Welcome to new students seminar!! Security is a people problem. forensic proof.com JK Kim
|
|
- Janis Short
- 8 years ago
- Views:
Transcription
1 Welcome to new students seminar!! Data Recovery Security is a people problem proneer.tistory.com JK Kim
2 Outline Data & Recording Method Definition & Classification Recovering data after physical damage Recovering data after logical damage Recovering data after deletion Studies : the trends in the field
3 Data Data is information that can be stored and used by a computer program. In computer science, data is anything in a form suitable for use with a computer. Data is often distinguished from programs. Wikipedia
4 Recording Method Magnetic Recording Hard drive, Recoding tape, credit cards Optical Recording Compact Disk or Digital Versatile Disc Electronic Recording Memory type
5 Definition Data recovery is theprocess ofsalvaging datafromdamaged damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Primary Storage? Often the data are being salvaged from storage media such as hard disk drives, storage tapes, CDs, DVDs, RAID, and other electronics.
6 Classification Recovering dataafter after physical damage Recovering data after logical damage Recovering data after deletion
7 Recovering data after physical damage A wide variety of failures can cause physical damage to storage media. Physical damage always causes at least some data loss. Most physical damage cannot be repaired by end users.
8 Recovering data after physical damage Recovery techniques Hardware repair Removing a damaged PCB (printed circuit board) and replacing it with a matching PCB from a healthy drive. Removing the hard disk platters from the original damaged drive and installing them into a healthy drive.
9 Recovering data after logical damage Power outages Problems with hardware (especially RAID controllers) System Crashes
10 Recovering data after logical damage Recover techniques A mechanism to prevent logical damage Journaling function of file systems Battery backup UPS
11 Recovering data after deletion File System Meta Area Data Area FAT(FAT12, FAT16, FAT32, exfat), NTFS ext2/ext3/ext4, XFS, UFS, HFS/HFS+ HPFS, ISO 9660, Veritas File System(VxFS) ZFS, Embedded File System(EFS)
12 Recovering data after logical damage Recovery techniques Recovery using File System metadata Data carving Overwritten data Recovery
13 Recovery using File System metadata Meta Area Data Area
14 Data carving
15 Recovering overwritten data When data have been physically overwritten on a hard disk it is generally assumedthat the previousdata are nolonger possibleto recover. In 1996, Peter Gutmann, a respected computer scientist, presented a paper that suggested overwritten data could be recovered through the use of Scanning TransmissionElectron Microscopy (STEM).
16 Scanning transmission electron microscopy (STEM)
17 Wiping techniques Fast (1 pass) Russian GOST P (2 passes) British HMG IS5 (Enhanced) (3 passes) US Army AR (3 passes) NAVSO P (RLL) (3 passes) NAVSO P (MFM) (3 passes) DoD M (ECE) (7 passes) Bruce Schneier (7 passes) Peter Gutmann (35passes)
18 Studies : the trends in this field Foremost Linux based program data for recovering deleted files and first published in Uses a configuration file to specify headers and footers to search for. Scalpel Open source program for recovering deleted data originally based on foremost. Presented at the DFRWS conference in 2005.
19 Studies : the trends in this field DFRWS 2006 Challenge 50 MB raw file and has no file system, but it contains file fragments. Extract as many full JPEG, ZIP, HTML, Text, and Office files as possible from it. DFRWS 2007 Challenge 330 MB raw file and has no file system, but it contains many files and file frag (JPEG, ZIP, HTML, Text and Microsoft Office) and multimedia, document, e mail format.
20 Studies : the trends in this field SL Garfinkel, Carving contiguous and fragmented files with fast object validation, SJ Veenman, Statistical disk cluster classification for file carving, G Richard, V Roussev, L Marziale, Ml Cohen, In place File Carving, Advanced carving techniques, Effective Carving (reduce false positive), Smart Carving
21 Question & Answer
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY Supervised By: Dr. Lo ai Tawalbeh New York Institute of Technology (NYIT)-Amman-2006 TOPICS Definition Recovery from what?? Davory SOFTWARE. Restore Software.
