Saturday 31 March 2012

Data Recovery The Easy Way

It's a fact of life that bad things happen to good people's data every now and then. And when it does, too often the victim is not prepared for it. Is that the case with you? Are you prepared in advance for a complete loss of critical files and data on your computer or on your computer network?

If you aren't prepared in advance, you will most likely have to use a data recovery service or data recovery software solution to help get back as much as you can of what was lost. This can be a very good idea if there is no other way to recover your files, but it doesn't have to come to that in most cases.

This is a classic situation of where an ounce of prevention is worth a pound of cure. A very simple backup routine that is adhered to on a daily basis can usually solve any data loss situation quickly and fairly painlessly. And it won't cost you anything but the time neded to restore the data files from your backups, and maybe the program files from the original disks.

There is a wide choice of media that you can backup your files to, inclusing CDs, DVDs, external hard drives, other internal hard drives, tape drives, etc. They all work, it's just that each media choice has it's own pros and cons regarding ease of use, data storage capacity, and so on. A discussion of those limits is beyond the scope of this article, but the most important thing to remember is that the best backup is the one that works. That means that regardless of the media you choose, just make a choice and stick to a backup schedule like glue.

There are sevral good backup programs out there that work very well and will do a fine job, but most Microsoft Windows users have a great backup program included with their operating software. If you are a Windows XP user that program is called NTBackup. If it's not already installed on your computer insert your Windows CD, find the folder titled ValueAddMSFT

tbackup, and run the program in that folder called ntbackup.msi. It will set up the backup software for use on your computer in no time and you will even have simple to use wizards that will walk you through doing file backups and restores simply and easily.

Once the software is installed, it is now up to you to use it faithfully to prepare for data recovery when it is needed. Maybe you never will need it. But don't count on that. You will be so glad that you have a solid reliable way to restore lost files if disaster ever happens on your computer. It's truly the easy way to data recovery!


0

Friday 30 March 2012

Data Recovery 1 on 1

For this weeks report we are talking with Greg Duffield of ACS Data Recovery

Q: Greg, since the late '90's there has been tremendous growth within the data recovery industry, why is that and what does it mean to the consumer?

A: Well, in the last 10 years the amount of data stored digitally has increased tremendously. With this trend towards simplification of file storage, the trend for losing this data has also increased.

Before computers you had to worry about your office burning down, or some other man-made or natural disaster that might have effected your paper files. Now with just about everything stored on computers, the fear is no different and the possibilities of catastrophic data loss occuring are actually greater.

The end result has been an influx of data recovery firms throughout the world assisting consumers with the recovery of their lost data. The benefit and the downfall to the consumer is having these companies openly competing for their business.

Q: The open competition is a downfall to the consumer as well?

A: Absolutely. For some companies, data recovery has become the latest "get rich quick" scheme. So they shop the market, see what the trends in the industry are and then offer subpar services at a substantially discounted rate. Many of these companies advertise complete data recovery for as little as $99 with no evaluation fees. Unfortunately for the consumer, this usually results in hidden service charges, and additional expense when the data is found "unrecoverable". The sad part is, is that much of this data is actually recoverable, but the firm attempting the recovery just didn't have the expertise to complete the task successfully.

Q: How do you see this effecting the data recovery industry as a whole?

A: I think the firms dedicated to providing their customers quality service will stand out no matter what. People like to make fun of used car dealers, well in that industry there are real sleaze balls and at the same time there are class-A superior dealers that really do what is right. You see the same thing in every industry, and data recovery is no different.

Q: What should the consumer expect when they have lost their important data due to a hard drive crash or other calamity?

A: First of all, they will probably get a wide range of prices. On average I would say pricing for a standard IDE hard drive will probably run anywhere from $700 to $2,900. That's a pretty big spread.

I would say stick with companies that do not charge an evaluation fee first and foremost. Many times an experienced data recovery technician can determine the type of hard drive failure within the first few seconds of starting the drive up. You know you're either going to have to open the drive or your not. That element alone has a tremendous impact on the final price of the recovery and it can narrow the price band substantially.

When you send your drive in, don't expect it to be completed overnight. We try to give our customers reasonable expectations, because there's nothing worse than making promises you can't keep. We basically run our business by under promising and over delivering. We are up front with our customers and we know the boundaries of data recovery as far as what is and isn't possible. As a consumer I would suggest you search until you find companies with a similar business philosophy. In other words, be wary of companies promising complete data recovery in less than 24-hours. Depending on the amount of data needing to be recovered it can take that long just for the imaging.

Q: Where do you see data recovery going in the future?

A: I see consumers being supplied with more and more powerful tools to complete the easier recoveries on their own. However, there will always be a need for experienced data recovery firms simply because of the intricasies involved with invasive recoveries. These types of recoveries have to be performed in a class-100 or better clean room.

Thanks for taking the time to be with us Greg, and best of luck to you in the future.

A: Thanks Dan, it's been great.


0

Thursday 29 March 2012

Data Recovery

Every person who uses a personal computer will eventually face the challenge of data recovery. Computer hardware and software can be temperamental from time to time. Hard drives and other mechanical components of personal computers and servers do not last forever, and when they fail recovering your data can be difficult, time consuming and costly.

If you are working diligently away on a document or spreadsheet in Microsoft Office and the power goes out, you may still be able to recover the documents you were working on when the lights come back on. This type of data recovery is relatively easy and straightforward. Software manufacturers recognize that power outages are inevitable and unpredictable and most office applications incorporate what is known as autosave features. At set intervals, the documents you have open are saved to a cached file. They remain in that cached state and should be accessible once your power is restored. Simply opening Microsoft Word or Excel will usually bring these documents back. For instance, when you open Word after a power failure or a software error, you will be presented with a document followed by the word recovered in parentheses. This is the document you were working on at the most recent autosave point. You may still lose a couple minutes worth of work this way, but it sure be ats having to go back and retype the entire document.

If the recovered document does not appear automatically, search your hard drive for files ending with tmp. Look for one created close to the time of the power failure or software error and open it. This is most likely the document you had open at the time. If this method of data recovery does not work, you may need to follow the steps listed below.

Of course not all data recovery is so easy and so straightforward. If you delete a file accidentally, it is a simple matter to recover it from the recycle bin. Once you empty the recycle bin, however, things become more difficult. The deleted file still resides on your computer somewhere, but the pointer that tells the program where to find the file is now gone. There are various software tools available that promise to help recover deleted files, and they all have their strengths and weaknesses. Some of the major players are Norton, McAfee and Computer Associates. There are a great many smaller vendors as well.

Even if all these products fail to recover your data, you may not be completely out of luck. Data recovery services specialize in recovering data from failed and corrupt hard drives. These data recovery services have tools and equipment not available to the general public.

Government and law enforcement forensic teams will often make use of these advanced data recovery techniques to investigate cases of computer crime. Businesses also will turn to a professional data recovery service to recover mission critical data from damaged hard drives.

It is important to choose a reputable firm any time you need to have data recovery services performed. The firm you choose should be able to provide references from previous clients. You should make sure to follow up with the references they provide.

The cost for the data recovery service will vary according to the type of equipment and the difficulty of the job. You should get several estimates to make sure you are paying a fair price for the service you receive.


0

Wednesday 28 March 2012

DataRecoveryNet com Enters Medical Industry

Palm Beach Gardens FL- Florida based data recovery service, , launched a new service directed toward the medical community aimed at curtailing the loss of private and vital patient data as well as securing patient health information.

recovers data from malfunctioning, damaged, or failed hard drives and other media. This offering is sure to assist the medical industry with new HIPPA requirements. "The medical community is in need of specialty services like our data recovery service due to the new requirements of HIPAA" says Chuck Roover, President of Hospitals and other health care service companies store patient health information in hard drives that eventually fail.

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. The law required the US Dept. of Human Services to develop standards and requirements for the maintenance and transmission of health information.

This law refers to security, confidentiality, and non-disclosure of patient health information. These regulations went into effect on April 14, 2004.

