Wednesday 29 February 2012

Data Recovery 1 on 1

For this weeks report we are talking with Greg Duffield of ACS Data Recovery

Q: Greg, since the late '90's there has been tremendous growth within the data recovery industry, why is that and what does it mean to the consumer?

A: Well, in the last 10 years the amount of data stored digitally has increased tremendously. With this trend towards simplification of file storage, the trend for losing this data has also increased.

Before computers you had to worry about your office burning down, or some other man-made or natural disaster that might have effected your paper files. Now with just about everything stored on computers, the fear is no different and the possibilities of catastrophic data loss occuring are actually greater.

The end result has been an influx of data recovery firms throughout the world assisting consumers with the recovery of their lost data. The benefit and the downfall to the consumer is having these companies openly competing for their business.

Q: The open competition is a downfall to the consumer as well?

A: Absolutely. For some companies, data recovery has become the latest "get rich quick" scheme. So they shop the market, see what the trends in the industry are and then offer subpar services at a substantially discounted rate. Many of these companies advertise complete data recovery for as little as $99 with no evaluation fees. Unfortunately for the consumer, this usually results in hidden service charges, and additional expense when the data is found "unrecoverable". The sad part is, is that much of this data is actually recoverable, but the firm attempting the recovery just didn't have the expertise to complete the task successfully.

Q: How do you see this effecting the data recovery industry as a whole?

A: I think the firms dedicated to providing their customers quality service will stand out no matter what. People like to make fun of used car dealers, well in that industry there are real sleaze balls and at the same time there are class-A superior dealers that really do what is right. You see the same thing in every industry, and data recovery is no different.

Q: What should the consumer expect when they have lost their important data due to a hard drive crash or other calamity?

A: First of all, they will probably get a wide range of prices. On average I would say pricing for a standard IDE hard drive will probably run anywhere from $700 to $2,900. That's a pretty big spread.

I would say stick with companies that do not charge an evaluation fee first and foremost. Many times an experienced data recovery technician can determine the type of hard drive failure within the first few seconds of starting the drive up. You know you're either going to have to open the drive or your not. That element alone has a tremendous impact on the final price of the recovery and it can narrow the price band substantially.

When you send your drive in, don't expect it to be completed overnight. We try to give our customers reasonable expectations, because there's nothing worse than making promises you can't keep. We basically run our business by under promising and over delivering. We are up front with our customers and we know the boundaries of data recovery as far as what is and isn't possible. As a consumer I would suggest you search until you find companies with a similar business philosophy. In other words, be wary of companies promising complete data recovery in less than 24-hours. Depending on the amount of data needing to be recovered it can take that long just for the imaging.

Q: Where do you see data recovery going in the future?

A: I see consumers being supplied with more and more powerful tools to complete the easier recoveries on their own. However, there will always be a need for experienced data recovery firms simply because of the intricasies involved with invasive recoveries. These types of recoveries have to be performed in a class-100 or better clean room.

Thanks for taking the time to be with us Greg, and best of luck to you in the future.

A: Thanks Dan, it's been great.


0

Tuesday 28 February 2012

Data Recovery

Every person who uses a personal computer will eventually face the challenge of data recovery. Computer hardware and software can be temperamental from time to time. Hard drives and other mechanical components of personal computers and servers do not last forever, and when they fail recovering your data can be difficult, time consuming and costly.

If you are working diligently away on a document or spreadsheet in Microsoft Office and the power goes out, you may still be able to recover the documents you were working on when the lights come back on. This type of data recovery is relatively easy and straightforward. Software manufacturers recognize that power outages are inevitable and unpredictable and most office applications incorporate what is known as autosave features. At set intervals, the documents you have open are saved to a cached file. They remain in that cached state and should be accessible once your power is restored. Simply opening Microsoft Word or Excel will usually bring these documents back. For instance, when you open Word after a power failure or a software error, you will be presented with a document followed by the word recovered in parentheses. This is the document you were working on at the most recent autosave point. You may still lose a couple minutes worth of work this way, but it sure be ats having to go back and retype the entire document.

If the recovered document does not appear automatically, search your hard drive for files ending with tmp. Look for one created close to the time of the power failure or software error and open it. This is most likely the document you had open at the time. If this method of data recovery does not work, you may need to follow the steps listed below.

Of course not all data recovery is so easy and so straightforward. If you delete a file accidentally, it is a simple matter to recover it from the recycle bin. Once you empty the recycle bin, however, things become more difficult. The deleted file still resides on your computer somewhere, but the pointer that tells the program where to find the file is now gone. There are various software tools available that promise to help recover deleted files, and they all have their strengths and weaknesses. Some of the major players are Norton, McAfee and Computer Associates. There are a great many smaller vendors as well.

Even if all these products fail to recover your data, you may not be completely out of luck. Data recovery services specialize in recovering data from failed and corrupt hard drives. These data recovery services have tools and equipment not available to the general public.

Government and law enforcement forensic teams will often make use of these advanced data recovery techniques to investigate cases of computer crime. Businesses also will turn to a professional data recovery service to recover mission critical data from damaged hard drives.

It is important to choose a reputable firm any time you need to have data recovery services performed. The firm you choose should be able to provide references from previous clients. You should make sure to follow up with the references they provide.

The cost for the data recovery service will vary according to the type of equipment and the difficulty of the job. You should get several estimates to make sure you are paying a fair price for the service you receive.


0

Monday 27 February 2012

DataRecoveryNet com Enters Medical Industry

Palm Beach Gardens FL- Florida based data recovery service, , launched a new service directed toward the medical community aimed at curtailing the loss of private and vital patient data as well as securing patient health information.

recovers data from malfunctioning, damaged, or failed hard drives and other media. This offering is sure to assist the medical industry with new HIPPA requirements. "The medical community is in need of specialty services like our data recovery service due to the new requirements of HIPAA" says Chuck Roover, President of Hospitals and other health care service companies store patient health information in hard drives that eventually fail.

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. The law required the US Dept. of Human Services to develop standards and requirements for the maintenance and transmission of health information.

This law refers to security, confidentiality, and non-disclosure of patient health information. These regulations went into effect on April 14, 2004.

About : Based in Palm Beach Gardens, Florida. is committed to delivering the most cost effective solutions for expert data recovery services. has been using their advanced technology and expertise to recover data for corporations and individuals alike for over 10 years. This company utilizes multiple world wide networks to source parts if needed. Delivering retrieved data in a timely manner, fanatical customer support, and confidentiality of client data is what keeps their clients' coming back.

On the web:


0

Sunday 26 February 2012

Business Continuity and Disaster Recovery A Business Not a Technology Issue

Hackers, hurricanes, fires, flooding, power outages, denial of service attacks, application failures, employee error, sabotage and now terrorism are helping companies to focus on the necessity of a business continuity plan.