More informationOpen Source Data Recovery
Open Source Data Recovery Options and Techniques CALUG MEETING October 2008 !! Disclaimer!! This presentation is not sponsored by any organization of the US Government I am here representing only myself
More informationHARD DISK MANAGER 14 / FULL FEATURES LIST. HDM 14 Suite. Features. HDM 14 Pro. Drive Partitioning. Data Backup & Restore
Features HDM 14 Suite HDM 14 Pro Drive Partitioning Create Partition Express Create Partition Format Partition Delete Partition Undelete Partition Move/Resize Partition Express Resize Partition Redistribute
More informationQUICK RECOVERY FOR RAID
Quick Recovery for RAID Features File Systems Supported Who suffers most Recovery Modes De-Stripper File Recovery Frequently Asked Questions QUICK RECOVERY FOR RAID Quick Recovery for RAID 0, RAID 5. Quick
More informationChapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 8 Secondary Storage McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Distinguish between primary and secondary storage Describe
More informationChapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
More informationQUICK RECOVERY FOR DBASE
QUICK RECOVERY FOR DBASE QUICK RECOVERY FOR DBASE Operation steps Who Suffers most Features 100% data recovery is possible if Recovery Modes Frequently asked Questions Quick Recovery for Dbase Quick Recovery
More informationNSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
More informationMcGraw-Hill Technology Education McGraw-Hill Technology Education
McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
More informationThe Advanced Way Of Data Recovery
The Advanced Way Of Data Recovery Bhagyashri P. Deshpande M.E (P.T) Computer Science Department Prof.Ram Meghe Institute of Engg.& Technology,Badnera bhagyashri41@gmail.com ABSTRACT: Data recovery refers
More informationMFR IT Technical Guides
MFR IT Technical Guides Windows 7 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows Backup... 5 3.2 Windows System Image
More informationdata recovery specialists
data recovery specialists Last year we helped thousands of clients to recover data from media including hard disk drives, RAID, USB drives, tapes and even mobile phones. This is why clients such as MITIE,
More informationPRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013
PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013 CONTENTS Introduction... 3 System Requirements... 4 Install PrivaZer... 5 Uninstall PrivaZer... 9 Scan and Clean C Drive... 11 Scan Options... 20 Cleanup
More informationIntroduction to File Carving
By Christiaan Beek Principal Security Consultant McAfee Foundstone Professional Services Table of Contents Overview 3 File Recovery Versus Carving 3 Fragmentation 5 Tooling 5 An example of using Photorec
More informationQ. If I purchase a product activation key on-line, how long will it take to be sent to me?
Page 1 of 6 Frequently Asked Questions (FAQ) Q. If I purchase a product activation key on-line, how long will it take to be sent to me? A. When you purchase on-line your product activation key is provided
More informationDATA RECOVERY FUNCTION TESTING FOR DIGITAL FORENSIC TOOLS
Chapter 21 DATA RECOVERY FUNCTION TESTING FOR DIGITAL FORENSIC TOOLS Yinghua Guo and Jill Slay Abstract Many digital forensic tools used by investigators were not originally designed for forensic applications.
More informationby Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array!