About : Based in Palm Beach Gardens, Florida. is committed to delivering the most cost effective solutions for expert data recovery services. has been using their advanced technology and expertise to recover data for corporations and individuals alike for over 10 years. This company utilizes multiple world wide networks to source parts if needed. Delivering retrieved data in a timely manner, fanatical customer support, and confidentiality of client data is what keeps their clients' coming back.

On the web:


0

Tuesday 27 March 2012

Business Continuity and Disaster Recovery A Business Not a Technology Issue

Hackers, hurricanes, fires, flooding, power outages, denial of service attacks, application failures, employee error, sabotage and now terrorism are helping companies to focus on the necessity of a business continuity plan.

Through the late 1990s as companies prepared for Y2K, many IT executives, risk managers, CFOs and corporate managers realized that recovering computing systems, networks and data was not enough. As Y2K approached, it became more apparent that a disciplined approach was needed to recover not only data and systems, but also business processes, facilities and manpower to restore and maintain critical functions.

The starting point is a risk assessment. Identify and define your mission critical business processes and systems. Review them for vulnerabilities and identify steps required for restoration and recovery. For your data, make sure it is backed up to secure and separate locations. Evaluate various storage solutions including storage area networks, data replication systems, new virtualization systems, network attached storage devices and managed storage. Pay significant attention also to your telecommunications providers to ensure they have built diversity and redundancy into their networks and have well developed and tested contingency plans.

The risk assessment will start to drive out real questions on the business impacts and losses that could result from disruptions. Mission critical impacts, key business functions, processes and records must all be identified. This is also the time to determine resource requirements and acceptable recovery time frames.

Various recovery strategies should be evaluated to achieve your cost, reliability and time to recover objectives. Include physical, technological, legal, regulatory and personnel considerations when you evaluate alternatives. Common points of failure are a lack of executive and budget support and not fully engaging employees. Along with your data, employees are your most valuable asset. An excellent checklist "Considerations for senior management during a time of crisis" is at (enter checklists in the search box, click on DR & BC checklists).

Business continuity planning sounds expensive and it can be time-consuming. However, losing your business functions, processes and systems as well as your company, customer and financial data can be devastating. Build your plan. Train, test, train and test again.

Bob Mahood

Midwest Data Recovery Inc.

866 786 2595

312 907 2100


0

Monday 26 March 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.


0

Sunday 25 March 2012

The Best Data Recovery Choice For You

The best defense against a loss of data is a really solid and faithful backup routine of important files to reliable media. It's also a good idea for the media to be removable and portable if possible so that even if something happens to your whole computer for any reason, the data is protected by being in a totally different physical area.

OK, so that is the best solution to data loss. But what if you have not been backing up your drive like you should and now you find yourself confronted with the daunting task of getting all the important files back that were on your computer before the emergency happened? (By the way, you can take some comfort in knowing that quite a few people find themselves in this situation. You are not alone.) What are your choices at this point?

Well, basically there are two ways of recovering data from a damaged disk, either by using a data recovery service or a data recovery software package. Either can do the job, but there are some factors that should go into your decision about which one to use. First, are you pretty computer savvy? If you are then maybe data recovery software will work for you. If not, do not try this method at all. The other is how much time do you have to spend on retrieving this data? If you have lots of time to put into it, then consider doing the job yourself with a reputable software package. If you don't have much time to devote to this endeavor, don't waste both time and money with the software option.

If you have decided upon using a data recovery service, you should know that the odds are that you will get a good portion, if not all of your data back. The generally accepted success rate in the industry is around 80%. Much of the success will depend on the skill and determination of the data recovery specialist who will be working on your drive. They all have sophisticated software tools to work with, but data recovery is not as simple as just plugging in a piece of software, walking away and coming back when it has found all the files. It often requires a specialist who is a bit of a detective, andnot easily discouraged, to get back a good portion of data, especially on drives with physical damage.

Don't be surprised to get two quotes for data recovery from some companies either. One for logical data retrieval that is much easier to handle and will be a much lower figure, and one for physical damage which is far more challenging and therefore rightly costs more. You will also find that cost quotes will often vary considerably. It is usually best to choose somewhere in the middle of the pack toward the higher end. The reason for this is that some companies engage in a bait and switch tactic that indicates that they will cost less initially, but when they actually receive the drive they wil claim that upon review the cost will be much higher. It's best to avoid messing with these companies at all.

So if you have lost data and have no backups to fall back on, data recovery can still be done. Just use the guidelines presented in this article for choosing the data recovery method that will work best for you.


0

Saturday 24 March 2012

MCSE 70 290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued, and achieved technical certifications in the IT industry. The demand for Microsoft Certified Professionals in the job market is increasing every year.

Microsoft offers a number of certification levels depending on specific areas of proficiency and nature of job. Some of the certifications pertaining to networking are

Microsoft Certified Professional (MCP)

Microsoft Certified System Administrator (MCSA)

Microsoft Certified System Engineer (MCSE)

Each certification level has certain exams associated with it. You can decide the appropriate certification exam based on your experience, skills, and interests.

Benefits of Microsoft Certifications

Microsoft Certifications provide a standard method for testing employee skills. The certifications provide employers a valid benchmark for evaluating the employee's abilities. This will provide you the recognition and reward as per your expertise.

Microsoft Certifications offer prospective employers a baseline to judge your knowledge, skill, and expertise in the field. Certifications can provide added advantage if you are at the same level of experience as another person without certifications.

Certifications are a valuable tool if you have no or very little experience. The certifications that you hold can prove and reassure your employers and consultants about your knowledge in the field. This will help you secure good job as well as negotiate a good salary.

Pre-Requisite Experience (Recommended) for Microsoft Certifications

To pursue this certification you should have at least 1 year of experience in:

Implementing and administering a network operating system in environments with 50 to 26,000 supported users, in approximately 3 to 150 physical locations.

Implementing network services and applications such as file and print services, database services, messaging services, proxy server or firewall services, dial-in server services, and Web hosting.

Implementing and administering a desktop operating system.

Designing a network infrastructure with 3 or more domain controllers.

Significance of Microsoft Certifications for Microsoft Windows Server 2003

Microsoft has developed independent certification requirements for Microsoft Windows Server 2003. An aspirant can certify directly for MCSE/MCSA in Windows 2003 if they are new to certification process. If the aspirant is already a certified MCSE /MCSA in Windows 2000, then they can follow the upgrade path for MCSEs in Windows 2000 to secure Windows 2003 Certifications. If the aspirant certifies in MCSE for Windows NT4.0, they can earn MCSE in Windows 2003 by following the upgrade path for MCSEs in Windows NT4.0.

The exams are slightly more challenging than their Windows 2000 counterparts, but they will actually test your hands-on knowledge since that is the most important part of ensuring that a certification is credible.

Exam 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment

Exam 70-290 is the first in the series of the core exams for MCSE certifications.

When you pass the Managing and Maintaining a Microsoft Windows Server 2003 Environment (MCSE 70-290) exam, you achieve Microsoft Certified Professional (MCP) status. You also earn credit toward the following certifications:

Core credit towards Microsoft Certified Systems Administrator (MCSA) on Microsoft Windows Server 2003 certification

Core credit towards Microsoft Certified Systems Engineer (MCSE) on Microsoft Windows Server 2003 certification

MCSE 70-290 exam objectives are

Objective 1: Managing and Maintaining Physical and Logical Devices

In this objective you will need to demonstrate expertise in managing and maintaining physical and logical devices. As an administrator, you should understand Basic and Dynamic disks, RAID configuration and troubleshooting, driver signing, and the use of tools, such as Device Manager and Hardware Troubleshooting Wizard. Familiarize yourself with Device Manager and the warning and disabled icons found when problems are present on installed devices.

Objective 2: Managing Users, Computers, and Groups

This objective includes many topics, so you should be prepared to face many questions that fall into this category. Have a healthy introduction to profile management, user and group accounts, permissions, and troubleshooting. Practice a lot on GPOs and perform a variety of administrative tasks, including configuration of desktop settings, control of security settings, assignment of scripts, redirection of folders, and software distribution. Also, get a clear understanding on inheritance and filtering.