Through the late 1990s as companies prepared for Y2K, many IT executives, risk managers, CFOs and corporate managers realized that recovering computing systems, networks and data was not enough. As Y2K approached, it became more apparent that a disciplined approach was needed to recover not only data and systems, but also business processes, facilities and manpower to restore and maintain critical functions.

The starting point is a risk assessment. Identify and define your mission critical business processes and systems. Review them for vulnerabilities and identify steps required for restoration and recovery. For your data, make sure it is backed up to secure and separate locations. Evaluate various storage solutions including storage area networks, data replication systems, new virtualization systems, network attached storage devices and managed storage. Pay significant attention also to your telecommunications providers to ensure they have built diversity and redundancy into their networks and have well developed and tested contingency plans.

The risk assessment will start to drive out real questions on the business impacts and losses that could result from disruptions. Mission critical impacts, key business functions, processes and records must all be identified. This is also the time to determine resource requirements and acceptable recovery time frames.

Various recovery strategies should be evaluated to achieve your cost, reliability and time to recover objectives. Include physical, technological, legal, regulatory and personnel considerations when you evaluate alternatives. Common points of failure are a lack of executive and budget support and not fully engaging employees. Along with your data, employees are your most valuable asset. An excellent checklist "Considerations for senior management during a time of crisis" is at (enter checklists in the search box, click on DR & BC checklists).

Business continuity planning sounds expensive and it can be time-consuming. However, losing your business functions, processes and systems as well as your company, customer and financial data can be devastating. Build your plan. Train, test, train and test again.

Bob Mahood

Midwest Data Recovery Inc.

866 786 2595

312 907 2100


0

Saturday 25 February 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.


0

Friday 24 February 2012

How Computer Programs That Wipe Hard Drive Work

It can be an advocacy but usually, companies that dispose old computers when they buy new units often donate the equipments to institutions and to some people who need personal computers. This is a widely acceptable practice. But are you ready to give much more than the worth of the personal computer you are donating? You might not be fully aware of it but when you are giving your old personal computer to other people, you are also giving the recipient the opportunity to access your old files and information saved previously on the hard disk.

Even if you have deleted the files in the Windows operating system and in the Recycle Bin, there would always be traces of the deleted file somewhere within the hard drive of the computer. The simple process of deletion would only remove the shortcuts to the files. In actuality, the files are still there, though you could hardly trace them. But imagine if in the long process of donating, the personal computer goes to the possession of an expert who could be able to restore and retrieve the deleted files. There are many recovery and restoration software available in the market that could facilitate instant retrieval of deleted files.

Will you be willing to afford to lose sensitive information like trade secrets, personal information, confidential data, bank and credit account numbers and contact details of clients? Much more, will you be willing to take the risk of sharing such important and confidential information to some unscrupulous people who might use the data inappropriately, maliciously and fraudulently? If not, then, it is high time you wipe hard drive of your computer.

Disk wiping is the process of erasing saved data on storage devices like compact discs, thumb drives and hard drives. When you wipe hard drive, you are ensuring that all previously deleted files on the personal computer would never ever be recovered or accessed even with the use of the most powerful data recovery software. Wiping hard drive is actually working by overwriting the entire hard drive not just once but several times. Thus, you can rest assured that no data or file would ever remain in the computer memory for life. To put it simply, it is impossible to retrieve data that have already been overwritten. The process is irreversible.

How does the process work? When you wipe hard drive, the process generally overwrites the whole disk with zero or one. A reformat would follow. The overwriting process takes on and repeats itself several times, solidifying the security purpose. That is the reason why such computer programs usually take some time to complete. When you wipe hard drive, you are practically disk wiping applications by overwriting master boot record, the partition table and each sector present in the computer hard drive.

When you wipe a hard drive, you are ensuring the safety and confidentiality of all files that had been saved and later on erased from the computer memory. Such pertinent data and information would never ever be accessed by anyone, especially the unauthorized ones.


0

Thursday 23 February 2012

How Computer Programs That Wipe Hard Drive Work

It can be an advocacy but usually, companies that dispose old computers when they buy new units often donate the equipments to institutions and to some people who need personal computers. This is a widely acceptable practice. But are you ready to give much more than the worth of the personal computer you are donating? You might not be fully aware of it but when you are giving your old personal computer to other people, you are also giving the recipient the opportunity to access your old files and information saved previously on the hard disk.

Even if you have deleted the files in the Windows operating system and in the Recycle Bin, there would always be traces of the deleted file somewhere within the hard drive of the computer. The simple process of deletion would only remove the shortcuts to the files. In actuality, the files are still there, though you could hardly trace them. But imagine if in the long process of donating, the personal computer goes to the possession of an expert who could be able to restore and retrieve the deleted files. There are many recovery and restoration software available in the market that could facilitate instant retrieval of deleted files.

Will you be willing to afford to lose sensitive information like trade secrets, personal information, confidential data, bank and credit account numbers and contact details of clients? Much more, will you be willing to take the risk of sharing such important and confidential information to some unscrupulous people who might use the data inappropriately, maliciously and fraudulently? If not, then, it is high time you wipe hard drive of your computer.

Disk wiping is the process of erasing saved data on storage devices like compact discs, thumb drives and hard drives. When you wipe hard drive, you are ensuring that all previously deleted files on the personal computer would never ever be recovered or accessed even with the use of the most powerful data recovery software. Wiping hard drive is actually working by overwriting the entire hard drive not just once but several times. Thus, you can rest assured that no data or file would ever remain in the computer memory for life. To put it simply, it is impossible to retrieve data that have already been overwritten. The process is irreversible.

How does the process work? When you wipe hard drive, the process generally overwrites the whole disk with zero or one. A reformat would follow. The overwriting process takes on and repeats itself several times, solidifying the security purpose. That is the reason why such computer programs usually take some time to complete. When you wipe hard drive, you are practically disk wiping applications by overwriting master boot record, the partition table and each sector present in the computer hard drive.

When you wipe a hard drive, you are ensuring the safety and confidentiality of all files that had been saved and later on erased from the computer memory. Such pertinent data and information would never ever be accessed by anyone, especially the unauthorized ones.


0

Wednesday 22 February 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.


0

Tuesday 21 February 2012

An Introduction to Tape Backup

If you run a small business, chances are you're saving important files to a server. But what happens when disaster strikes? How are you ensuring that your files won't be lost? Many people fail to realize that the loss of files could cripple their business. You can insure your office and equipment, but you can't insure files. You can't repair or buy back lost files. Ipso facto, they are lost!

