DATA RECOVERY: BEST PRACTICES FOR SERVICE PROVIDERS
|
|
|
- Mervin McDaniel
- 10 years ago
- Views:
Transcription
1 Author: Jonathan Yaeger 2014 by Data Savers LLC. All rights reserved. DATA RECOVERY: BEST PRACTICES FOR SERVICE PROVIDERS OVERVIEW Computer service centers encounter failed hard drives. Data recovery can be a revenue source, but it must be wisely and carefully done. Well-intentioned but illinformed efforts and practices can reduce or even ruin the prospects for successful recovery, and they can even expose the provider to legal liability. As in medicine, the main precept of data recovery is first, do no harm. The purpose of this article is to share basic data recovery practices intended to minimize the chances of harming a drive during the initial diagnostic and imaging (or copying) phases of the data recovery process. The article will present general principles as well as specific examples. THE LEARNING CURVE Gaining expertise in data recovery is neither a quick nor easy process. There are many different drive makes and models; what works for one brand may not apply to another. Models from the same manufacturer can be markedly different in construction and operation. A huge amount of technical information and details must be absorbed and mastered to become even modestly adept. Hard drive manufacturers are frugal about releasing technical details of their products because they want to safeguard their intellectual property and trade secrets. Good drive diagnostic and firmware tools are expensive. Comprehensive training on how to use them is also generally expensive, when available. Most third-party data recovery training classes provide only a cursory introduction; there is no substitute for hours of hands-on experience. Although much of what data recovery technicians learn and use comes from trial and error, it is important not to get one s education at the client s expense. We receive a lot of drives that have been worked on by other technicians. A fair number of those have been damaged or ruined along with the chances of
2 recovery by mistake. Incorporating a set of best practices for hard drive data recovery can improve the outcomes and be beneficial to all concerned. GENERAL PRINCIPLES 1. Recognize your own limitations. A customer s best interests should be top priority. Resist the temptation to experiment or gamble with a client s data you can make things much worse! If you don t have the knowledge, equipment, experience and confidence to tackle a particular recovery job, then simply stop. It is better to pass on a service opportunity than to ruin forever a client s chances of getting back data. Note that recovery pros sometimes sub out difficult jobs to others with specialized expertise, if it will ultimately benefit the client. 2. Proper diagnosis is essential. You can t fix the problem unless you are sure what it is. However, you can make things worse by randomly trying things without understanding the nature of the failure. Fig. 1 Data recovery requires the proper tools.
3 3. If you don t have the proper tools, don t try to improvise. If you must open the sealed chamber of a hard drive, do it only in a certified clean environment, which isn't a kitchen, bathroom, or garage. 4. Don t do something that can t be undone later on. Keep a path open to the previous step so you can restore the drive to the same condition as you received it, if possible. 5. Document and label everything. Record every step that you take in a recovery effort. It will help you or the next technician later. If you take good notes, you can build a library of how to steps for the next drive with similar issues. Put a label on each item of clients' property, including cables, to make sure that they receive all of their property back and that it is not commingled with someone else s. Label the drive s PCB to be sure that the original is restored if swapped. Fig. 2 Label everything. 6. Try a new procedure on a test drive first. Sometimes a new process or procedure will ruin a drive. Don t let it be a client s drive. 7. You can't use a software tool to compensate for a hardware problem. If a drive is failing, trying to copy the data without fixing the underlying hardware issue is a recipe for disaster; the drive may fail and become unrecoverable. Learn to recognize hardware failure patterns, and when to stop what you are doing.