Objective 3: Managing and Maintaining Access to Resources

Knowing how to configure, monitor, audit and troubleshoot NTFS permissions based issues are one of those most important areas that you need to know this concept thoroughly and also be sure to brush up on your share permissions and share/NTFS permissions interaction. Do not forget to brush up on how folder and file permissions can change or stay the same when copying or moving within a drive or between drives.

Objective 4: Managing and Maintaining a Server Environment

In this objective you'll find questions from topics, such as Event Viewer, System Monitor, software updates (including the functionality of Microsoft's Software Update Service or SUS), Remote Assistance, disk quotas, print queues, performance objects and IIS 6.0. Spend time understanding IIS topics around Web sites, Virtual and physical directories, files and host and cname records in DNS. New to Windows Server 2003 is SUS. Understand clearly how SUS is used for deploying and managing client and server critical updates.

Objective 5: Managing and Implementing Disaster Recovery

In this objective you'll find questions on ASR, VSS, backing up files and system state data, configuring security for backup operators, verifying backup jobs, managing media, restoring and scheduling backups and recovering from server hardware failures. You should take some extra time to get familiar with the various types of backups that Windows Server 2003 supports, as well as the various configuration options that are available to you. Practice making backups of different types and then practice restoring them.

MCSE 70-290 Exam Model

Most of the questions in the MCSE 70-290 exam are multiple choice type. The questions require the "best" answer from several close responses. Other questions may present an implementation scenario, requirements, and a proposed solution and then ask if the solution meets all of the requirements or combinations of the primary and secondary requirements. Microsoft has introduced some testing innovations for the certification exams. These question types present a more realistic visual representation of the tasks a MCSE would do in future. These are

Hot Area Questions

This type of question requires indicating the correct answer by selecting one or more elements within a graphic.

Active Screen Questions - This type of question asks you to configure a dialog box by changing one or more elements.

Drag and Drop Questions - This type of question asks you to drag source objects to appropriate targets within a work area.

Build List and Reorder Questions - This type of question asks you to indicate the correct answer by building an answer list. In a Build List and Reorder question, you need to build a list by dragging the appropriate source objects to the answer list and then placing them in the correct order based on criteria defined in the question.

Create a Tree Questions - This type of question asks you to create a tree structure. You indicate the correct answer by dragging source nodes to the correct locations in the answer tree. Nodes consist of text and a small icon.

Windows Simulation Questions - This type of question asks you to indicate the correct answer by performing specific tasks such as configuring and installing network adapters or drivers, configuring and controlling access to files, and managing hardware devices. Many of the tasks that systems administrators and systems engineers perform can be presented more accurately in simulations than in most traditional exam question types.

You can get hands-on experience on new set of questions that are available in Whizlabs MCSE 70-290 Exam Simulator. This will help you plan your study regime to ensure success.

Passing Score

Microsoft has normalized scoring for all MCP exams, so the same passing score applies to all exams. 700 is now the minimum passing score for all MCP exams. However, the maximum score (which used to top out at 1000) varies per exam, depending on the complexity of the skills measured.

Time Limit

The exam duration is 175 minutes with 45 questions. You will have plenty of time to answer the exam questions, so there is no need to rush. If you have spare time available, you can double check the questions and ensure that you have read them correctly and actually answered the question as intended.

Exam Result

Instead of reporting results based on major categories for exam objectives as it used to, Microsoft is now providing numerical scores and bar graphs for "skills clusters". Visually, the bars in the exam report show you how well you fare in each skills cluster. If bars that represent cluster scores are close to one end of the graph, they indicate stronger skills; bars near the other end indicate weaker skills. Please store your exam results in both paper and electronic format for later reference.

Sample Questions

Question 1

You are a systems administrator for TicTacToe Toy Manufacturers. All servers in the company run on Microsoft Windows Server 2003. The company's Active Directory infrastructure consists of a single domain hosted on two domain controllers named Tic1 and Tic2.

Tic2 experienced a hard disk failure, and hence has been taken offline. Tic2 remained offline for some days while all Active Directory updates were made to Tic1. You proceed to restore the data from backup while ensuring that the latest Active Directory changes are replicated to Tic2.

How should you restore the lost data from backup?

Choices:

Perform authoritative restore on Tic1.

Perform normal restore on Tic2.

Perform primary restore on Tic2.

Perform authoritative restore onTic2.

Correct Choice: B

Explanation:

Choice B is the correct answer.

During a normal restore operation; Backup operates in non-authoritative restore mode. That is, any data that you restore, including Active Directory objects, will have their original update sequence number. The Active Directory replication system uses this number to detect and propagate Active Directory changes among the servers in your organization. Because of this, any data that is restored non-authoritatively will appear to the Active Directory replication system as though it is old, which means the data will never be replicated to your other servers. Instead, if newer data is available from your other domain controllers, the Active Directory replication will update the restored data. Hence, choices A, C, and D are incorrect.

Question 2

You are a systems administrator for Blueberry Packaging Industries. All servers in the company run on Microsoft Windows Server 2003.

You create a folder named Custom Package on the company's file server to contain the company's files. You share this folder as Custom Package. The folder is configured with default NTFS permissions and default share permissions. The file server is located in a secure room.

Within the shared folder, Managers should be able to add and change files and subfolders. Employees in the Sales and Packers department should be able to change and delete files and subfolders. All other employees should only be able to view the files.

All Sales employees are members of the Sales domain local security group. All Managers are members of the Managers domain local security group. The Packers are members of the Packers global security group.

How should you modify share level permissions on the Custom Package folder so that the appropriate users have the minimum required privileges? (Choose all that apply)

Choices:

Grant Change share permissions to Managers.

Deny Full Control share permissions to Managers.

Grant Change share permissions to Sales.

Grant Full Control share permissions to Sales.

Grant Change share permissions to Packers.

Grant Full Control share permissions to Packers.

Deny Full Control share permissions to Everyone.

Remove Everyone from the share permissions list.

Correct Choices: A, C, and E

Explanation:

Choices A, C, and E are the correct answers.

Change permissions allow the users to create, delete, and change any files and folders in the shared folder, provided the users have appropriate NTFS permissions on the files and folders. The default NTFS permission in Windows Server 2003 is Read for Everyone and the default share level permissions grant Read access to Everyone. You should not remove Everyone from the share permission list. By default, share level permissions grant Read access to Everyone.

How to Prepare for Microsoft Certification?

Following are the steps to prepare for Microsoft certification.

MCSE exams are not easy, as advertised on many websites. The MCSE Certifications are tough, so plan to put in a lot of time and effort getting ready for your certification exams. Get all information you can about the certification exams and then start working towards your goal.

Get hands on experience. The first step in the preparation for any Microsoft Certification is hands on experience with the related product. For MCSE, the aspirant needs to have at least a year of working experience and for MCSA, the minimum recommended time of experience is 6 months. If you are not working anywhere, it will help, if you can volunteer your IT skill services to gain valuable experience.

You can set up a small network at home to practice. Setting up the home network will give a great opportunity to learn. You can practice the lab exercises in the home network as and when you study. This will give you a better understanding of the theories than just studying the exam guides.

Get trained in the related product. If possible, try to get training in the related product in a Microsoft Authorized Training Center. You can use training resources to supplement your skills and experience. You can also use the Microsoft Official Curriculum for the related exam as well as Microsoft Press books that are available for the exam.

For Exam 70-290, the main areas that you need to concentrate are

Automated System Recovery (ASR)

Diskpart utility

Diskraid utility

Emergency Management Services (EMS)

File Replication Service (FRS)

Group Policy Management Console (GPMC)

Open File Backup

Password Backup and Restore Wizard

Remote Assistance

Remote Desktop

Shadow copying of shared folders

Software Update Services (SUS)

Virtual disk service

Permissions -Share and NTFS

Users, Computers, and Groups

Use the preparation guide of the exam that you want to take and read it thoroughly. You should know all the exam objectives of MCSE 70-290 covered in the exam preparation guide.

Use practice test software packages. Whizlabs MCSE 70-290 Exam Simulator is an example.

Do NOT use Braindumps. Braindumps might help you get the certification, but you will lack important practical knowledge about the product. Hence, your prospects of landing a good IT job will be less. Some brain dumps deliberately mislead you. So BEWARE!