This brings us to the concept of disaster recovery. What is disaster recovery? If you're thinking that disaster recovery is about frantically trying to get back data that's already been lost, then you're already behind the 8-ball! Disaster recovery is about safeguarding your organization's data so that it can be safely restored in event of a crippling disaster. And having an industry-standard file backup strategy is undoubtedly the most important part of disaster recovery.

What you have to do is ensure that all files on the server are backed up to another storage medium - tape, removable hard disk, NAS device, and so on. Most businesses choose to use tape. Let's look at how you can set up a tape backup strategy for your own business.

1. Tape - the perfect backup medium

Isn't tape an anachronism in the age of optical disks, removable hard drives and a plethora of whiz-bang, random-access storage media? Tape is indeed a dinosaur in relative terms, but it's ideal for backup. Tape is slow, but can store a lot of data... one mid-range tape should be enough to backup your entire server. Plus, tape is extremely cheap - mid-range tapes cost around $20 each.

2. When should you backup?

Typically, tape backup is performed at the end of each day. Just put in the tape and let the backup process run overnight. If your server ever suffers a catastrophic disaster, you have at least saved all your files from the previous day.

3. Tape Rotation

The ideal tape backup solution would involve using a new tape for each backup. This means purchasing a new tape for every day of your business's operations. This is hardly cost-effective for your business. Tape is cheap, but not that cheap!

This is why we speak of tape rotation. Tape rotation means to reuse tapes from previous backups. The simplest tape rotation scheme is to have one tape for each day of the working week. Tapes are labeled Monday, Tuesday, Wednesday, Thursday and Friday.

You can restore data from any one of the tapes in your library, or in this case, any day in the past the week. This strategy requires only five tapes, but only provides one week's data backup history.

4. Grandfather-Father-Son - A Case Study

The grandfather-father-son schedule is the most widely used method, and involves backing up data in the following way:

daily - on the "son tapes"

weekly - on the "father tapes"

monthly


0

Monday 20 February 2012

pros-and-cons-computer-forensics

The Advantages and Disadvantages of Computer Forensics

Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical know how of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.

There have been issues of authenticity concerned with this type of evidence. Nonetheless it still used today with the help of legal standards to make them admissible in court. Computer forensics is beneficial but it also has disadvantages.

Computers are the most dominant form of technology. It has been used in variety of purposes which has made digital and electronic evidence important. However there are still setbacks to this field.

Pros and Cons

The exchange of information is taking place everyday over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, breach of contract and asset recovery are some of the situations wherein computer forensics can be used.

Apart from the technical aspect, legal issues are also involved. Computer forensic analysts make their investigation in such a way that the electronic evidence will be admissible in court.

There are advantages and disadvantages when it comes to computer forensics. This field is relatively new and criminal matters usually dealt with physical evidences. This makes electronic evidence something very new. Fortunately it has been a helpful tool wherein important data needed for a case that has been lost, deleted or damaged can be retrieved.

Computer forensics' main advantage is its ability to search and analyze a mountain of data quickly and efficiently. They can search keywords in a hard drive in different languages which is beneficial since cyber crimes can easily cross borders through the internet.

Valuable data that has been lost and deleted by offenders can be retrieved which becomes substantial evidence in court. Legal professionals are able to produce data in court that were previously impossible.

The first setback when using electronic or digital evidence is making it admissible in court. Data can be easily modified. Analyst must be bale to fully comply with standards of evidence required in the court of law. The computer forensic analyst must show that the data is tampered.

His or her own investigation must also be fully documented and accounted for. Computer forensics must also training of legal standard procedures when handling evidence.

The main disadvantage is the cost of when retrieving data. Computer forensic experts hire per hour. Analysis and reporting of data can take as long as 15 hours but it will also depend on the nature of the case. Another one is that when retrieving data, analyst may inadvertently disclose privilege documents.

Legal practitioners involved in the case must also have knowledge of computer forensics. If not they will not be able to cross examine an expert witness. This also applies to the judge, solicitors and barristers. Computer forensics is still fairly new and some may not understand it. The analyst must be able to communicate his findings in a way that everyone will understand.

Although computer forensics has its disadvantage, this can be solved by the party involved. Evidence on the other hand can only be captured once. The use of computers and the rise of cyber crimes also call for an equally high the method of stopping it.


0

Friday 17 February 2012

computer-forensics

What is Computer Forensics?

Computers have radically changed the way we live your lives. Everyday living as become easier and technologically advanced decades ago. It has changed the way we work and the way we live in our houses. Children to day are sometimes even more technologically aware than their parents. Mobiles phones have gotten smaller and laptops have gotten slimmer.

With the launch of the Iphone that used the touch screen technology it will only be a matter of time when this idea permeates into other devices and appliances. Unfortunately, technology also makes it easier for criminals to their dirty job. However, computer forensics makes sure that technology is put to lawful use.

Everyone keeps up with the times, even the criminals. The internet is a public place which makes it vulnerable for fraud. Criminals often take advantage of unsuspecting victims. Law enforcement agencies have incorporated computer science in their investigation process to aid them with computer savvy criminals.

Crime and computers

We have seen a lot of Hollywood movies about hackers stealing from financial institutions. We have also seen two parties making their deals through bank transfers with a bunch of computers. Although these are not possible in real life, there are other ways that criminals can use computers.

Computer forensics is basically applying computer science to assist in the legal process. It entails the technological and systematic inspection of the contents of a computer system for evidence. Individuals in this field are called by different titles such as digital media analyst or computer forensics investigator. These people scanned a computer thoroughly to find out if they have used for a civil wrongdoing or criminal act.

The skills required are more than just normal data collection and using preservation techniques. Other definitions include the use of special tools to meet the Court's criteria and not just a thorough examination of a computer for potential evidence. This definition is similar to Electric Evidentiary Recovery or e-discovery.

Most of the time computer forensic investigators investigate hard drives, portable data devices and data storage devices. These devices include USB Drives, Micro Drives and external Drives.

The first task of the computer forensic investigator is to find sources of documentary or digital evidence. The next step would be to preserve the evidence so that it could be analyzed later on. When dealing with computer systems, important files or data can be quickly lost.

The investigator should take the necessary test because data retrieval can be time consuming and costly. The investigator would then analyze the collected data for potential and supportive evidence. The final step would be presenting the findings. The investigator will render his opinion based on the examination and make a report.

The process of using computer forensics must comply with the standards of evidence that are acceptable in court. This field is both technical and legal. The investigator should also have a complete understanding of the suspect's level of sophistication. If they don't the suspects are assumed to be experts.

Investigators then presume that the criminal have installed a countermeasure to render forensic techniques useless. The computer will then be shutdown completely to prohibit the machine from making further modifications to its drives.