4 8. Look under the streetlight. Use your five senses to examine a drive prior to working on it. A problem might be obvious if you take the time to look. A misdiagnosis not only wastes time, but also can put data at risk. 9. Treat all data as confidential data. The client s data is valuable. Do not expose it to security risk or loss. After a recovery is complete, securely wipe any media used in the process and confirm the erasure. 10. Be honest and ethical. Of all the best practices, this is by far the most important. The Golden Rule certainly applies. Doctors have learned that the best policy with patients is to be candid and forthright, and so it is with data recovery. INITIAL EVALUATION: EXTERNAL APPEARANCES The first step in the recovery process is to try to get a history from the client, i.e., what happened when the drive failed? Was it dropped? Was there a power outage? Clients may not have additional information, but when they do, it can be invaluable. What do your senses tell you? Is the lid bent at a corner? Are there other signs of physical damage that suggest the drive had been dropped or abused? The practice of looking under the streetlight means that you should take time to study a drive before doing anything. You may find obvious as well as hidden problems that will affect the diagnosis and dictate the course of the recovery. Overlooking a problem can result in wasted time and, sometimes, in loss of data. EXAMINING THE PC BOARD Examine the PC board area, especially with laptop hard drives. Is there any sign of fluid contamination or corrosion on the board? Does the drive smell like coffee or wine? Is it sticky? If so, there is contamination and likely PCB damage. A drive that has been under water should be opened in a clean room as well, to check for fluid contamination on the inside. All contamination must be removed before the recovery process can commence. Are there burned areas on the circuit board?
5 Fig. 3 A burned motor integrated circuit. Figure 3 shows a burned motor chip on a PCB of a drive that no surprise did not spin up. Other PCB-related problems besides corrosion and contamination include damaged or defective parts. Fig. 4 A PCB showing a ROM chip.
6 Most hard drive circuit boards contain unique information about the particular drive, either as part of a ROM (usually an EEPROM, or Electrically Erasable and Programmable Read-Only Memory circuit or chip ), or embedded into the main processor. This unique information is called adaptive information or firmware. Figure 4 shows a laptop PCB and the placement of the ROM on the board. RULE: You can t just replace a damaged PCB without transferring the adaptive information to the replacement PCB, a process that requires special equipment. The days of simply swapping PCBs are largely over. Sometimes service centers will swap a PCB and not tell the customer, or sometimes they discard the bad PCB. This makes future recovery efforts much more difficult and sometimes even impossible. Please note that recovery of Toshiba laptop drives and the newer Seagate drives in the F3 series may not be possible without their original PCB adaptive information. RULE: Best practices dictate returning the bad drive with the original PCB attached, even if damaged, if the data cannot be fully recovered. BEFORE APPLYING POWER TO A DRIVE Fig. 5 Damaged heads in a parking ramp.
7 RULE: Do not apply power to a drive that you know or suspect has been dropped or subjected to shock! A drive that has been immersed in liquids or otherwise contaminated also shouldn't be powered. Read on to learn why. Hard drives are amazing collections of high-tech mechanics, electronics, and internal software programs (also called firmware), but they are also very delicate machines. During operation, tiny read-write heads fly over the data platters. There is a very tiny gap between the heads and the platters. If a drive receives a physical shock, the heads may crash into the platters, resulting in damage to both the heads and the platters. Sometimes damage may occur to the delicate heads if the drive is dropped when powered off. Figure 5 shows a set of mangled heads sitting in the parking ramp. Fig. 6 A scratched and contaminated head (magnified). Figure 6 shows a close-up of a head damaged by a head crash. The head has scratched the media, and some of the drive s magnetic media is now tiny particles of metallic dust. Damaged platter areas are unrecoverable. As soon as the drive is turned on, the deformed heads will move onto the platter and act like sandpaper or tiny knives, scraping data away along with the chance of recovery.
8 The debris kicked up by the process acts like large boulders randomly dropped onto a highway, meaning more crashes will follow. Particles larger than 0.25 microns cannot pass through the air cushion gap between the head and the platter. For perspective, the diameter of a human hair is on average about 80 microns, which is 320 times larger. Figure 7 shows what the drive will look like if it is operated with crashed heads. In this particular case, the data is gone for good; the client s data is in the filter. Fig. 7 A hard drive with a head crash and media damage. Drives with slight media damage often can be recovered, though sometimes only partial recovery is possible; it depends on the extent of the damage. Working with media-damaged drives is a specialty, and some data recovery companies produce better results than others. At this point, it should be clear that platter and head inspection are an important diagnostic part of the data recovery process, but only in a true clean room environment.