You can participate in any online discussion forum, where you can participate in an ongoing dialogue and even ask doubts if you have any. You are sure to get the right guidance.

You've learned the details about the MCSE 70-290 Exam, its pattern, objectives etc. Download the MCSE Exam Preparation Guide to learn how Whizlabs can help you achieve the MCSE credential.

Resources

Exam simulators

Whizlabs MCSE 70-290 Exam Simulator

Besides identifying your weak areas and giving you a feel of the exam environment, Whizlabs Exam Simulator nurtures your potential to acquire domain expertise so that you not only succeed in your certification exam but succeed in your career too.

Articles on Windows 2003

Microsoft's Windows 2003 Server Home Page

What's New in Active Directory

Windows Server 2003 Demos

Windows Server 2003, Standard Edition

Microsoft Online Resources

TechNet : Designed for IT professionals, this resource includes Howto's, best practices, downloads, technical chats, and much more.

MSDN : The Microsoft Developer Network (MSDN) is a reference for developers, featuring code samples, technical articles, newsgroups, chats, and more.

Training & Certification Newsgroups : A newsgroup exists for every Microsoft certification. By participating in the ongoing dialogue, you take advantage of a unique opportunity to exchange ideas with and ask questions of others, including more than 750 Microsoft Most Valuable Professionals (MVPs) worldwide.


0

Friday 23 March 2012

Learn How To Safely Backup Your Hard Drive

We all know that we should back up our system as soon as possible.But if you're like most of us,you will get to it tomorrow.The problem is that tomorrow rarely ever comes until you experience a serious computer failure and then its too lake.

Taking the time to backup your data or entire hard drive is not as painstaking as it may seem.And the rewards of doing so will be great should your system experience a crash.

WINDOWS AND OTHER BACKUP SOFTWARE

If you have Windows XP you willl need to install the new Windows backup ultility from the Windows XP cdrom.Just place the WinXP cdrom in your cdrom drive and locate the line D:VALEADDMSFTNTBACKUP.

Here you see the first letter as D but if your optical drive have a different drive letter,exchange the D with your drive's letter.To install the utility,click on the file named NTBackup.msi.

The backup utility will be installed to the system tools group. Click Start,All Programs,Accessories,System Tools,and Backup.There is a neat wizard that will walk you through the backup process.

WinXP's backup utility will backup your entire hard drive and will make a recovery disk to boot.

One neat third party backup software you can try is NewTech InfoSystems at where you can download their trial version and put it to use for 30 days.And if its your cup of tea,the full version will run you about $79.95

INCREMENTAL OR DIFFERENTIAL BACKUPS

You should back up your entire hard drive when you perform your first backup.After that it is best to perform an Incremental backup.This type of backup only allow you to backup files that have changed since your last performed backup.

Differential Backups copy changed files and files that have been added since you last did your entire backup. This type of backup is more detailed than incremental backups and is easier to restore.

BACKUP STORAGE DEVICES

You can backup your files on cdroms and have the files compressed to save both space and backup time.WinXP will compress folders,subfolders,and files during backup.

You can purchase compression software that will do the same saving you cdrom storage space.The compressed files are automatically uncompressed once they are restored unto your hard drive.

You can also use a second hard drive as your backup storage device.We use two backup hard drives to be certain Ultimate PC Repair is up and running 24/7.

You can either purchase an internal hard drive in install it to your ide cable or you may want to purchase an external hard drive that connects to your Universal Serial Bus or USB Port.

The advantage of the external drives is that they have very large amount of storage space,transfer data fast,and can be moved from your computer to any other computer.

We use the Western Digital 170 Gigabyte External Hard Drive and we simply bounce it around to either one of our four computers with the greatest of ease.

USING ONLINE BACKUP SERVICES

You may also consider online services for backing up your data.If you lose all your backup data,say due it a natural dissaster such as a flood,your online data is right there waiting for you.

Another advantage of online backups is that you can access,upload,or download your data from any location. It is best to use high speed internet access if you're considering online data storage.

One such online backup service is Istorage located at /istorage and charges from $2.49 a month for 50MBs to $17.95 a month for a big 1,000MBs of storage.

Or you can check out FilesAnywhere located at the url

Still another online service to try is CapSure located at

Backup your system now in one way or another if you have not done so.If you have critical data that you simply cannot due without,take the time to invest in a backup device or one of the many online backup services.

Stop and perform those backups as soon as possible. You will be thankful you did should something go wrong with your computer.Its always better to be safe than sorry.


0

Thursday 22 March 2012

Drive Solutions Inc Expands Data Recovery Service

For over 11 years Drive Solutions, Inc. has been selling hard to find early model hard drives as well as new drives to large corporations, small business, and individuals alike.

During this time Drive Solutions has performed Data Recovery Services for many fortune 500 companies and Government agencies.

Drive Solutions Inc has expanded their Data Recovery Services to the public at a very economical price.

Drive Solutions, Inc. Specializes in recovery of Notebook and PC hard drives as well as other forms of storage media such as Digital camera memory cards, USB jump drives, CD, DVD, and more.

In previous years Data Recovery was far too expensive for an individual to afford. As time and technology have moved forward the cost of the data recovery service has decreased dramatically making it an affordable service for everyone.

Years ago you could expect to pay upwards of $3000.00 for the recovery of your vital data. Today the successful recovery of your data can run under $400.00 making this service very affordable for end users.

I spoke with the Director of Business Development at Drive Solutions, Bruce Masterson, who said


0

Wednesday 21 March 2012

Data Recovery The Easy Way

It's a fact of life that bad things happen to good people's data every now and then. And when it does, too often the victim is not prepared for it. Is that the case with you? Are you prepared in advance for a complete loss of critical files and data on your computer or on your computer network?

If you aren't prepared in advance, you will most likely have to use a data recovery service or data recovery software solution to help get back as much as you can of what was lost. This can be a very good idea if there is no other way to recover your files, but it doesn't have to come to that in most cases.

This is a classic situation of where an ounce of prevention is worth a pound of cure. A very simple backup routine that is adhered to on a daily basis can usually solve any data loss situation quickly and fairly painlessly. And it won't cost you anything but the time neded to restore the data files from your backups, and maybe the program files from the original disks.

There is a wide choice of media that you can backup your files to, inclusing CDs, DVDs, external hard drives, other internal hard drives, tape drives, etc. They all work, it's just that each media choice has it's own pros and cons regarding ease of use, data storage capacity, and so on. A discussion of those limits is beyond the scope of this article, but the most important thing to remember is that the best backup is the one that works. That means that regardless of the media you choose, just make a choice and stick to a backup schedule like glue.

There are sevral good backup programs out there that work very well and will do a fine job, but most Microsoft Windows users have a great backup program included with their operating software. If you are a Windows XP user that program is called NTBackup. If it's not already installed on your computer insert your Windows CD, find the folder titled ValueAddMSFT

tbackup, and run the program in that folder called ntbackup.msi. It will set up the backup software for use on your computer in no time and you will even have simple to use wizards that will walk you through doing file backups and restores simply and easily.

Once the software is installed, it is now up to you to use it faithfully to prepare for data recovery when it is needed. Maybe you never will need it. But don't count on that. You will be so glad that you have a solid reliable way to restore lost files if disaster ever happens on your computer. It's truly the easy way to data recovery!


0

Tuesday 20 March 2012

Data Recovery 1 on 1

For this weeks report we are talking with Greg Duffield of ACS Data Recovery

Q: Greg, since the late '90's there has been tremendous growth within the data recovery industry, why is that and what does it mean to the consumer?

A: Well, in the last 10 years the amount of data stored digitally has increased tremendously. With this trend towards simplification of file storage, the trend for losing this data has also increased.

Before computers you had to worry about your office burning down, or some other man-made or natural disaster that might have effected your paper files. Now with just about everything stored on computers, the fear is no different and the possibilities of catastrophic data loss occuring are actually greater.

The end result has been an influx of data recovery firms throughout the world assisting consumers with the recovery of their lost data. The benefit and the downfall to the consumer is having these companies openly competing for their business.