Computer technology has changed the way we live, work, and for others - commit crime. Although the internet may seem like a very convenient place users should always be wary for seemingly innocent offers.


0

Thursday 16 February 2012

computer-forensics-problems

What Remains to be Today's Computer Forensics Problem?

Computer forensics is one the fields today which often gets updated. Many agencies have found the application of computer forensics very useful especially in the investigation of fraudulent actions and crimes. More so, computer forensics is the procedure that is applied when electronic devices such as the computer media is placed under careful investigation.

The process involves the discovery and analysis of any available data whether they have been hidden or deleted. These are among the evidences that will support the defense and claim of a particular individual or company as they file for any legal action.

Moreover, computer forensics specialists use the tools that recover both the accidentally and intentionally erased files and information. So whether the loss of the data is blamed to the untoward occurrences of hardware failure, there is a better chance of recuperating them. One of the biggest computer forensics problems though is how to retain the original data without the slightest alteration in them.

So much to say, even during the process of shutting down the computer system to transfer the data into another media may cause changes in them. It is important that the computer forensics expert has the skill to maintain the exact form of the data. Nobody can exactly say when the data may be altered but with the most apt tool and the specialist's skills, it can be possibly prevented.

Computer forensics attracted the attention of the public during the height of the Enron scandal which prompted the widest-ranging computer forensics investigation marked in the world's history. As computers these days are becoming an integral part of human life, big quantities of data are being stored in these electronic devices.

More so, crimes and other fraudulent acts are likewise increasing in intervals. Computer forensics investigations are also done in emails, websites visited, chat histories, and many other forms of electronic communications.

The advances in today's technology have shaped the improvement of computer forensics. The developers continually upgrade their tools to meet the increasing intensities of computer forensics problems. Modern software and tools are coming out into the market which nonetheless makes the task easier for the computer forensics experts. Thus, data is found and restored faster and with more preciseness.

These evidences need to be in their original format especially when they are to be used as evidences in the court. These proofs are often gathered from all kinds of computer media such as the discs, Pen drives, tapes, memory sticks, logs, emails, PDAs, handhelds, deleted information, and hidden documents.

The people's common notion is that when the data is deleted from its location, the file is already completely deleted and unfound. This makes you wrong though. Upon deletion, what is erased is only that of the data's reference location but the actual document remains intact in your computer system.

It is easiest to tell that the data have been deleted but the common computer forensics problem is where and how to find it and how to recover them without making traces of changes. Thus, the solution to the dilemma will entirely depend on the computer forensics professional's skills.

Computer data security is very important so it is also significant that they remain original. Part of the training of these professionals includes the molding of their skills to be careful when handling the recovery of the data at all times.

However, it is not for them to conclude when data may be altered or not. This remains as one of the top computer forensics problems to date.


0

Wednesday 15 February 2012

computer-forensic-investigation-state-requirements

Computer Forensic Investigation State Requirements

By definition, computer forensics is the procedure wherein an expert sees through the files stored or recorded in a computer's system. These data may have been deleted, hidden, or saved. The search for the computer-related information uncovers the engagement in any crime or deception.

Computer forensics is nonetheless being widely used in the areas of intelligence, military, businesses, and law enforcement agencies. There is obviously a protocol that is followed in the course of the computer forensic investigation since the collected, analyzed, and examined data are presented before the courts of law in the effort of uncovering the malicious acts incurred by certain parties.

Moreover, as it is related to a legal action, it is but necessary that the computer forensic investigation state requirements are observed.

Computer forensics is an application which is not only confined to the recovery of any lost data. Such field is more so used in giving explanations and providing insights to any committed crime. Computer forensic investigation is often employed to collect the pertinent data in finding out the truth about a criminal or suspect to a crime.

With today's wide use of the Internet and the computer, it is very possible that clues may be traced from the electronic media sources. More so, the company employers are nowadays seeking for employees who are equipped with the rightful knowledge on the techniques and tools about computer forensic investigations.

It is necessary that the person is qualified to handle the task. Needless to say, a formal education on the said field is required. Among the instructions which the computer forensics training institutes tackle about are the enhancement of one's computer skills, important legal issues, and the needed computer forensic tools and techniques to be applied in different cases.

There are various computer forensic investigation state requirements and they vary from one state to another. However, we must touch on with the most common requisites which apply to all of them. The following discussion will provide you with the insights on the computer forensic state requirements for your perusal.

First of all, it is a must that the individual is a computer forensic professional. For one to attain this, a particular training course must be undertaken. Certificate programs in computer forensics are offered in a lot of institutions. The academic requirements differ too and it matters that one passes all of them.

Next, one must contain in him an all-embracing knowledge about the computer systems and how its applications and programs work. With these, one must also have the skill or the ability to restore any lost information from all types of electronic media but without the occurrence of any changes in them.

A forensic investigator must be knowledgeable of the computer software and hardware and must be capable of understanding the various operating systems in use these days.

An investigator should know the techniques to be used in uncovering the data from any type of file structure. There are different tools which need to be used in various cases.

Most importantly, a computer forensic investigator must be able to generate a refined report so that all of the input data are comprehensible enough even for those who don't understand the technicalities of the investigation.

These are just among the computer forensic investigation state requirements that must be strictly observed for a more precise result in the findings and conclusions in a particular case.


0

Tuesday 14 February 2012

Cisco CCNA Certification Error Detection vs. Error Recovery

Passing the CCNA, Intro, and ICND exam is all about knowing and noticing the details. (Which makes perfect sense, since becoming a master networking administrator or engineer is also about noticing the details!) One such detail knows the difference between error detection and error recovery. While the terms are sometimes used interchangeably, they are not the same thing.

Error detection is just that - error detection only. Two common error detection methods are found at the Data Link layer of the OSI model, the FCS (Frame Check Sequence) and CRC (Cyclical Redundancy Check). A mathematical equation is run against the data in the frame, and the result is sent along with the data. The receiver runs the equation again, but this time. If the result is the same, the frame is considered valid; if the result is different, the frame is considered corrupt and is discarded.

Note that the FCS and CRC do nothing in regards to retransmission. They are strictly error detection schemes.

For an example of error recovery, we look to the Transport layer, where TCP runs. TCP performs reliable delivery, and the reason we call it "reliable" is that TCP uses sequence numbers to detect missing segments. If the sender determines from the sequence numbers that the remote host did not receive transmitted segments, the sender will retransmit the missing segments.

The key to keeping the terms straight in your head is to remember that while both error detection and error recovery both detect problems, only error recovery does anything about it. It's also worth reading an exam question twice when you see either term!