9 OPENING THE SEALED CHAMBER OF A HARD DRIVE It is never a good idea to open up a hard drive outside of a clean room environment. Why? Because, as previously noted, it only takes a small particle to cause a head crash, and if you open a drive outside of a clean room environment, you will contaminate the drive and increase the chances of premature failure or no recovery. Opening a crashed drive in a clean room can contaminate the work area, too. Sometimes removing the lid of a perfectly good drive can also contaminate the sealed chamber; debris often accumulates around the lid s seal. Fig. 8 Close-up views of drive contamination.
10 Another reason to not break the seal of a hard drive? If you are not authorized by the manufacturer to do so, you will void the warranty. Resist the urge to peek. Send the drive to a professional if clean room service is indicated. Many professional data recovery firms charge little or nothing for inspecting a drive prior to recovery. APPLYING POWER TO A DRIVE The temptation is usually unavoidable, but a dropped drive should not be powered up without a clean room inspection of the heads and media. Ask your client if the drive was dropped. Unless you have a clean room and the experience and expertise, it s a good idea to refer dropped drives to qualified data recovery labs. You may safely assume that the client has attempted to access the drive until a point of defeat was acknowledged. Sometimes it is just a matter of a few seconds of operation of a mechanically failed drive that later results in a difficult or impossible recovery job. Once that you are satisfied that a drive is safe to power up, listen carefully to it. Drives that make unusual noises, especially scraping and high-pitched sounds, should be shut off immediately. Unusual drive noises often indicate damage in progress. Whenever there is uncertainty, always err on the side of caution. IMAGING A DRIVE A fundamental best practice of data recovery is to make a copy, or image, of the defective drive, then do the file recovery from the image. There are good reasons for this practice: 1. A failing hard drive may have a limited number of hours of operation left before it fails completely. It s best to try to get the data off a drive as quickly as possible, and with minimal damage to the original drive. 2. Sometimes more than one file recovery algorithm is required for optimal results. An image allows multiple recovery passes, whereas sometimes you get one shot with a failing drive. 3. The drive image is an archive of the original data and is often the only useful one. It is important to understand how hard drives process read errors and perform other background tasks during normal operation.
11 Hard drives incorporate housekeeping routines into their firmware. These run in the background and are invisible to the end user. One standard routine is defect management, in which data in weak or failing sectors are moved to another region of the drive. The bad sectors are marked out and added to the grown defect list, also called the G-List. Another housekeeping function is regularly updating the drive s S.M.A.R.T. (Self- Monitoring, Analysis and Reporting Technology) logs. These logs keep track of attributes of a drive s performance; examples include the number of times the drive is started up, the inability to read sectors, and updates to error logs. These attributes are expressed in terms of threshold exceeded and threshold not exceeded values, which can provide an early warning of a drive s impending failure (Figure 9). Fig. 9 S.M.A.R.T. attributes display. Hard drives often fail in a cascading mode. For example, a drive s head might become dirty and fail to read or write data. Good sectors will be reported as bad, and the drive will try to move the data to another sector (i.e., through reallocation). If it cannot successfully write to the new location and verify the written data, it will report the new sector as bad, too. Each time it moves an allegedly bad sector, it will update both the G-List and S.M.A.R.T. logs. The drive suffers a vicious cycle that interferes with imaging and eventually can lead to complete drive failure. Therefore, if the bad sector and S.M.A.R.T. management processes can be turned off during imaging, the chances of a successful and more complete image are greater.