Q: The open competition is a downfall to the consumer as well?

A: Absolutely. For some companies, data recovery has become the latest "get rich quick" scheme. So they shop the market, see what the trends in the industry are and then offer subpar services at a substantially discounted rate. Many of these companies advertise complete data recovery for as little as $99 with no evaluation fees. Unfortunately for the consumer, this usually results in hidden service charges, and additional expense when the data is found "unrecoverable". The sad part is, is that much of this data is actually recoverable, but the firm attempting the recovery just didn't have the expertise to complete the task successfully.

Q: How do you see this effecting the data recovery industry as a whole?

A: I think the firms dedicated to providing their customers quality service will stand out no matter what. People like to make fun of used car dealers, well in that industry there are real sleaze balls and at the same time there are class-A superior dealers that really do what is right. You see the same thing in every industry, and data recovery is no different.

Q: What should the consumer expect when they have lost their important data due to a hard drive crash or other calamity?

A: First of all, they will probably get a wide range of prices. On average I would say pricing for a standard IDE hard drive will probably run anywhere from $700 to $2,900. That's a pretty big spread.

I would say stick with companies that do not charge an evaluation fee first and foremost. Many times an experienced data recovery technician can determine the type of hard drive failure within the first few seconds of starting the drive up. You know you're either going to have to open the drive or your not. That element alone has a tremendous impact on the final price of the recovery and it can narrow the price band substantially.

When you send your drive in, don't expect it to be completed overnight. We try to give our customers reasonable expectations, because there's nothing worse than making promises you can't keep. We basically run our business by under promising and over delivering. We are up front with our customers and we know the boundaries of data recovery as far as what is and isn't possible. As a consumer I would suggest you search until you find companies with a similar business philosophy. In other words, be wary of companies promising complete data recovery in less than 24-hours. Depending on the amount of data needing to be recovered it can take that long just for the imaging.

Q: Where do you see data recovery going in the future?

A: I see consumers being supplied with more and more powerful tools to complete the easier recoveries on their own. However, there will always be a need for experienced data recovery firms simply because of the intricasies involved with invasive recoveries. These types of recoveries have to be performed in a class-100 or better clean room.

Thanks for taking the time to be with us Greg, and best of luck to you in the future.

A: Thanks Dan, it's been great.


0

Monday 19 March 2012

Data Recovery

Every person who uses a personal computer will eventually face the challenge of data recovery. Computer hardware and software can be temperamental from time to time. Hard drives and other mechanical components of personal computers and servers do not last forever, and when they fail recovering your data can be difficult, time consuming and costly.

If you are working diligently away on a document or spreadsheet in Microsoft Office and the power goes out, you may still be able to recover the documents you were working on when the lights come back on. This type of data recovery is relatively easy and straightforward. Software manufacturers recognize that power outages are inevitable and unpredictable and most office applications incorporate what is known as autosave features. At set intervals, the documents you have open are saved to a cached file. They remain in that cached state and should be accessible once your power is restored. Simply opening Microsoft Word or Excel will usually bring these documents back. For instance, when you open Word after a power failure or a software error, you will be presented with a document followed by the word recovered in parentheses. This is the document you were working on at the most recent autosave point. You may still lose a couple minutes worth of work this way, but it sure be ats having to go back and retype the entire document.

If the recovered document does not appear automatically, search your hard drive for files ending with tmp. Look for one created close to the time of the power failure or software error and open it. This is most likely the document you had open at the time. If this method of data recovery does not work, you may need to follow the steps listed below.

Of course not all data recovery is so easy and so straightforward. If you delete a file accidentally, it is a simple matter to recover it from the recycle bin. Once you empty the recycle bin, however, things become more difficult. The deleted file still resides on your computer somewhere, but the pointer that tells the program where to find the file is now gone. There are various software tools available that promise to help recover deleted files, and they all have their strengths and weaknesses. Some of the major players are Norton, McAfee and Computer Associates. There are a great many smaller vendors as well.

Even if all these products fail to recover your data, you may not be completely out of luck. Data recovery services specialize in recovering data from failed and corrupt hard drives. These data recovery services have tools and equipment not available to the general public.

Government and law enforcement forensic teams will often make use of these advanced data recovery techniques to investigate cases of computer crime. Businesses also will turn to a professional data recovery service to recover mission critical data from damaged hard drives.

It is important to choose a reputable firm any time you need to have data recovery services performed. The firm you choose should be able to provide references from previous clients. You should make sure to follow up with the references they provide.

The cost for the data recovery service will vary according to the type of equipment and the difficulty of the job. You should get several estimates to make sure you are paying a fair price for the service you receive.


0

Sunday 18 March 2012

DataRecoveryNet com Enters Medical Industry

Palm Beach Gardens FL- Florida based data recovery service, , launched a new service directed toward the medical community aimed at curtailing the loss of private and vital patient data as well as securing patient health information.

recovers data from malfunctioning, damaged, or failed hard drives and other media. This offering is sure to assist the medical industry with new HIPPA requirements. "The medical community is in need of specialty services like our data recovery service due to the new requirements of HIPAA" says Chuck Roover, President of Hospitals and other health care service companies store patient health information in hard drives that eventually fail.

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. The law required the US Dept. of Human Services to develop standards and requirements for the maintenance and transmission of health information.

This law refers to security, confidentiality, and non-disclosure of patient health information. These regulations went into effect on April 14, 2004.

About : Based in Palm Beach Gardens, Florida. is committed to delivering the most cost effective solutions for expert data recovery services. has been using their advanced technology and expertise to recover data for corporations and individuals alike for over 10 years. This company utilizes multiple world wide networks to source parts if needed. Delivering retrieved data in a timely manner, fanatical customer support, and confidentiality of client data is what keeps their clients' coming back.

On the web:


0

Saturday 17 March 2012

Business Continuity and Disaster Recovery A Business Not a Technology Issue

Hackers, hurricanes, fires, flooding, power outages, denial of service attacks, application failures, employee error, sabotage and now terrorism are helping companies to focus on the necessity of a business continuity plan.

Through the late 1990s as companies prepared for Y2K, many IT executives, risk managers, CFOs and corporate managers realized that recovering computing systems, networks and data was not enough. As Y2K approached, it became more apparent that a disciplined approach was needed to recover not only data and systems, but also business processes, facilities and manpower to restore and maintain critical functions.

The starting point is a risk assessment. Identify and define your mission critical business processes and systems. Review them for vulnerabilities and identify steps required for restoration and recovery. For your data, make sure it is backed up to secure and separate locations. Evaluate various storage solutions including storage area networks, data replication systems, new virtualization systems, network attached storage devices and managed storage. Pay significant attention also to your telecommunications providers to ensure they have built diversity and redundancy into their networks and have well developed and tested contingency plans.

The risk assessment will start to drive out real questions on the business impacts and losses that could result from disruptions. Mission critical impacts, key business functions, processes and records must all be identified. This is also the time to determine resource requirements and acceptable recovery time frames.

Various recovery strategies should be evaluated to achieve your cost, reliability and time to recover objectives. Include physical, technological, legal, regulatory and personnel considerations when you evaluate alternatives. Common points of failure are a lack of executive and budget support and not fully engaging employees. Along with your data, employees are your most valuable asset. An excellent checklist "Considerations for senior management during a time of crisis" is at (enter checklists in the search box, click on DR & BC checklists).

Business continuity planning sounds expensive and it can be time-consuming. However, losing your business functions, processes and systems as well as your company, customer and financial data can be devastating. Build your plan. Train, test, train and test again.

Bob Mahood

Midwest Data Recovery Inc.

866 786 2595

312 907 2100


0

Friday 16 March 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.


0

Thursday 15 March 2012

MCSE 70 290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued, and achieved technical certifications in the IT industry. The demand for Microsoft Certified Professionals in the job market is increasing every year.

Microsoft offers a number of certification levels depending on specific areas of proficiency and nature of job. Some of the certifications pertaining to networking are

Microsoft Certified Professional (MCP)

Microsoft Certified System Administrator (MCSA)

Microsoft Certified System Engineer (MCSE)

Each certification level has certain exams associated with it. You can decide the appropriate certification exam based on your experience, skills, and interests.