by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array! WHAT IS THIS ABOUT? BRIEF Coverage ;) Unusual Arrays Intro to RAID About RAID 0 Sight Samples Sound Samples About RAID 5 Demo
More informationFile System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
More informationDiscovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
More informationNCTE Advice Sheet Storage and Backup Advice Sheet 7
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
More informationDeleted File Recovery Tool Testing Results
Deleted File Recovery Tool Testing Results Jim Lyle NIST 1 AAFS Washington CFTT Develop specifications for testing forensic tools Disk Imaging Write Blocking Drive erase for reuse Metadata based deleted
More informationChapter 12 Network Administration and Support
Chapter 12 Network Administration and Support Objectives Manage networked accounts Monitor network performance Protect your servers from data loss Guide to Networking Essentials, Fifth Edition 2 Managing
More informationHP Backup and Recovery Manager
HP Backup and Recovery Manager User Guide Version 1.0 Table of Contents Introduction Installation How to Install Language Support HP Backup and Recovery Manager Reminders Scheduled Backups What Can Be
More informationMANAGING DISK STORAGE
1 Chapter 12 MANAGING DISK STORAGE Chapter 12: MANAGING DISK STORAGE 2 CHAPTER OVERVIEW Understand disk-storage concepts and terminology Distinguish between basic and dynamic storage Identify the types
More informationToday we will learn about:
Storage Devices Today we will learn about: Storage Devices Ancient technology (from my days as a student) Floppies CD_ROM, DVDs Hard drives Magnetic tape Storage versus Memory Memory holds data, programs
More informationThe Evolution of File Carving [The benefits and problems of forensics recovery]
[ Anandabrata Pal and Nasir Memon ] The Evolution of File Carving [The benefits and problems of forensics recovery] BRAND X PICTURES Year by year, the number of computers and other digital devices being
More informationBACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
More informationJust EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
More informationLAVASOFT FILE SHREDDER FILE SHREDDER
LAVASOFT FILE SHREDDER FILE SHREDDER SOFTWARE MANUAL Table of Contents Install and Uninstall 1 Install Using a CD 1 Install Using a File 1 Uninstall the Application 1 Activation 2 What is the Subscription
More informationComputer Forensics: Permanent Erasing
Computer Forensics: Permanent Erasing Prepared By : Yousef T. Aburabie and Mohamd Alomari Supervised By: Dr. Lo ai Tawalbeh, New York Institute of Technology (NYIT)-Jordan s campus-2006 Introduction "Delete"
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationCOMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
More information4 II. Installation. 6 III. Interface specification. 9 1. Partition selection view. 9 1.1. Partition selection panel. 9 1.2.
Contents 2 I. Introduction 4 II. Installation 6 9 1. Partition selection view 9 1.1. Partition selection panel 9 1.2. Information panel 11 1.2.1. Current configuration 11 1.2.2. Storage information 12
More informationTypes Of Storage Device
Types Of Storage Device by AA A POG D EE SRM U Outline Categorizing Storage Devices Magnetic Storage Devices Optical Storage Devices Categorizing Storage Devices Storage devices hold data, even when the
More informationData Loss Prevention (DLP) & Recovery Methodologies
Data Loss Prevention (DLP) & Recovery Methodologies Topics to be Discussed Overview of Types of Storage Devices Prevention Methodologies on storage devices Creating a Backup Plan Testing your Recovery
More informationHow To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
More informationUniversity of Pennsylvania Partner ID# DS75802
University of Pennsylvania Partner ID# DS75802 DriveSavers Data Recovery Contract Price Catalogue DESCRIPTION: Computer data recovery services for all operating systems and media including hard drives,
More informationStorage and File Structure
Storage and File Structure Chapter 10: Storage and File Structure Overview of Physical Storage Media Magnetic Disks RAID Tertiary Storage Storage Access File Organization Organization of Records in Files
More informationImpact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
More information6. Storage and File Structures
ECS-165A WQ 11 110 6. Storage and File Structures Goals Understand the basic concepts underlying different storage media, buffer management, files structures, and organization of records in files. Contents
More informationData recovery Data management Electronic Evidence
Data recovery Data management Electronic Evidence 2 RAID, SAN and Virtual systems RAID, SAN and Virtual systems Data Loss Scenarios: RAID Recovery drive failure Deleted VM recovery Reinstall of ESX on
More informationFile System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
More informationHelp System. Table of Contents
Help System Table of Contents 1 INTRODUCTION...1 2 GETTING STARTED!... 2 2.1 Installation...2 2.2 Wizard...3 2.3 Browse Method:...7 2.4 Search Method:...7 2.5 Surface Scan Method:... 8 3 RECOVERING DELETED
More informationMADR Algorithm to Recover Authenticity from Damage of the Important Data
, pp. 443-452 http://dx.doi.org/10.14257/ijmue.2014.9.12.39 MADR Algorithm to Recover Authenticity from Damage of the Important Data Seong-Ho An 1, * Kihyo Nam 2, Mun-Kweon Jeong 2 and Yong-Rak Choi 1
More informationDr. Lodovico Marziale Managing Partner 504ENSICS, LLC vico@504ensics.com
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC vico@504ensics.com Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the
More informationAvailability Digest. www.availabilitydigest.com. @availabilitydig. Ace Data Recovery December 2014
the Availability Digest @availabilitydig Ace Data Recovery December 2014 Nothing strikes fear in the heart of a corporate executive as much as the loss of some or all of his business data, whether it is
More informationChapter 11 File and Disk Maintenance
Chapter 11 File and Disk Maintenance Detecting and Repairing Disk Errors with Check Disk Physical hard drive problems wear and tear on hard disk. Minimize problem and conserve power with Power Management
More informationRecover Data Like a Forensics Expert Using an Ubuntu Live CD
Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We
More informationHere are my slides from lecture, along with my notes about each slide.