0

Monday 13 February 2012

Palm Treo Getting Started With Your New Treo Smartphone

Copyright 2006 Christopher Meinck

Getting Started With a Palm Treo Smartphone

For many, adding a Palm Treo smartphone to their life is an exciting time. Most are coming from a traditional cellphone and the capabilities of a smartphone never seize to amaze. The Palm Treo features a large color LCD screen, full keyboard and software for syncing your personal data with your PC or Mac. Getting familiar with the capabilities of your new Treo smartphone can be overwhelming in the beginning. Once you get over the initial learning curve, owning a Treo can be a rewarding experience.

Protecting Your Treo

The Palm Treo is an expensive gadget, so you should make plans to protect your Treo. In the US, both Verizon and Sprint offer insurance on the Treo. For a fee of roughly $5, you can insure your Treo against loss or accidents. With insurance, youll have the piece of mind that your valuable Treo is protected. If your wireless provider does not offering insurance, another option is to sign up for the StuffBak protection program. Stuffbak is a loss prevention and recovery service. You purchase a Stuffbak label that gets applied to the back of your Treo. Should you lose your Treo, there is an 800# that allows the finder to collect a reward upon return.

Insurance and recovery services are both great options should something happen to your Treo. The best option is to protect your Treo smartphone with a good case and screen protector. There are many options when it comes to selecting a case for the Treo. When choosing a case, you can select from holster, pouch, skin, wallet and more. In most cases, its also a good idea to add a screen protector. Through the daily use of your Treo, you will find yourself touching the screen quite often. A screen protector will guard against scratches and its recommended even if youve opted for an enclosed case. Adding the correct Treo accessory can protect your smartphone for many years.

Treo Software

Out of the box, Palm OS based Treo smartphones comes bundled with all the software you need to sync with your PC or Mac. If you own a Mac, then you should avoid the Treo 700w. In order to sync the 700w with a Macintosh, you would have to use third party software such as Missing Sync by Mark/Space and they do not currently support the Treo 700w. If you are upgrading from a previous Palm device, youll still want to install the software that came with your new Treo. Follow the on-screen directions and youll be able to bring your data over to your new Treo. As a previous Palm owner, you should note that some applications might not work on your Treo. To be certain, locate and rename the Backup folder located in your User folder. Once youve completed the transfer of your PIM data, you can add one application at a time to insure compatibility with your Treo.

One of the great things about the Treo is vast catalog of available software applications. There are countless freeware and commercial applications. If you own a Palm OS based Treo, then be sure to look for software that supports your model. Owners of the Treo 700w should look for Pocket PC titles that support the Windows Mobile 5 operating system. In either case, its best to slowly add software. Adding incompatible software is the most common cause of an unstable Treo.

Get To Know Treo

The Treo is a remarkable device that offers robust software to help you manage your calendar, check email, browse the web, take photos, listen to MP3s and more. With any new technology, there is a slight learning curve and the Treo is no different. I encourage any new Treo owner to explore the features of their new smartphone. If you have questions, there are several good resources online or you can visit your local bookstore. Once youve mastered the basics, youll be left wondering how you ever managed without a Treo.


0

Sunday 12 February 2012

what could macedonia learn from a tiger the asian tigers and the phenomenon of uninterrupted economic growth

The first reaction of economies in transition is a sharp decline in their production, mainly in industrial production. In the countries which attained independence with the demise of the British Empire (where the sun never set) - industrial production fell by 20% on average. Even this was because these countries continued to maintain economic ties with the "mother" (the United Kingdom). They also continued to trade among themselves, with the rest of the British Empire, through the Commonwealth mechanism.

This was not the case when the second biggest empire of modern times collapsed, the Soviet empire. When the USSR and the Eastern Bloc disintegrated - the COMECON trading bloc was dismantled, never to be replaced by another. All the constituents of the former Eastern Bloc preferred to trade with the west rather than with one another. The Empire left in its wake mountains of trade debts, total lack of liquidity and money losing barter operations carried out in unrealistic prices.

Thus, industrial production plunged in the newly established countries (CIS and the countries which were part of Former Yugoslavia) as well as in other former members of the Eastern Bloc by 40-60% over a period of 5 years. A slow recovery is discernible only in the last two years and industrial production is picking up at an annual rate of 2% (Estonia) to 8% (the Czech Republic) - depending on the country.

This disastrous drop in the most important parameter of economic health was largely attributable to a few, cumulative factors:

The sudden evaporation of all the traditional export markets - simultaneously. Macedonia has lost 80% of its export markets with the bloody and siege-laden disintegration of the Former (federation of) Yugoslavia. Similar vicissitudes were experienced by other countries in transition.

A huge, unsustainable internal debt between the companies themselves (each acting in the dual role of supplier and of client) - and between the enterprises and the state. This burden was only very mildly ameliorated by bartering. Mostly, it led to severe cases of insolvency or lack of liquidity and to a reversion to pre-monetary economic systems.

This lack of liquidity also prevented the investment in capital assets (plant modernization, personnel training, data processing and decision making tools) necessary to sustain efficiency gains, increase productivity and maintain competitiveness.

Gross inefficiency of the industrial plants which was due to massive hidden unemployment, low maintenance standards and the aforementioned lack of capital.

Outmoded and outdated management techniques. The old guard of managers in industry were ill adapted to the rapid changes wrought about them by capitalism and wise industries. They continued "to fight the last (and lost) wars", to bemoan their fate and not to provide a sense of direction, a vision of the future and the management decisions which are derivatives of the above.

Faulty legislation, dysfunctioning law enforcement systems, crony capitalism and privateering (the sale of state assets to political allies or to family members of influential political and economic figures) - all led to fuzzy ownership structures and to a virtual abandonment of the protection of property rights. In the absence of clear ownership and under the threat ever—imminent loss of property, the profit motivation has degenerated into speculative binges and bouts and decision making was transformed into power contests.

These industries produced and manufactured goods in accordance with some central planning, an theoretical model of the marketplace, or rule-of-thumb thinking. The result was mountains of shoddy merchandise, of low quality and very little demand. Antiquated design and lack of responsiveness to market needs and consumers’ wishes only exacerbated the situation.

This absence of market research, market analysis and, more generally, market awareness led to the almost complete absence of marketing, sales promotion, or advertising (in the modern sense). Paradoxically, the communist era industries demonstrate a deeper belief in "the invisible hand of the market" than do their capitalist brethren. They entrust the function of the dissemination of information and its influence upon the decisions made by consumers - entirely to the market. If the product is either needed or good enough, it will sell itself, was the thinking. Marketing and advertising were thought of as illegitimate cajoling, pushing consumers to make decisions that they would not have made otherwise.