Benefits of Microsoft Certifications

Microsoft Certifications provide a standard method for testing employee skills. The certifications provide employers a valid benchmark for evaluating the employee's abilities. This will provide you the recognition and reward as per your expertise.

Microsoft Certifications offer prospective employers a baseline to judge your knowledge, skill, and expertise in the field. Certifications can provide added advantage if you are at the same level of experience as another person without certifications.

Certifications are a valuable tool if you have no or very little experience. The certifications that you hold can prove and reassure your employers and consultants about your knowledge in the field. This will help you secure good job as well as negotiate a good salary.

Pre-Requisite Experience (Recommended) for Microsoft Certifications

To pursue this certification you should have at least 1 year of experience in:

Implementing and administering a network operating system in environments with 50 to 26,000 supported users, in approximately 3 to 150 physical locations.

Implementing network services and applications such as file and print services, database services, messaging services, proxy server or firewall services, dial-in server services, and Web hosting.

Implementing and administering a desktop operating system.

Designing a network infrastructure with 3 or more domain controllers.

Significance of Microsoft Certifications for Microsoft Windows Server 2003

Microsoft has developed independent certification requirements for Microsoft Windows Server 2003. An aspirant can certify directly for MCSE/MCSA in Windows 2003 if they are new to certification process. If the aspirant is already a certified MCSE /MCSA in Windows 2000, then they can follow the upgrade path for MCSEs in Windows 2000 to secure Windows 2003 Certifications. If the aspirant certifies in MCSE for Windows NT4.0, they can earn MCSE in Windows 2003 by following the upgrade path for MCSEs in Windows NT4.0.

The exams are slightly more challenging than their Windows 2000 counterparts, but they will actually test your hands-on knowledge since that is the most important part of ensuring that a certification is credible.

Exam 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment

Exam 70-290 is the first in the series of the core exams for MCSE certifications.

When you pass the Managing and Maintaining a Microsoft Windows Server 2003 Environment (MCSE 70-290) exam, you achieve Microsoft Certified Professional (MCP) status. You also earn credit toward the following certifications:

Core credit towards Microsoft Certified Systems Administrator (MCSA) on Microsoft Windows Server 2003 certification

Core credit towards Microsoft Certified Systems Engineer (MCSE) on Microsoft Windows Server 2003 certification

MCSE 70-290 exam objectives are

Objective 1: Managing and Maintaining Physical and Logical Devices

In this objective you will need to demonstrate expertise in managing and maintaining physical and logical devices. As an administrator, you should understand Basic and Dynamic disks, RAID configuration and troubleshooting, driver signing, and the use of tools, such as Device Manager and Hardware Troubleshooting Wizard. Familiarize yourself with Device Manager and the warning and disabled icons found when problems are present on installed devices.

Objective 2: Managing Users, Computers, and Groups

This objective includes many topics, so you should be prepared to face many questions that fall into this category. Have a healthy introduction to profile management, user and group accounts, permissions, and troubleshooting. Practice a lot on GPOs and perform a variety of administrative tasks, including configuration of desktop settings, control of security settings, assignment of scripts, redirection of folders, and software distribution. Also, get a clear understanding on inheritance and filtering.

Objective 3: Managing and Maintaining Access to Resources

Knowing how to configure, monitor, audit and troubleshoot NTFS permissions based issues are one of those most important areas that you need to know this concept thoroughly and also be sure to brush up on your share permissions and share/NTFS permissions interaction. Do not forget to brush up on how folder and file permissions can change or stay the same when copying or moving within a drive or between drives.

Objective 4: Managing and Maintaining a Server Environment

In this objective you'll find questions from topics, such as Event Viewer, System Monitor, software updates (including the functionality of Microsoft's Software Update Service or SUS), Remote Assistance, disk quotas, print queues, performance objects and IIS 6.0. Spend time understanding IIS topics around Web sites, Virtual and physical directories, files and host and cname records in DNS. New to Windows Server 2003 is SUS. Understand clearly how SUS is used for deploying and managing client and server critical updates.

Objective 5: Managing and Implementing Disaster Recovery

In this objective you'll find questions on ASR, VSS, backing up files and system state data, configuring security for backup operators, verifying backup jobs, managing media, restoring and scheduling backups and recovering from server hardware failures. You should take some extra time to get familiar with the various types of backups that Windows Server 2003 supports, as well as the various configuration options that are available to you. Practice making backups of different types and then practice restoring them.

MCSE 70-290 Exam Model

Most of the questions in the MCSE 70-290 exam are multiple choice type. The questions require the "best" answer from several close responses. Other questions may present an implementation scenario, requirements, and a proposed solution and then ask if the solution meets all of the requirements or combinations of the primary and secondary requirements. Microsoft has introduced some testing innovations for the certification exams. These question types present a more realistic visual representation of the tasks a MCSE would do in future. These are

Hot Area Questions

This type of question requires indicating the correct answer by selecting one or more elements within a graphic.

Active Screen Questions - This type of question asks you to configure a dialog box by changing one or more elements.

Drag and Drop Questions - This type of question asks you to drag source objects to appropriate targets within a work area.

Build List and Reorder Questions - This type of question asks you to indicate the correct answer by building an answer list. In a Build List and Reorder question, you need to build a list by dragging the appropriate source objects to the answer list and then placing them in the correct order based on criteria defined in the question.

Create a Tree Questions - This type of question asks you to create a tree structure. You indicate the correct answer by dragging source nodes to the correct locations in the answer tree. Nodes consist of text and a small icon.

Windows Simulation Questions - This type of question asks you to indicate the correct answer by performing specific tasks such as configuring and installing network adapters or drivers, configuring and controlling access to files, and managing hardware devices. Many of the tasks that systems administrators and systems engineers perform can be presented more accurately in simulations than in most traditional exam question types.

You can get hands-on experience on new set of questions that are available in Whizlabs MCSE 70-290 Exam Simulator. This will help you plan your study regime to ensure success.

Passing Score

Microsoft has normalized scoring for all MCP exams, so the same passing score applies to all exams. 700 is now the minimum passing score for all MCP exams. However, the maximum score (which used to top out at 1000) varies per exam, depending on the complexity of the skills measured.

Time Limit

The exam duration is 175 minutes with 45 questions. You will have plenty of time to answer the exam questions, so there is no need to rush. If you have spare time available, you can double check the questions and ensure that you have read them correctly and actually answered the question as intended.

Exam Result

Instead of reporting results based on major categories for exam objectives as it used to, Microsoft is now providing numerical scores and bar graphs for "skills clusters". Visually, the bars in the exam report show you how well you fare in each skills cluster. If bars that represent cluster scores are close to one end of the graph, they indicate stronger skills; bars near the other end indicate weaker skills. Please store your exam results in both paper and electronic format for later reference.

Sample Questions

Question 1

You are a systems administrator for TicTacToe Toy Manufacturers. All servers in the company run on Microsoft Windows Server 2003. The company's Active Directory infrastructure consists of a single domain hosted on two domain controllers named Tic1 and Tic2.

Tic2 experienced a hard disk failure, and hence has been taken offline. Tic2 remained offline for some days while all Active Directory updates were made to Tic1. You proceed to restore the data from backup while ensuring that the latest Active Directory changes are replicated to Tic2.

How should you restore the lost data from backup?

Choices:

Perform authoritative restore on Tic1.

Perform normal restore on Tic2.

Perform primary restore on Tic2.

Perform authoritative restore onTic2.

Correct Choice: B

Explanation:

Choice B is the correct answer.

During a normal restore operation; Backup operates in non-authoritative restore mode. That is, any data that you restore, including Active Directory objects, will have their original update sequence number. The Active Directory replication system uses this number to detect and propagate Active Directory changes among the servers in your organization. Because of this, any data that is restored non-authoritatively will appear to the Active Directory replication system as though it is old, which means the data will never be replicated to your other servers. Instead, if newer data is available from your other domain controllers, the Active Directory replication will update the restored data. Hence, choices A, C, and D are incorrect.