12 SOFTWARE VERSUS HARDWARE IMAGING Hard drives may be duplicated (or imaged) by computers using software programs for that purpose. Drives can also be copied by hardware imaging, using specially designed circuit boards or dedicated machines. Some hardware imagers have features that greatly surpass software-only capabilities. They can: Disable defect management and S.M.A.R.T. attribute processing; Permit multiple recovery passes on a failing hard drive; Adjust the speed and depth of the reading process by adjusting the types of resets, number of attempts to read each bad sector, etc.; Build a heads map and image by head; Turn off imaging or power, jump to a different head, skip a pre-assigned number of sectors, etc. upon programmed conditions; Have dedicated imagers that make faster imaging (versus PCs running software); Support file imaging by MFT or other directory structures. According to Serge Shirobokov of DeepSpar, Inc., Regarding the software vs hardware imaging section, the biggest difference between the two is probably the fact that hardware can automatically reset drives on timeout and software just has to wait... If a read command falls on a bad area, hardware tools can limit the damage from that by cutting the processing time down to a few hundred milliseconds (then resetting the drive), while software must wait the full few seconds for a drive to come back with an error. This alone makes hardware imaging multiple times less damaging. Because most drives presented for data recovery are unhealthy by definition, using a hardware-based imaging solution is generally considered a best practice. When software imaging, it is a good idea to use a write blocker with software imaging tools, because a PC may try to initialize a drive and can overwrite important boot or partition information. Write blockers permit reading from a drive, but block attempts to write or change data. Most are hardware devices, but some use software. Note that a write blocker usually does not prevent a drive from updating the S.M.A.R.T. or the G-List. Unix s dd command-line instruction is sometimes suitable for making a drive image because it can copy sectors that are not part of the active directory, including erased files.
13 On the other hand, DOS command-line instructions such as XCOPY are only good for copying files that are listed in a directory. If the directory is corrupted, or files have been erased, XCOPY will skip those files. There are a number of off the shelf utility programs for disk imaging. Software imaging solutions work well with healthy hard drives. However, they are limited, and possibly harmful, when working with problem drives such as those with many bad sectors, firmware issues, or failing heads. As noted, the best way to work with a defective drive is to turn off the drive s defect processing (called sector reallocation) and to disable the S.M.A.R.T. logging function. This reduces the chances that the drive will self-destruct during the imaging process. However, turning off sector reallocation requires a vendor command, i.e., code specifically written for a particular drive, model, or series. Some of these commands are proprietary and are not generally published. A viable software solution would have to incorporate the vendor commands and have a means of matching the commands to the drive to be imaged. For the tech-savvy: The BIOS of most PCs offers a menu choice to turn off S.M.A.R.T. notifications of impending drive failure, but that feature does not affect the internal S.M.A.R.T. operations of the hard drive. A standard ATA command to disable a drive s S.M.A.R.T. operations is described in section 7.52 of the T13 ATA standard, which states: This command disables all S.M.A.R.T. capabilities within the device including any and all timer and event count functions related exclusively to this feature. 6 The command is B0h with a Feature register value of D9h WHEN TO STOP IMAGING Remembering that a main precept of data recovery is first, do no harm, it s critical to recognize when to stop, or when continuing is likely to do more harm than good. Stop imaging when: 1. The drive makes clicking or other unhealthy noises; 2. The drive fails to come ready, or aborts; 3. The drive exhibits signs of cascading failure, i.e., one or more heads that were working when the process was started begin to fail.
14 A gray area is when there is a high unread or bad sector count. Sometimes it is hard to tell if this is due to media degradation (bad sectors), logic board failure, or another cause. A head may spontaneously fail during the image process. The drive may be able to finish imaging the data on the remaining heads, or it may crater and cause a ring of damage and widespread contamination. At this point, having a clean room and the appropriate tools might save the recovery and a client s data. RAIDS A RAID originally stood for a redundant array of inexpensive disks, which later became an independent array of independent disks. Nonetheless, a RAID is a storage system that has more than one drive. RAIDs have level classifications, such as RAID 0, RAID 1, RAID 5 or RAID 10. The Wikipedia entry for RAID gives a good overview: Fig. 10 Configurable four-drive RAID array with front panel removed.
