connected to the system as a secondary (non-OS) drive.
• You must have nvme-cli installed. You may need to install it with your distribution’s package manager.
• Your drive must not be password protected.

Instructions
1. Find the device name (/dev/nvmeXn1) of the drive you wish to erase:
# nvme list

2. Issue the format command to the drive. Here we set the secure erase setting to 1 which indicates a user data erase:
# nvme format /dev/nvmeXn1 --ses=1

This command may take a few minutes to complete.


NVMe Secure Erase Example

FAQ: KSM-SE-LIX

기술 지원

Questions about a Kingston product you already own? Ask a Kingston expert.

Call Technical Support

Monday-Friday 6 a.m.-6 p.m. PST

+1 (800)435-0640

코로나바이러스(COVID-19)가 HyperX 영업활동에 미치는 영향을 확인하려면 여기를 클릭하십시오.

계속 소식을 받아보십시오! Kingston의 소식 및 자세한 정보를 받아보시려면 당사의 이메일을 등록해 주십시오.