Chapter 3: Storage Here are my slides from lecture, along with my notes about each slide. NOTE: You are expected to attend all class meetings. Please be in the room when class begins and be ready to participate
More informationCHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
More informationFile Recovery: Find Files You Thought Were Lost F 2/1. Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin!
File Recovery: Find Files You Thought Were Lost F 2/1 Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin! With the information in this article you can: Save yourself
More informationKroll Ontrack Data Recovery. Oracle Data Loss: When the best of plans fail
Kroll Ontrack Data Recovery Oracle Data Loss: When the best of plans fail Breaking the Zettabyte barrier Over 1,000,000,000,000,000,000,000 bytes of data exists currently Learning Objectives 1. Identify
More informationComputer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
More informationSUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES
SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES 1. Case Study - Understanding Computers and Computing A computer is an electronic device that can accept, process and store data by following instructions
More informationIncident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
More informationParaben s P2C 4.1. Release Notes
Paraben s P2C 4.1 Release Notes Welcome to Paraben s P2C 4.1! Paraben's P2C is a comprehensive digital forensic analysis tool designed to handle more data, more efficiently while keeping to Paraben's P2
More informationChapter 12: Mass-Storage Systems
Chapter 12: Mass-Storage Systems Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure
More informationDigital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
More informationZero-Downtime MySQL Backups
Zmanda Recovery Manager for MySQL Zero-Downtime MySQL Backups http://www.zmanda.com/ Open Source Backup 1 Zmanda Worldwide Leader in Open Source Backup 1,000,000+ Protected Systems Open Source, Open APIs,
More informationAXF Archive exchange Format: Interchange & Interoperability for Operational Storage and Long-Term Preservation
AXF Archive exchange Format: Interchange & Interoperability for Operational Storage and Long-Term Preservation Report to SMPTE Washington DC Section Bits By the Bay Conference 21 May, 2014 S. Merrill Weiss
More information2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
More informationHard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice
Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice Gareth Davies, Iain Sutherland Faculty of Advanced Technology University of Glamorgan CF37 1DL +44(0)1443 480480 {gddavies,
More informationElectronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
More informationIT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
More informationCSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices
CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 5 Storage Devices 1 1. Computer Data Storage 2. Types of Storage 3. Storage Device Features 4. Other Examples of Storage Device 2 Storage Devices A storage device
More informationActive @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationDIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
More informationHow to recover a failed Storage Spaces
www.storage-spaces-recovery.com How to recover a failed Storage Spaces ReclaiMe Storage Spaces Recovery User Manual 2013 www.storage-spaces-recovery.com Contents Overview... 4 Storage Spaces concepts and
More informationDefining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
More informationSupported File Systems
System Requirements VMware Infrastructure Platforms Hosts vsphere 5.x vsphere 4.x Infrastructure 3.5 (VI3.5) ESX(i) 5.x ESX(i) 4.x ESX(i) 3.5 vcenter Server 5.x (optional) vcenter Server 4.x (optional)
More informationNETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
More informationMicrosoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
More informationRecover My Files v5. Chapter Contents. Published: 18 March 2013 at 12:52:56. Frequently Asked questions... 5. Data Recovery Fundamentals...