15 ARAID 0 consisting of two drives isn t redundant at all and, as such, is misnamed. Both hard drives have to be recovered to get useful data from a RAID 0. The redundancy feature of true RAIDs permits one or more drives of the array to fail and still retain functionality. The RAID senses the failure and adjusts the reading and writing of data accordingly. For example, a single drive from a three-drive RAID 5 can fail. If a technician replaces the defective drive with another, the RAID knows or prompts the user to rebuild the RAID using the new drive. However, if two drives fail in the RAID 5 configuration, data recovery is required; the RAID can t rebuild from only one good drive. The capability of automatic or semi-automatic RAID recovery after a drive failure is a great feature for the client, but if it's not completely understood by the technician, experimenting with a failed RAID array can compromise or even defeat subsequent data recovery attempts. It s easy to get into trouble if you don t know what you are doing. Best practice rules for RAIDs: 1. If you don t know precisely what you are doing, stop what you are doing. 2. Drives should never be swapped around and placed in different positions in a RAID. Fig. 11 A RAID configurable switch.
16 3. Figure 11 shows the configuration selector for the above RAID, which allows it to be set up in different RAID levels or modes. Never change the mode on the fly. This will cause severe data corruption. 4. The best practice when working with a problematic RAID is to make or clone copy of every drive, then work on the copy only. This will preserve the original RAID in as received condition, using the general principles of do no harm and don t do anything you can t undo later. POST-IMAGE PROCESSING Generally, data recovery software (to rebuild files and folders) is run on the image to try to recover lost files, rebuild directories, etc. Another reason for running recovery software, versus simply copying data, is that most programs fix permissions issues with the recovered data set. There are several data recovery programs, and each seems to have a particular set of strengths and weaknesses. There is not a single program that is consistently the best. GOING FORWARD Try to incorporate the General Principles (listed at the beginning) underlying best practices of data recovery. Strive to always do what is in the best interest of the customer, whenever there is a choice, and know your limits. Data recovery is an art as well as a science, but there is no substitute for knowledge acquired through experience.
Media Damage and Hard Drive Data Recovery. The term media refers to the platters. Data resides on the platter surfaces.
Media Damage and Hard Drive Data Recovery Many clients are stunned to learn that their hard drives have suffered a head crash, resulting in significant internal damage. But I only dropped it a few (inches
Forensics and Hard Drive Data Imaging & Recovery: The Perils and Pitfalls of Working with Defective Hard Drives
Forensics and Hard Drive Data Imaging & Recovery: The Perils and Pitfalls of Working with Defective Hard Drives By Jonathan R. Yaeger April 22, 2013 Data Savers, LLC (770) 939-9363 [email protected]
Hard Drive Diagnostics With Scott Moulton. Hard Drive Data Recovery Forensics SANS 2010 1
Hard Drive Diagnostics With Scott Moulton Hard Drive Data Recovery Forensics SANS 2010 1 Goals of this Speech! 1. Give you useful knowledge you can take away and use right now. 2. Make sure you know what
Case Study: Quick data recovery using HOT SWAP trick in Data Compass
Case Study: Quick data recovery using HOT SWAP trick in Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition Loss File loss or destruction Virus attack Accidental
Intel Matrix Storage Console
Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
Intel RAID Controllers
Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications
Data recovery from a drive with physical defects within the firmware Service Area, unrecoverable using
SalvationDATA Data Recovery Example Application: Image from the HDD with serious bad sectors in the Data Area by Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition
data recovery specialists
data recovery specialists Last year we helped thousands of clients to recover data from media including hard disk drives, RAID, USB drives, tapes and even mobile phones. This is why clients such as MITIE,
Manage the RAID system from event log
Manage the RAID system from event log Tim Chung Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201001-ALL lntroduction Event log records the information
Offline Array Recovery Procedures SuperTrak SX6000 and UltraTrak
Version 5a Offline Array Recovery Procedures SuperTrak SX6000 and UltraTrak This document describes the procedures for protecting data and restoring array status to arrays that have gone OFFLINE. Promise
User Guide Replica Automatic Backup System
User Guide Replica Automatic Backup System 2009 Seagate Technology Contents 1 Getting Started with the Seagate Replica Automatic Backup System...4 Replica s First Steps...4 Safely Disconnect...4 Using
ATOLA INSIGHT A New Standard in Data Recovery Technology
ATOLA INSIGHT A New Standard in Data Recovery Technology The Atola Insight is a brand new data recovery product from Atola Technology. It is a full 360 degree solution made by data recovery professionals
1 of 10 2009-08-25 02:01
1 of 10 2009-08-25 02:01 Forum search Hot News! Home Products Contacts Support Order now Register Our certificates Our previous site 2 of 10 2009-08-25 02:01 PC-3000 for Windows What is PC-3000 for Windows?
