Provide situation that once your rigid disk / flash card / memory stick ceases to work normally, and usual not to get data access any more. For those who does not do backups, there comes hard nervous time. In panic the people start looking for programs for data recovery and find them. The majority of them are free that cannot but please the person in our hard time. Whether but everything free programs so effectively recover data? We have carried out couple of tests of several popular programs, and here that at us has turned out.
3 years ago Hi, % %username, I is sure, what yes. And in ours with you forces to make it reality. This post is cast by this discussion where occasionally reached ksenomorf. At us everything will be simpler and more reliable (suddenly the ksenomorf will be forgotten to be fed?)
3 years ago
Once upon a time there was at me the machine with XenServer 6.5 on board and several arrays from SATA disks. Recently the bystodeystviye of SATA has ceased to be enough and it has been decided to replace one array with SAS disks. For these purposes the Adaptec 3805 RAID controler has been found (I know that second-hand articles, but freebie).
After successful creation of the RAID from SAS disks (I repent, used raid adaptekovskiya) and adding this as lvm-storage, has begun transfer of one of images of virtual computers on it. In the course of contemplation of progress of transfer the suspicion about wrong as tone of sounding of the server has changed has crept in. And when the server has gone to independent reset, I have started turning gray gradually? And finally I was finished what after reset I have not found transferable image in one of storages, and the new storage is displayed with the status? not well?.
After short walk for calm of nerves and cup of coffee I have rolled up sleeves (aha, on t-shirt that) and have started thinking as to recover image?
3 years ago
I welcome all Habrovchan! My name is Victor Mrikh. I one of developers program appartnogo the PC-3000 Flash complex which is intended for data recovery from the drives working at memory NAND. Today I would like will share with all the impressions about work with usb the drive Corsair PadLock 2.
3 years, 1 month ago? Any value is controlled only by the one who is able to destroy it? Dune, Frank Herbert
Today the speech how quickly to kill 3.5" the hard drive will go.
About very successful capture by HDD intelligence services:
Importance of proof was so great that for receiving the notebook it was necessary to play the whole scene in library where took Ulbrikht. Agents of FBI (the man and the woman) have begun public quarrel. Ulbrikht has distracted to look at them? and at this moment other agent has quickly pulled out the notebook at it from under hands. Then standard arrest has been made.
In the next hours IT specialists of FBI carefully investigated the notebook and photographed the screen, carefully monitoring that the laptop has not gone to doze mode (with enciphering of information). Then they have made the copy of contents of the hard drive.
On the computer copies of passports and driver's licenses of Ulbrikht, pay-sheets on payment of salary to employees of Silk Road, log of activity of the personnel, scans of identity cards of administrators of Silk Road are found.
The personal diary of Ulbrikht starts since 2010 when Ross had had idea to create the site Silk Road and to sell there cheap hallucinogenic mushrooms which it grew up. Ulbrikht describes everything, than was engaged daily, including the personal purposes, daily work and binges with friends.
Imagine: to you already saw door (which vendor guaranteed that not less than 30 seconds will saw it), and on the hard drive at you there is a lot of interesting. What your actions?
In this overview approach of Hewlett-Packard on the organization of data management system and their protection is described.
Backup and recovery
Requirements to systems of ensuring integrity, data security and their fast recovery in case of emergency situation increase in many modern organizations with growth of data volume, and also requirements to availability of information business systems. As in absolute majority of cases information systems are of unequal importance and criticality for business, the organizations develop qualifiers of the systems which are subject to protection with the indication of requirements for each class (on criticality levels for business).
Treat the main metrics of backup systems of data: ? RPO (Recovery Point Objective)?? restore point?, the relevance moment on which this or that system has to be recovered. ? RTO (Recovery Time Objective)? time for which the system has to be completely recovered. ? Backup window? the time period during which backup of system has to be executed. ? Retention Policy? policy and storage life of backup copies (day, week, monthly, annual) systems.
In the organizations with geographically distributed IT infrastructures features of protection of remote offices and branches are added to above-mentioned requirements: policy of storage of local backup copies, flow capacity of communication link, delay, etc.
3 years, 1 month ago
As of July of last year Apple has sold more than 800 million devices working under control of iOS. More than a half of them? different iPhone models. At such number of devices in the address it is not surprising at all that they often become objects of computer technical expertize (forensics). Different solutions for automation of similar examinations are presented on the market, but the price label on them often does them unavailable. Therefore today we will talk how it is possible to carry out such expertize with the minimum expenses or, in other words, using free and/or open source tools.
It is a little theory
When carrying out examination physical access to the device in most cases is meant, and the expert is faced by two tasks: to retrieve as much as possible data and information from the device and to leave thus as little as possible traces (artifacts). The second task is especially important if results of examination are represented in court: too large number of artifacts can prevent carrying out repeated examination that, in turn, can call results of initial examination into question. In many cases it is impossible to avoid emergence of artifacts; this problem is tried to be solved, in detail documenting the artifacts created at different stages of carrying out research.
3 years, 1 month ago
Has passed half a year from the moment of the announcement of solution of Veeam Endpoint Backup Free at the VeeamON conference. During this time we have managed to let out product beta, to distribute it to about 20 thousand people and to hold large-scale testing with their help to reveal? children's diseases? programs. And today, we with pleasure represent the final version of the program.
By means of the program you can make backup of your computer, its volumes (disks) or simply files and folders. And then to recover your data at failure of system, fault of the hard drive, damage or accidental removal of the file.
For those who has not found time yet to look that the product is, I have prepared the overview of its main opportunities and any useful trifles. Welcome under kat.
3 years, 1 month ago
After you have transferred Exchange to virtual rails, it is time to start backup, and in case of need? to recovery. Today I in brief will tell how it can be made by means of Veeam Backup &Replication 8.0, and also I will share links to sources of more detailed information.
Drawings of the forgotten processors, source codes of legendary games, unknown works of art — that not found only in archives by fans of old times. Their task — to recover, reliably to save and catalog.
Can seem that we live in century when information is almost not capable to be lost: that once it has been digitized or created on the computer, will be, have it though some value, to be replicated and eternally to wander from one digital medium on another. It, unfortunately, not absolutely so: standards and formats change with amazing speed, and information mediums (in particular — magnetic disks) have the extremely limited service life. "The digital archeology" — that is extraction of data from old carriers and recoding in modern formats becomes more and more actual discipline. In this area there are specialists, and over and over again there are stories how they have heroically retrieved something from digital ruins, having indisputable value.