Industry operated under all these crushing constraints in an environment of heavy to impossible regulation, trade protectionism (which denied them the benefits of competition), corrupt bureaucracy, rolls of red tape, heavy political involvement and a total distortion of economic considerations by "social" ones. This was further compounded by a decaying banking system (where the distinction between lender and borrower was rendered superfluous by the concept of "social capital" which belongs to everyone equally). It could not supply the industrial sector with capital replenishment and the total absence of capital markets did not help.

Last - but far from being least - was the non existence of a "Protestant" or "Asian values" work ethic. Low salaries, feigned "equality" and absent profit motivation - all led to a disincentived work environment. The norm in many of these countries is still: "come to work, open and close the door and get paid", as the saying goes. This is the benign case. Stealing from the workplace has become an acceptable way of complementing income and moonlighting was done at the expense of the official "primary" workplace.

But it seems that the worst is over and that the scene is fast changing.

However sloppy or criminal the process of privatization, still hundreds of thousands of new capitalists were brewed and introduced, willy nilly, to the profit motive. The spectre of capital gains, made most of them (except the most hardened) discover marketing, advertising, design, export, trade financing, public offerings, strategic partnerships, concessions and business plans.

Industries are much more focussed and market oriented. The new religion of capitalism, replete with entrepreneurship, free choice, personal profit and the invisible hand of the market has been successfully phased in.

Both the domestic markets and international trade are recovering nicely. Consumption is growing and with it exports. The political level is withdrawing from the scene through more or less successful privatization or transformation schemes and appropriate legislation to minimize the role of the state in the economy.

Some countries have opted to "skip" some of the industrial portion of the classic, evolutionary economic cycle - and go directly to investing in information and knowledge industries. They educate their workforce and retrain it accordingly. They invite multinationals - using a cocktail of tax incentives and direct grants and subsidies - to open back office operations (accounting, administration) and telemarketing operations in their countries. This calls for lower investment than in classic (or sunset) industries and has a high value added to the economy.

But the single largest driving force behind economic recovery is foreign capital. Foreign Direct Investment (FDI) is pouring in and with it: new markets, technology transfers through joint ventures, new, attractive product mixes, new management, new ideas and new ownership - clear and decisive.

So, industrial production is picking up and will continue to grow briskly in all countries in transition that have the peaceful conditions necessary for long term development. If Macedonia will follow the examples of the Baltic countries, of Poland, the Czech Republic, Hungary, Slovenia, even Russia, Ireland, Egypt, Chile, Indonesia, Israel and the Philippines - it will double its industrial production within 10 years and redouble it again in 15 years.

Israel, Ireland and … France and Japan (!) are examples of poor, agricultural countries, which made the transition to thriving industrial countries successfully.

But was their secret? How come Hong Kong and Singapore are richer than Britain by some measures? Together with South Korea and Taiwan they have been growing at an average rate of 7.5% annually for the last 30 years. China, Indonesia, Malaysia, Thailand, The Philippines have joined the "Asian Tigers" club.

They all share some common features:

Massive injections of labour (by massive immigration from rural areas to the cities, urbanization). Massive injections of capital and technology. The above injections were financed by an exceedingly high level of savings and investments (savings amount to 35% of GDP, on average).

Wise government direction provided through a clear industrial policy. This, though, is a double edged sword: a less wise policy would have backfired with the same strength.

A capitalist, profit seeking mentality.

An annual increase of 2-3% in productivity which is the result of copying technology and other forms of technology transfers from the rich West.

Strong work, family and society ethics within a cohesive, conformist and supportive social environment (the "Asian Values" are the Eastern equivalent of the "Protestant Work Ethic").

Low taxation and small government budgets (less than 20% of GDP compared to twice as much in the West - and 3 times as much in France today).

Flexible and mobile labour and c (in certain countries) capital markets. When mobility or flexibility are restricted (Japan) it is the result of social treaty rather than of legislation, regulation, or other statist intervention.

A firm, long lasting commitment to education and to skill acquisition, even in hard circumstances. The number of educated people is low but growing rapidly, as a result.

Openness to trade, knowledge and to technology.

Imports are composed mostly of investment goods and capital assets. The culture of conspicuous, addictive (or even normal) consumption is less developed there.

Still, these countries started from a very low income base. It is common economic knowledge that low income countries always grow fast because they can increase their productivity simply by purchasing technology and management in the rich country. Purchasing technology is always much cheaper than developing it - while maintaining roughly the same economic benefits.

Thus, Hong Kong grew by 9% in the 60s. This growth coefficient was reduced to 7.5% in the 80s and to 5% in the 90s. But China, Malaysia, Thailand and Indonesia are likely to grow annually by 7-9% during the next decade.

Not that these countries are exempt from problems. The process of maturation creates many of them. There is the dependence on export markets and volatile exchange rates (which determine the terms of trade). When the West reduced its consumption of microchips and the Dollar appreciated by 50% against the Japanese Yen - all the tigers suffered a decline in economic growth rates, current account deficits of 5-8% of their GDP, strikes (South Korea) and Stock Market crashes (Thailand, to name but one of many). In Singapore and in Hong Kong, the industrial production plummeted by 5% last year (1996).

Years of easy money and cheap credits directed by the state at selected industries starved small businesses, created overinvestment and overcapacity in certain, state-supported, industries and destabilized the banking and the financial systems. It helped forge infrastructure bottlenecks and led to a shortage in skilled or educated manpower. In Thailand only 38% of those 14 years old attend school and in China, the situation is not much better.

Finally, the financial markets proved to be too regulated, the government proved to be too bureaucratic, corruption proved to be too rampant (Indonesia, Japan, almost everybody else). There were too many old conglomerate-type mega - companies which prevented competition (e., the Chaebol in South Korea or the Zaibatsu in Japan).

So, the emerging economies are looking to Hong Kong, Singapore and Taiwan to supply the ideal: truly flexible labour markets, no state involvement, lots of nimble, small businesses, deregulated markets, transigent industrial policies. These countries - and the rest of the Asian Tigers - are expected to beat the West at its own game: money. They have many more years of economic growth ahead:

Each Korean worker has only 40% of the capital goods, available to his Western comrade, at his disposal. Putting more technology at his fingertips will increase his productivity.

An industrial worker in the west has a minimum of 10 years of education. In Indonesia and Thailand he has 4 years and even in South Korea he has merely 9 years. On average, an industrial worker in one of the Asian Tigers countries carries 7 years of education in his satchel - hardly the stuff that generals are made of. Research demonstrated that the more educated the worker - the higher his productivity.

Finally, increasing wages and looming current account deficits - will force the tigers to move to higher value added (non labour intensive) industries (the services, information and knowledge industries).

Then, it will be the turn of countries like Macedonia to take their place in some labour intensive areas and to rise to tigerdom.