Question 2

You are a systems administrator for Blueberry Packaging Industries. All servers in the company run on Microsoft Windows Server 2003.

You create a folder named Custom Package on the company's file server to contain the company's files. You share this folder as Custom Package. The folder is configured with default NTFS permissions and default share permissions. The file server is located in a secure room.

Within the shared folder, Managers should be able to add and change files and subfolders. Employees in the Sales and Packers department should be able to change and delete files and subfolders. All other employees should only be able to view the files.

All Sales employees are members of the Sales domain local security group. All Managers are members of the Managers domain local security group. The Packers are members of the Packers global security group.

How should you modify share level permissions on the Custom Package folder so that the appropriate users have the minimum required privileges? (Choose all that apply)

Choices:

Grant Change share permissions to Managers.

Deny Full Control share permissions to Managers.

Grant Change share permissions to Sales.

Grant Full Control share permissions to Sales.

Grant Change share permissions to Packers.

Grant Full Control share permissions to Packers.

Deny Full Control share permissions to Everyone.

Remove Everyone from the share permissions list.

Correct Choices: A, C, and E

Explanation:

Choices A, C, and E are the correct answers.

Change permissions allow the users to create, delete, and change any files and folders in the shared folder, provided the users have appropriate NTFS permissions on the files and folders. The default NTFS permission in Windows Server 2003 is Read for Everyone and the default share level permissions grant Read access to Everyone. You should not remove Everyone from the share permission list. By default, share level permissions grant Read access to Everyone.

How to Prepare for Microsoft Certification?

Following are the steps to prepare for Microsoft certification.

MCSE exams are not easy, as advertised on many websites. The MCSE Certifications are tough, so plan to put in a lot of time and effort getting ready for your certification exams. Get all information you can about the certification exams and then start working towards your goal.

Get hands on experience. The first step in the preparation for any Microsoft Certification is hands on experience with the related product. For MCSE, the aspirant needs to have at least a year of working experience and for MCSA, the minimum recommended time of experience is 6 months. If you are not working anywhere, it will help, if you can volunteer your IT skill services to gain valuable experience.

You can set up a small network at home to practice. Setting up the home network will give a great opportunity to learn. You can practice the lab exercises in the home network as and when you study. This will give you a better understanding of the theories than just studying the exam guides.

Get trained in the related product. If possible, try to get training in the related product in a Microsoft Authorized Training Center. You can use training resources to supplement your skills and experience. You can also use the Microsoft Official Curriculum for the related exam as well as Microsoft Press books that are available for the exam.

For Exam 70-290, the main areas that you need to concentrate are

Automated System Recovery (ASR)

Diskpart utility

Diskraid utility

Emergency Management Services (EMS)

File Replication Service (FRS)

Group Policy Management Console (GPMC)

Open File Backup

Password Backup and Restore Wizard

Remote Assistance

Remote Desktop

Shadow copying of shared folders

Software Update Services (SUS)

Virtual disk service

Permissions -Share and NTFS

Users, Computers, and Groups

Use the preparation guide of the exam that you want to take and read it thoroughly. You should know all the exam objectives of MCSE 70-290 covered in the exam preparation guide.

Use practice test software packages. Whizlabs MCSE 70-290 Exam Simulator is an example.

Do NOT use Braindumps. Braindumps might help you get the certification, but you will lack important practical knowledge about the product. Hence, your prospects of landing a good IT job will be less. Some brain dumps deliberately mislead you. So BEWARE!

You can participate in any online discussion forum, where you can participate in an ongoing dialogue and even ask doubts if you have any. You are sure to get the right guidance.

You've learned the details about the MCSE 70-290 Exam, its pattern, objectives etc. Download the MCSE Exam Preparation Guide to learn how Whizlabs can help you achieve the MCSE credential.

Resources

Exam simulators

Whizlabs MCSE 70-290 Exam Simulator

Besides identifying your weak areas and giving you a feel of the exam environment, Whizlabs Exam Simulator nurtures your potential to acquire domain expertise so that you not only succeed in your certification exam but succeed in your career too.

Articles on Windows 2003

Microsoft's Windows 2003 Server Home Page

What's New in Active Directory

Windows Server 2003 Demos

Windows Server 2003, Standard Edition

Microsoft Online Resources

TechNet : Designed for IT professionals, this resource includes Howto's, best practices, downloads, technical chats, and much more.

MSDN : The Microsoft Developer Network (MSDN) is a reference for developers, featuring code samples, technical articles, newsgroups, chats, and more.

Training & Certification Newsgroups : A newsgroup exists for every Microsoft certification. By participating in the ongoing dialogue, you take advantage of a unique opportunity to exchange ideas with and ask questions of others, including more than 750 Microsoft Most Valuable Professionals (MVPs) worldwide.


0

Wednesday 14 March 2012

Local Vs Remote Data Backup The Pros And Cons

Backing up your data should be an essential part of your daily routine. Unfortunately for many businesses this simply isn't the case. The only time data backup crosses their mind is when they have a hard disk crash or a serious spyware or virus infection. Unfortunately by this stage it's already too late to do anything about it - the data is gone and you're then looking at several hundred, if not several thousand, dollars to have the data rescued and restored.

The concept is simple - choose a data backup plan and stick to it.

The burning question on most IT managers minds is should the data be stored locally or remotely? To be fair this is the pivot point of all data backup plans. There are pros and cons to each method.

Local Data Backup

Most companies rely on either DVD, external hard disk or tape drive data backup solutions locally. These provide fast, cost effective storage for most small companies and are also very easy for even the IT novice to operate. In the case of any data being lost it's simply a matter of restoring the data from a previous backup point and the user can then continue working.

The data, however, is only as safe as the building it's in. What happens in the case of fire, burglary, flooding or storm damage? That's right you just lost all your data backups in the blink of an eye.

Remote Data Backup

As an emerging industry remote data backup has really taken off. Most commonly remote file backup services allow you to log into a remote drive and via a web based interface upload all your critical files. 5GB of storage space is the entry point for most of the remote data backup services and this is provided at a low cost. Knowing that your data is being stored in a secure facility that's deliberately protected against harm allows you much greater peace of mind.

The weak point here however is the data transfer speed. Unless you're operating a high speed LAN in your company then remote backup can be a complete waste of time as you're tied to the maximum upstream speed of your network - which can be surprisingly slow depending on your IT infrastructure. Add in the issue of firewalls blocking uploads on certain ports and it can quickly become a real IT headache.

So how do achieve a Win-Win scenario? Blended backup! Look at utilizing both of these forms of backup. In an ideal world you'd store a local copy of your data and then upload an exact copy of that data to the remote file backup server. If money is an issue then store your bulk data locally but copy your mission critical data to the remote backup service. That way in the worst of disasters you'll still have the data you need to actually function as a business. That's not to say that bulk data such as archived email is not important but that old data could be recovered in time by a data recovery specialist whereas you mission critical data needs to be available at a moments notice.


0

Tuesday 13 March 2012

Learn How To Safely Backup Your Hard Drive

We all know that we should back up our system as soon as possible.But if you're like most of us,you will get to it tomorrow.The problem is that tomorrow rarely ever comes until you experience a serious computer failure and then its too lake.

Taking the time to backup your data or entire hard drive is not as painstaking as it may seem.And the rewards of doing so will be great should your system experience a crash.

WINDOWS AND OTHER BACKUP SOFTWARE

If you have Windows XP you willl need to install the new Windows backup ultility from the Windows XP cdrom.Just place the WinXP cdrom in your cdrom drive and locate the line D:VALEADDMSFTNTBACKUP.

Here you see the first letter as D but if your optical drive have a different drive letter,exchange the D with your drive's letter.To install the utility,click on the file named NTBackup.msi.

The backup utility will be installed to the system tools group. Click Start,All Programs,Accessories,System Tools,and Backup.There is a neat wizard that will walk you through the backup process.

WinXP's backup utility will backup your entire hard drive and will make a recovery disk to boot.