1. Introduction... 3 Introduction...2. 4. Deal command... 13
Dealer4 PC Software User Manual Service Software Manual ver:ver: 1.11.2 1. Introduction... 3 Introduction...2 2.1 Main Menu... 4 2.1. Main Menu window...4 Summary of additional functions...3 2.2. Board
Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD
In order to fulfil the operational needs, different web hosting providers offer different models of hard drives. While some web hosts provide Enterprise HDDs, which although comparatively expensive, offer
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
Disk Imaging: A Vital Step in Data Recovery
White Paper Disk Imaging: A Vital Step in Data Recovery Andrei Shirobokov Chief Technology Officer DeepSpar Data Recovery Systems http://www.deepspar.com [email protected] Abstract Many data recovery
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
Recover data from a defective Fujitsu desktop drive
Data Compass - Case Study Recover data from a defective Fujitsu desktop drive Symptom: Data on the Fujitsu desktop drive is not accessible directly by the client. The initial diagnosis implies that the
True Data Disaster Recovery. PRESENTATION TITLE GOES HERE Matthew Kinderwater icube Development (Calgary) Ltd.
PRESENTATION TITLE GOES HERE Matthew Kinderwater icube Development (Calgary) Ltd. Who We Are: Provide data recovery / data redundancy / disaster plan consulting services worldwide. Operate one of the largest
Backing Up and Restoring Software
Backing Up and Restoring Software This chapter introduces the procedures you ll use to back up and restore the MCS software operating system, database, and applications software with the BackMaster utility.
MAP ENGINE MAINTENANCE
MAP ENGINE MAINTENANCE In order to ensure that PressureMAP will continue to provide years of uninterrupted service, it is important to perform simple, routine maintenance periodically on the MAP Engine
Backing up Data. You have lots of different options for backing up data, different methods offer different protection.
Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
2» 10» 18» 26» PD3 34 00 42»
» STARDOM Safe Capsule Series User Manual... 2» STARDOM Safe Capsule Serie Bedienungsanleitung... 10» Série STARDOM Safe Capsule Manuel de l utilisateur... 18 26 PD3500 34» Manual de usuario de STARDOM
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
BACKUP AND RECOVERY File History + Push Button Reset + Advanced Recovery Tools + System Image Backup
BACKUP AND RECOVERY File History + Push Button Reset + Advanced Recovery Tools + System Image Backup The new Windows includes tools that can help you protect your documents and other important data, restore
Intel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
MFR IT Technical Guides
MFR IT Technical Guides Windows 7 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows Backup... 5 3.2 Windows System Image
MRT Advanced HDD Repair and Data Recovery Training Course
MRT Advanced HDD Repair and Data Recovery Training Course The First Day A.M. Western Digital Course 1. The course overview based on the MRT data recovery 2. WD start-up procedures 3. How to handle due
STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual
STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual Copyright 2001 by Stellar Information Systems Ltd. All Rights Reserved The information contained in this documentation is subject to
Basics of Preventive Maintenance and Troubleshooting DRAFT
9781587132636_ch04.qxp 8/20/10 1:37 PM Page 103 CHAPTER 4 Basics of Preventive Maintenance and Troubleshooting Objectives Upon completion of this chapter, you should be able to answer the following questions:
Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?