0

Saturday 11 February 2012

Add Value by Documenting Your Business

By documenting your business you communicate to your people

exactly how your business operates and what work needs to be

completed by Employees filling the Positions in your

business.

It is vitally important to have your business documented if

you are looking to sell your business or looking to secure

external funding. Well written and maintained Business

Systems and Documentation adds great value to your business

and will contribute to you getting more money when selling

or sourcing external funding.

Important information in your business needs to be recorded

and communicated to your employees in a consistent way. This

information should include.

- Strategic Objectives.

- Marketing Plan.

- Company Policies and Procedures.

- Position Contracts.

- Business Systems Documentation.

- Operations Manuals.

Only one version of information should be made available in

your business. It is important to have only one version to

ensure that all employees have access to the most up to date

consistent information.

Access to critical documents should be controlled, Documents

should be made available only to Employees who need to have

access. You should use a tool that allows you to easily

control access to information and allows you to track when

changes have been made and who has made the changes.

Documents and Data should be maintained on a secure central

server with a data backup and recovery plan in place.

Documents should not be stored locally on employee PC


0

Friday 10 February 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.


0

Thursday 9 February 2012

An Introduction to Tape Backup

If you run a small business, chances are you're saving important files to a server. But what happens when disaster strikes? How are you ensuring that your files won't be lost? Many people fail to realize that the loss of files could cripple their business. You can insure your office and equipment, but you can't insure files. You can't repair or buy back lost files. Ipso facto, they are lost!

This brings us to the concept of disaster recovery. What is disaster recovery? If you're thinking that disaster recovery is about frantically trying to get back data that's already been lost, then you're already behind the 8-ball! Disaster recovery is about safeguarding your organization's data so that it can be safely restored in event of a crippling disaster. And having an industry-standard file backup strategy is undoubtedly the most important part of disaster recovery.

What you have to do is ensure that all files on the server are backed up to another storage medium - tape, removable hard disk, NAS device, and so on. Most businesses choose to use tape. Let's look at how you can set up a tape backup strategy for your own business.

1. Tape - the perfect backup medium

Isn't tape an anachronism in the age of optical disks, removable hard drives and a plethora of whiz-bang, random-access storage media? Tape is indeed a dinosaur in relative terms, but it's ideal for backup. Tape is slow, but can store a lot of data... one mid-range tape should be enough to backup your entire server. Plus, tape is extremely cheap - mid-range tapes cost around $20 each.

2. When should you backup?

Typically, tape backup is performed at the end of each day. Just put in the tape and let the backup process run overnight. If your server ever suffers a catastrophic disaster, you have at least saved all your files from the previous day.

3. Tape Rotation

The ideal tape backup solution would involve using a new tape for each backup. This means purchasing a new tape for every day of your business's operations. This is hardly cost-effective for your business. Tape is cheap, but not that cheap!

This is why we speak of tape rotation. Tape rotation means to reuse tapes from previous backups. The simplest tape rotation scheme is to have one tape for each day of the working week. Tapes are labeled Monday, Tuesday, Wednesday, Thursday and Friday.

You can restore data from any one of the tapes in your library, or in this case, any day in the past the week. This strategy requires only five tapes, but only provides one week's data backup history.

4. Grandfather-Father-Son - A Case Study

The grandfather-father-son schedule is the most widely used method, and involves backing up data in the following way:

daily - on the "son tapes"

weekly - on the "father tapes"

monthly


0

Wednesday 8 February 2012

pros-and-cons-computer-forensics

The Advantages and Disadvantages of Computer Forensics

Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical know how of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.

There have been issues of authenticity concerned with this type of evidence. Nonetheless it still used today with the help of legal standards to make them admissible in court. Computer forensics is beneficial but it also has disadvantages.

Computers are the most dominant form of technology. It has been used in variety of purposes which has made digital and electronic evidence important. However there are still setbacks to this field.

Pros and Cons

The exchange of information is taking place everyday over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, breach of contract and asset recovery are some of the situations wherein computer forensics can be used.

Apart from the technical aspect, legal issues are also involved. Computer forensic analysts make their investigation in such a way that the electronic evidence will be admissible in court.

There are advantages and disadvantages when it comes to computer forensics. This field is relatively new and criminal matters usually dealt with physical evidences. This makes electronic evidence something very new. Fortunately it has been a helpful tool wherein important data needed for a case that has been lost, deleted or damaged can be retrieved.

Computer forensics' main advantage is its ability to search and analyze a mountain of data quickly and efficiently. They can search keywords in a hard drive in different languages which is beneficial since cyber crimes can easily cross borders through the internet.

Valuable data that has been lost and deleted by offenders can be retrieved which becomes substantial evidence in court. Legal professionals are able to produce data in court that were previously impossible.

The first setback when using electronic or digital evidence is making it admissible in court. Data can be easily modified. Analyst must be bale to fully comply with standards of evidence required in the court of law. The computer forensic analyst must show that the data is tampered.

His or her own investigation must also be fully documented and accounted for. Computer forensics must also training of legal standard procedures when handling evidence.

The main disadvantage is the cost of when retrieving data. Computer forensic experts hire per hour. Analysis and reporting of data can take as long as 15 hours but it will also depend on the nature of the case. Another one is that when retrieving data, analyst may inadvertently disclose privilege documents.

Legal practitioners involved in the case must also have knowledge of computer forensics. If not they will not be able to cross examine an expert witness. This also applies to the judge, solicitors and barristers. Computer forensics is still fairly new and some may not understand it. The analyst must be able to communicate his findings in a way that everyone will understand.

Although computer forensics has its disadvantage, this can be solved by the party involved. Evidence on the other hand can only be captured once. The use of computers and the rise of cyber crimes also call for an equally high the method of stopping it.


0

Tuesday 7 February 2012

computer-forensics

What is Computer Forensics?

Computers have radically changed the way we live your lives. Everyday living as become easier and technologically advanced decades ago. It has changed the way we work and the way we live in our houses. Children to day are sometimes even more technologically aware than their parents. Mobiles phones have gotten smaller and laptops have gotten slimmer.

With the launch of the Iphone that used the touch screen technology it will only be a matter of time when this idea permeates into other devices and appliances. Unfortunately, technology also makes it easier for criminals to their dirty job. However, computer forensics makes sure that technology is put to lawful use.

Everyone keeps up with the times, even the criminals. The internet is a public place which makes it vulnerable for fraud. Criminals often take advantage of unsuspecting victims. Law enforcement agencies have incorporated computer science in their investigation process to aid them with computer savvy criminals.

Crime and computers

We have seen a lot of Hollywood movies about hackers stealing from financial institutions. We have also seen two parties making their deals through bank transfers with a bunch of computers. Although these are not possible in real life, there are other ways that criminals can use computers.