Recover My Files v5 Chapter Contents Published: 18 March 2013 at 12:52:56 Frequently Asked questions... 5 Data Recovery Fundamentals... 9 Hardware Recovery... 10 Software Recovery... 11 Chapter 1 Introducing
More informationMFR IT Technical Guides
MFR IT Technical Guides Windows 8.1 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows File History Backup... 5 3.2 Windows
More informationLearning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)
Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter
More informationE-Business Technologies
E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications
More informationCase Study: Quick data recovery using HOT SWAP trick in Data Compass
Case Study: Quick data recovery using HOT SWAP trick in Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition Loss File loss or destruction Virus attack Accidental
More informationWhitepaper - Disaster Recovery with StepWise
Whitepaper - Disaster Recovery with StepWise Copyright Invizion Pty Ltd. All rights reserved. First Published October, 2010 Invizion believes the information in this publication is accurate as of its publication
More informationActive @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
More informationFORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
More informationLecture 18: Reliable Storage
CS 422/522 Design & Implementation of Operating Systems Lecture 18: Reliable Storage Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of
More informationRecover data from a defective Fujitsu desktop drive
Data Compass - Case Study Recover data from a defective Fujitsu desktop drive Symptom: Data on the Fujitsu desktop drive is not accessible directly by the client. The initial diagnosis implies that the
More informationATOLA INSIGHT A New Standard in Data Recovery Technology
ATOLA INSIGHT A New Standard in Data Recovery Technology The Atola Insight is a brand new data recovery product from Atola Technology. It is a full 360 degree solution made by data recovery professionals
More informationIBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
More informationRecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
More informationAns.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
More informationTech Application Chapter 3 STUDY GUIDE
Name: Class: Date: Tech Application Chapter 3 STUDY GUIDE Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. 1. This type of device retains data
More informationSystem Requirements of ActiveImage Protector
System Requirements of Active Protector Server / IT Pro / Cluster / Virtual (Server)Edition for Hyper-V Desktop Edition Linux/Virtual (Linux) Edition OS Windows Server 202/202 R2 Windows Server 2008 (x86/x64)/2008
More informationTowards facilitating reliable recovery of JPEG pictures? P. De Smet
Towards facilitating reliable recovery of JPEG pictures? P. De Smet (edited for public release) patrick.desmet@just.fgov.be http://nicc.fgov.be/datarecovery/ Introduction & disclaimer Aim of this talk:
More informationModule 10: Maintaining Active Directory
Module 10: Maintaining Active Directory Contents Overview 1 Lesson: Introduction to Maintaining Active Directory 2 Lesson: Moving and Defragmenting the Active Directory Database 6 Lesson: Backing Up Active
More informationWith respect to the way of data access we can classify memories as:
Memory Classification With respect to the way of data access we can classify memories as: - random access memories (RAM), - sequentially accessible memory (SAM), - direct access memory (DAM), - contents
More informationAcronis Disk Director 11 Home. User's Guide
Acronis Disk Director 11 Home User's Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone", Acronis
More informationProtect SQL Server 2012 AlwaysOn Availability Group with Hitachi Application Protector
Protect SQL Server 2012 AlwaysOn Availability Group with Hitachi Application Protector Tech Note Nathan Tran The purpose of this tech note is to show how organizations can use Hitachi Applications Protector
More informationHow File Recovery Works
Introduction Mobile / cell phones, digital cameras, MP3 players, laptops, games consoles, GPS sat-nav it seems that on almost every device we use, there is digital information stored on it. The internet,
More informationAcronis True Image 2015 REVIEWERS GUIDE
Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image
More informationHow To Recover A Hard Drive From A Damaged Hard Drive
DataRecoveryMasters.com A division of CTE Computer Data Recovery Submission Form Phone 562-421-7105 Fax: 562-683-2874 Use this form to submit Hard Drive Media To submit CD Media and Camera Memory, use
More informationLukas Limacher Department of Computer Science, ETH. Computer Forensics. September 25, 2014
Lukas Limacher Department of Computer Science, ETH Zürich Computer Forensics September 25, 2014 Contents 9 Computer Forensics 1 91 Objectives 1 92 Introduction 2 921 Incident Response 2 922 Computer Forensics
More informationLab V: File Recovery: Data Layer Revisited
New Mexico Tech Digital Forensics Fall 2006 Lab V: File Recovery: Data Layer Revisited Objectives - Perform searches based on file headers - Data Carving with Foremost - Zip password recovery Procedures
More informationChapter 7 Types of Storage. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 7 Types of Storage Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate between storage devices and storage media Describe the characteristics
More information