One neat third party backup software you can try is NewTech InfoSystems at where you can download their trial version and put it to use for 30 days.And if its your cup of tea,the full version will run you about $79.95

INCREMENTAL OR DIFFERENTIAL BACKUPS

You should back up your entire hard drive when you perform your first backup.After that it is best to perform an Incremental backup.This type of backup only allow you to backup files that have changed since your last performed backup.

Differential Backups copy changed files and files that have been added since you last did your entire backup. This type of backup is more detailed than incremental backups and is easier to restore.

BACKUP STORAGE DEVICES

You can backup your files on cdroms and have the files compressed to save both space and backup time.WinXP will compress folders,subfolders,and files during backup.

You can purchase compression software that will do the same saving you cdrom storage space.The compressed files are automatically uncompressed once they are restored unto your hard drive.

You can also use a second hard drive as your backup storage device.We use two backup hard drives to be certain Ultimate PC Repair is up and running 24/7.

You can either purchase an internal hard drive in install it to your ide cable or you may want to purchase an external hard drive that connects to your Universal Serial Bus or USB Port.

The advantage of the external drives is that they have very large amount of storage space,transfer data fast,and can be moved from your computer to any other computer.

We use the Western Digital 170 Gigabyte External Hard Drive and we simply bounce it around to either one of our four computers with the greatest of ease.

USING ONLINE BACKUP SERVICES

You may also consider online services for backing up your data.If you lose all your backup data,say due it a natural dissaster such as a flood,your online data is right there waiting for you.

Another advantage of online backups is that you can access,upload,or download your data from any location. It is best to use high speed internet access if you're considering online data storage.

One such online backup service is Istorage located at /istorage and charges from $2.49 a month for 50MBs to $17.95 a month for a big 1,000MBs of storage.

Or you can check out FilesAnywhere located at the url

Still another online service to try is CapSure located at

Backup your system now in one way or another if you have not done so.If you have critical data that you simply cannot due without,take the time to invest in a backup device or one of the many online backup services.

Stop and perform those backups as soon as possible. You will be thankful you did should something go wrong with your computer.Its always better to be safe than sorry.


0

Monday 12 March 2012

Is Your Data Encryption Really Secure

How Do You Know Your Data Encryption is Really Secure

There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption.

The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP Desktop, which can perform whole disk, logical disk, file, and e-mail encryption.

If you routinely deal with confidential or sensitive information, or if you are concerned about private information falling into someone else's hands, encryption may be the way you want to go. However, there are a few things you should be aware of so you don't have a false sense of security.

First, What Is Data Encryption

Throughout ancient and modern history people have come up with ways to mask, hide, and verify that information is secure or valid. For instance; the ancient Babylonians in 4000 B.C. used something call intaglio, a process in which images and writing were carved or etched into stone that identified certain Babylonian merchants when they were trading. Each trader, or merchant, had a specific intaglio to make his mark, this way his customers would know that what they were purchasing belonged to, or was produced by, a specific merchant. This is a bit different then encryption, more like today's digital signature, another process typically part of data encryption.

Encryption today is much more advanced and complex. It is used for everything from securing military secrets to keeping intellectual property confidential. There are various forms of encryption techniques, some stronger or more secure than others. In it's basic form, encryption can be thought of as the masking, or the scrambling of original human readable information. The person who is masking the information must provide the person he is sending the information to with some sort of key that allows them to unscramble the information so they can make sense of it. For instance; I use encrypted e-mail messages so I can correspond with my customers on a regular basis. I do this because during certain types of projects my customers and I discuss private information such as security holes discovered during security assessments. This type of information is obviously not something we would want to fall into someone else's hands.

Most Data Does Not Start Out Encrypted So Be Careful

The primary reason I am writing this article is to point out a couple specific issues with data encryption. During a recent discussion with a friend of mine he told me that he was using Windows XP folder encryption to secure some of his confidential information. He asked me if I thought this was a secure method of storing important documents. My response was yes and no. The data encryption used by Windows XP is relatively secure, but the issue is that the majority of the data that is now encrypted in the folder did not start out that way.

Let's take for example, a word document that contains your personal financial information. You may have written this document so you have a central location where account numbers, social security numbers, and other private and individual identification information is easily retrievable. After you are finished writing the document, you then transferred it to your secure encrypted folder. Since it is now in a secure folder, only you are able to access it because only you know the pass-phrase that was used to generate the encryption key. For the most part, this assumption is correct.

While you were writing that document, you probably hit the save button several times. Or if you are like me, many times. I've lost lengthy documents several times in the past and have trained myself to hit the save button pretty frequently. Every time you hit the save button, a new temporary version of the file is created. This is typically saved in the c:documents and settings"profile name"local settings emp directory. This is done for recovery and undue purposes. For instance, if you make a mistake while writing the document and need to undue your actions, one of these temp files may be used to undue the action. Also, if your system or application crashed while writing the document, you can recover it from the temp files stored in this directory. You may have had to go through this before and it works very well.

Now that you have finished your document and copied or moved it to the secure folder, your document is secure, right? Wrong. Chances are the temporary files in your temp directory are still there. Even if you were to delete them, there is a significant chance they can be recovered using open source or very inexpensive undelete or data recovery software. If someone where to get hold of your computer, hard drive, or gain remote access to your system somehow, there is a significant chance the unencrypted original version of your document can be located. So what can you do to make sure that your encrypted version of your file and data is the only version. There is not a clear or 100% secure answer to this question but I will share with you how I deal with the issue.

Changing The Location Of Unencrypted Temp Files

The primary way applications like Microsoft Word determine where to store temporary versions of your files is by looking at two user environment variables. One called "tmp" and one called "temp". They can be accessed by right clicking on "my computer", choose properties, then choose the "advanced" tab and click "environment variables". Here you can edit or change the default location for temporary files. One thing I have to point out is even though a large number of software packages use these locations for temporary storage, it will be hard to determine if they all do or if they save temp files in other locations. You will have to do a little investigating to determine where various applications store their temp files. On my system, I have changed these variables to point to an encrypted disk where I store my encrypted data and files. This way, I can be reasonably sure that temporary or working versions of the files are also encrypted.

Encrypted Files May Not Stay Encrypted When Copied or Moved

Another thing you should be aware of is what happens to encrypted files or folders when they are copied or moved to another location. If a file or folder that has previously been encrypted is copied or moved to another Windows NTFS partition or volume, the encryption is preserved (under most circumstances). However, if you move or copy the encrypted data to volume or partition that is not NTFS, the file is automatically decrypted. Also, just because a file is encrypted on your hard disk it does not mean that this file will be encrypted when you e-mail it to someone. E-mail encryption is a totally different procedure. Also, keep in mind that encrypted files are decrypted when they are transmitted over a network connection.

Make Sure Deleted Unencrypted Files Are Really Gone

Because data that is deleted from disk may be recoverable for quite some time, I use another procedure to limit or reduce the risk of this possibility. As I mentioned earlier, data that has been deleted can in many cases be easily recovered using off the shelf software. In order to be reasonably sure deleted data is not easily recoverable, you need to write over that portion of the disk where the file and it's fragments were located. Actually, you most likely need to do this multiple times just to be sure the data is unrecoverable. The PGP Desktop software I use to create encrypted file systems, send encrypted e-mail, and create encrypted zip files also has a tool called "Wipe Free Space". This tool will write random patterns of data to all space on a drive that is flagged as free. You can tell the software how many times to perform this procedure but the default it usually three passes. My primary system performs this task every night. This way I can be reasonably sure the!

unencrypted versions of my encrypted files are not just sitting around waiting to be recovered.

Conclusion

If you are concerned about keeping important data confidential, file, folder, or disk encryption is a good solution. If configured properly you can be reasonably sure that your private information will remain private. Just remember that most data does not start out encrypted and that remnants of the original information may still exist in an unencrypted state. There are many options with regard to data encryption; Windows XP native file and folder encryption, open source encryption solutions, or commercial encryption solutions such as PGP (Pretty Good Privacy). Do some research up front to determine which may be the best method for you.

You may reprint or publish this article free of charge as long as the bylines are included.

Original URL (The Web version of the article)

/NewsLetters/IsDataEncryptionReallySecure.htm


0