Windows Q & A April 2012 By Mary Phillips, Secretary, Icon Users Group, MO April 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network www.iconusersgroup.com [email protected]
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
Clickfree Software User Guide
Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.
Table of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
Chapter 12 Network Administration and Support
Chapter 12 Network Administration and Support Objectives Manage networked accounts Monitor network performance Protect your servers from data loss Guide to Networking Essentials, Fifth Edition 2 Managing
ESATA PCI CARD. User s Manual
ESATA PCI CARD User s Manual Introduction... 3 System Requirements... 3 RAID Introduction... 3 BIOS Configuration Utility... 5 Configuring Arrays... 5 RAID Mode Definitions... 5 BIOS Configuration Utility...
TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS
TECHNOLOGY BRIEF August 1999 Compaq Computer Corporation Prepared by ISSD Technology Communications CONTENTS Executive Summary 1 Introduction 3 Subsystem Technology 3 Processor 3 SCSI Chip4 PCI Bridge
Understanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
How to Start a Data Recovery Business?
How to Start a Data Recovery Business? How to start a data recovery business? Who are the data recovery customers? What are their demands? Where to find the best data recovery equipments and tools? What
Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment
Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment Version 2.0 This tutorial will walk you through how to create a bootable USB drive to enter into a WINPE
ATOLA INSIGHT. A New Standard In Data Recovery Equipment
ATOLA INSIGHT A New Standard In Data Recovery Equipment The Atola Insight is a brand new data recovery solution from Atola, creators of AFF Repair Station and HDD Unlock Wizard. It is a full, 360 degree
Forensic Imaging of Hard Disk Drives
This white paper explores the area of a hard disk drive not usually examined for data, what it is and how to access it Forensic Imaging of Hard Disk Drives -What we thought we knew By Todd G. Shipley and
HP Notebook Hard Drives & Solid State Drives. Identifying, Preventing, Diagnosing and Recovering from Drive Failures. Care and Maintenance Measures
HP Notebook Hard Drives & Solid State Drives Identifying, Preventing, Diagnosing and Recovering from Drive Failures Care and Maintenance Measures Technical White Paper Table of contents Identifying, Preventing,
Getting Started. rp5800, rp5700 and rp3000 Models
Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Auslogics BoostSpeed 5 Manual
Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...
Intel Matrix Storage Manager 8.x
Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement
MaxAttach NAS 4000 Series MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement DOCUMENT OVERVIEW Who Should Use This Instruction Set This MaxAttach NAS 4000 Series by Maxtor HDD Replacement Instruction
AMD SP5100 Dot Hill SATA RAID Users Manual V100
AMD SP5100 Dot Hill SATA RAID Users Manual V100 1 Table of Contents Section 1 Dot Hill Firmware Overview Firmware Overview Page 3 Firmware Option Rom/Firmware Overview Page 3 Firmware Menus Page 4 Initialize
Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.
Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces
Suite. How to Use GrandMaster Suite. Backup and Restore
Suite How to Use GrandMaster Suite Backup and Restore This page intentionally left blank Backup and Restore 3 Table of Contents: HOW TO USE GRANDMASTER SUITE - PAYROLL BACKUP AND RESTORE...4 OVERVIEW...4
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
T R O U B L E S H O O T I N G T I P S
T R O U B L E S H O O T I N G T I P S D I C T A T I O N M O D U L E 1.) PROBLEM: MEMORY ERROR/FORMAT MESSAGE OR LOCK SYMBOL ON RECORDER A.) Solution: DO NOT TRY TO USE THE RECORDER. Using the recorder
RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.
RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running
Taurus Super-S3 LCM. Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives. User Manual March 31, 2014 v1.2 www.akitio.
Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives User Manual March 31, 2014 v1.2 www.akitio.com EN Table of Contents Table of Contents 1 Introduction... 1 1.1 Technical Specifications...
RAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
Using RAID Admin and Disk Utility
Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under
Enterprise-class versus Desktopclass
Enterprise-class versus Desktopclass Hard Drives April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial Release Modifications Disclaimers
Computer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000 Richard Leickly and David Angell Circle Hook Data Recovery { Richard, David}@CircleHookDR.com
HP One-Button Disaster Recovery Solution for ProLiant Servers
HP One-Button Disaster Recovery Solution for ProLiant Servers Reference Guide Legal notices Never leverage legal and notice information. For the most current requirements, refer to HP Standard 004-0 Legal
LG External HDD Hard Disk Drive XG1
LG External HDD Hard Disk Drive XG1 - Thank you for purchasing this product. - This user manual contains instructions on how to use the product properly. - Please read this manual carefully. - Be sure
Installing a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.
Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common
Seagate File Recovery Software for Windows - User Guide August 2015
Seagate Recovery Services Seagate File Recovery Software for Windows - User Guide August 2015 The Seagate File Recovery for Windows PC support includes:: - - - - - - -) these specific error messages: broken
Backing up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
DAZZLE INTEGRATED DATA BACKUP FEATURE.
DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup
Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1
Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
The Fallacy of Software Write Protection in Computer Forensics Mark Menz & Steve Bress Version 2.4 May 2, 2004
The Fallacy of Software Write Protection in Computer Forensics Mark Menz & Steve Bress Version 2.4 May 2, 2004 1.0 Table of Contents 1. Table of Contents 2. Abstract 3. Introduction 4. Problems a. Controlled
View CPU, Memory, Disk, and Network Usage in Activity Monitor.
Identify and quit applications that have become nonresponsive. Identify support options customized for your Mac. View CPU, Memory, Disk, and Network Usage in Activity Monitor. 98_9780789753939_ch5online.indd
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
Only smart people read the manual.
Only smart people read the manual. Contents Getting Started... 1 Safely Turning Your Drive On and Off... 1 Disconnecting esata and 1394 Devices... 2 esata Devices... 2 1394 Devices... 3 Installing FreeAgent
Infiniium Upgrade and Recovery Guide
Infiniium Upgrade and Recovery Guide For detailed upgrade and recovery instructions, find the section of this document that pertains to your particular model number. If your model number is not printed
Using iscsi with BackupAssist. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...
Intel Data Migration Software
User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY
ITE RAID Controller USER MANUAL
ITE RAID Controller USER MANUAL 120410096E1N Copyright Copyright 2004. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system or translated
HP ProLiant PRO Management Pack (v 2.0) for Microsoft System Center User Guide
HP ProLiant PRO Management Pack (v 2.0) for Microsoft System Center User Guide Abstract This guide provides information on using the HP ProLiant PRO Management Pack for Microsoft System Center version
Practical issues in DIY RAID Recovery
www.freeraidrecovery.com Practical issues in DIY RAID Recovery Based on years of technical support experience 2012 www.freeraidrecovery.com This guide is provided to supplement our ReclaiMe Free RAID Recovery
SiS964 RAID. User s Manual. Edition. Trademarks V1.0 P/N: 91-187-U49-M2-0E
SiS964 RAID User s Manual Edition V1.0 P/N: 91-187-U49-M2-0E Trademarks All brand or product names mentioned are trademarks or registered trademarks of their respective holders. CONTENTS Introduction...
If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
TotalShredder USB. User s Guide
TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without
your Apple warranty; see http://www.drivesavers.com/. There are two main failure modes for a mirrored RAID 1 set:
48981c03.qxd 12/6/07 8:56 PM Page 142 142 File Systems RAID set creation takes only a few moments, and once it s complete, you should see new RAID set volume in the Disk Utility list and in the Finder.
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card
RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility
Beckhoff onboard SATA-RAID
Installation and operating instructions for Beckhoff onboard SATA-RAID Version: 1.3 Date: 2009-07-24 Table of contents Table of contents 1. 2. 3. 4. 5. 6. 7. General notes 2 Notes on the documentation