Computer forensics is basically applying computer science to assist in the legal process. It entails the technological and systematic inspection of the contents of a computer system for evidence. Individuals in this field are called by different titles such as digital media analyst or computer forensics investigator. These people scanned a computer thoroughly to find out if they have used for a civil wrongdoing or criminal act.

The skills required are more than just normal data collection and using preservation techniques. Other definitions include the use of special tools to meet the Court's criteria and not just a thorough examination of a computer for potential evidence. This definition is similar to Electric Evidentiary Recovery or e-discovery.

Most of the time computer forensic investigators investigate hard drives, portable data devices and data storage devices. These devices include USB Drives, Micro Drives and external Drives.

The first task of the computer forensic investigator is to find sources of documentary or digital evidence. The next step would be to preserve the evidence so that it could be analyzed later on. When dealing with computer systems, important files or data can be quickly lost.

The investigator should take the necessary test because data retrieval can be time consuming and costly. The investigator would then analyze the collected data for potential and supportive evidence. The final step would be presenting the findings. The investigator will render his opinion based on the examination and make a report.

The process of using computer forensics must comply with the standards of evidence that are acceptable in court. This field is both technical and legal. The investigator should also have a complete understanding of the suspect's level of sophistication. If they don't the suspects are assumed to be experts.

Investigators then presume that the criminal have installed a countermeasure to render forensic techniques useless. The computer will then be shutdown completely to prohibit the machine from making further modifications to its drives.

Computer technology has changed the way we live, work, and for others - commit crime. Although the internet may seem like a very convenient place users should always be wary for seemingly innocent offers.


0

Monday 6 February 2012

computer-forensics-problems

What Remains to be Today's Computer Forensics Problem?

Computer forensics is one the fields today which often gets updated. Many agencies have found the application of computer forensics very useful especially in the investigation of fraudulent actions and crimes. More so, computer forensics is the procedure that is applied when electronic devices such as the computer media is placed under careful investigation.

The process involves the discovery and analysis of any available data whether they have been hidden or deleted. These are among the evidences that will support the defense and claim of a particular individual or company as they file for any legal action.

Moreover, computer forensics specialists use the tools that recover both the accidentally and intentionally erased files and information. So whether the loss of the data is blamed to the untoward occurrences of hardware failure, there is a better chance of recuperating them. One of the biggest computer forensics problems though is how to retain the original data without the slightest alteration in them.

So much to say, even during the process of shutting down the computer system to transfer the data into another media may cause changes in them. It is important that the computer forensics expert has the skill to maintain the exact form of the data. Nobody can exactly say when the data may be altered but with the most apt tool and the specialist's skills, it can be possibly prevented.

Computer forensics attracted the attention of the public during the height of the Enron scandal which prompted the widest-ranging computer forensics investigation marked in the world's history. As computers these days are becoming an integral part of human life, big quantities of data are being stored in these electronic devices.

More so, crimes and other fraudulent acts are likewise increasing in intervals. Computer forensics investigations are also done in emails, websites visited, chat histories, and many other forms of electronic communications.

The advances in today's technology have shaped the improvement of computer forensics. The developers continually upgrade their tools to meet the increasing intensities of computer forensics problems. Modern software and tools are coming out into the market which nonetheless makes the task easier for the computer forensics experts. Thus, data is found and restored faster and with more preciseness.

These evidences need to be in their original format especially when they are to be used as evidences in the court. These proofs are often gathered from all kinds of computer media such as the discs, Pen drives, tapes, memory sticks, logs, emails, PDAs, handhelds, deleted information, and hidden documents.

The people's common notion is that when the data is deleted from its location, the file is already completely deleted and unfound. This makes you wrong though. Upon deletion, what is erased is only that of the data's reference location but the actual document remains intact in your computer system.

It is easiest to tell that the data have been deleted but the common computer forensics problem is where and how to find it and how to recover them without making traces of changes. Thus, the solution to the dilemma will entirely depend on the computer forensics professional's skills.

Computer data security is very important so it is also significant that they remain original. Part of the training of these professionals includes the molding of their skills to be careful when handling the recovery of the data at all times.

However, it is not for them to conclude when data may be altered or not. This remains as one of the top computer forensics problems to date.


0

Sunday 5 February 2012

computer-forensic-investigation-state-requirements

Computer Forensic Investigation State Requirements

By definition, computer forensics is the procedure wherein an expert sees through the files stored or recorded in a computer's system. These data may have been deleted, hidden, or saved. The search for the computer-related information uncovers the engagement in any crime or deception.

Computer forensics is nonetheless being widely used in the areas of intelligence, military, businesses, and law enforcement agencies. There is obviously a protocol that is followed in the course of the computer forensic investigation since the collected, analyzed, and examined data are presented before the courts of law in the effort of uncovering the malicious acts incurred by certain parties.

Moreover, as it is related to a legal action, it is but necessary that the computer forensic investigation state requirements are observed.

Computer forensics is an application which is not only confined to the recovery of any lost data. Such field is more so used in giving explanations and providing insights to any committed crime. Computer forensic investigation is often employed to collect the pertinent data in finding out the truth about a criminal or suspect to a crime.

With today's wide use of the Internet and the computer, it is very possible that clues may be traced from the electronic media sources. More so, the company employers are nowadays seeking for employees who are equipped with the rightful knowledge on the techniques and tools about computer forensic investigations.

It is necessary that the person is qualified to handle the task. Needless to say, a formal education on the said field is required. Among the instructions which the computer forensics training institutes tackle about are the enhancement of one's computer skills, important legal issues, and the needed computer forensic tools and techniques to be applied in different cases.

There are various computer forensic investigation state requirements and they vary from one state to another. However, we must touch on with the most common requisites which apply to all of them. The following discussion will provide you with the insights on the computer forensic state requirements for your perusal.

First of all, it is a must that the individual is a computer forensic professional. For one to attain this, a particular training course must be undertaken. Certificate programs in computer forensics are offered in a lot of institutions. The academic requirements differ too and it matters that one passes all of them.

Next, one must contain in him an all-embracing knowledge about the computer systems and how its applications and programs work. With these, one must also have the skill or the ability to restore any lost information from all types of electronic media but without the occurrence of any changes in them.

A forensic investigator must be knowledgeable of the computer software and hardware and must be capable of understanding the various operating systems in use these days.

An investigator should know the techniques to be used in uncovering the data from any type of file structure. There are different tools which need to be used in various cases.

Most importantly, a computer forensic investigator must be able to generate a refined report so that all of the input data are comprehensible enough even for those who don't understand the technicalities of the investigation.

These are just among the computer forensic investigation state requirements that must be strictly observed for a more precise result in the findings and conclusions in a particular case.


0