Monday 30 April 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.





iAutoblog the premier autoblogger software

Sunday 29 April 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.





iAutoblog the premier autoblogger software

Thursday 26 April 2012

An Introduction to Tape Backup

If you run a small business, chances are you're saving important files to a server. But what happens when disaster strikes? How are you ensuring that your files won't be lost? Many people fail to realize that the loss of files could cripple their business. You can insure your office and equipment, but you can't insure files. You can't repair or buy back lost files. Ipso facto, they are lost!

This brings us to the concept of disaster recovery. What is disaster recovery? If you're thinking that disaster recovery is about frantically trying to get back data that's already been lost, then you're already behind the 8-ball! Disaster recovery is about safeguarding your organization's data so that it can be safely restored in event of a crippling disaster. And having an industry-standard file backup strategy is undoubtedly the most important part of disaster recovery.

What you have to do is ensure that all files on the server are backed up to another storage medium - tape, removable hard disk, NAS device, and so on. Most businesses choose to use tape. Let's look at how you can set up a tape backup strategy for your own business.

1. Tape - the perfect backup medium

Isn't tape an anachronism in the age of optical disks, removable hard drives and a plethora of whiz-bang, random-access storage media? Tape is indeed a dinosaur in relative terms, but it's ideal for backup. Tape is slow, but can store a lot of data... one mid-range tape should be enough to backup your entire server. Plus, tape is extremely cheap - mid-range tapes cost around $20 each.

2. When should you backup?

Typically, tape backup is performed at the end of each day. Just put in the tape and let the backup process run overnight. If your server ever suffers a catastrophic disaster, you have at least saved all your files from the previous day.

3. Tape Rotation

The ideal tape backup solution would involve using a new tape for each backup. This means purchasing a new tape for every day of your business's operations. This is hardly cost-effective for your business. Tape is cheap, but not that cheap!

This is why we speak of tape rotation. Tape rotation means to reuse tapes from previous backups. The simplest tape rotation scheme is to have one tape for each day of the working week. Tapes are labeled Monday, Tuesday, Wednesday, Thursday and Friday.

You can restore data from any one of the tapes in your library, or in this case, any day in the past the week. This strategy requires only five tapes, but only provides one week's data backup history.

4. Grandfather-Father-Son - A Case Study

The grandfather-father-son schedule is the most widely used method, and involves backing up data in the following way:

daily - on the "son tapes"

weekly - on the "father tapes"

monthly





iAutoblog the premier autoblogger software

Tuesday 24 April 2012

pros-and-cons-computer-forensics

The Advantages and Disadvantages of Computer Forensics

Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical know how of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.

There have been issues of authenticity concerned with this type of evidence. Nonetheless it still used today with the help of legal standards to make them admissible in court. Computer forensics is beneficial but it also has disadvantages.

Computers are the most dominant form of technology. It has been used in variety of purposes which has made digital and electronic evidence important. However there are still setbacks to this field.

Pros and Cons

The exchange of information is taking place everyday over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, breach of contract and asset recovery are some of the situations wherein computer forensics can be used.

Apart from the technical aspect, legal issues are also involved. Computer forensic analysts make their investigation in such a way that the electronic evidence will be admissible in court.

There are advantages and disadvantages when it comes to computer forensics. This field is relatively new and criminal matters usually dealt with physical evidences. This makes electronic evidence something very new. Fortunately it has been a helpful tool wherein important data needed for a case that has been lost, deleted or damaged can be retrieved.

Computer forensics' main advantage is its ability to search and analyze a mountain of data quickly and efficiently. They can search keywords in a hard drive in different languages which is beneficial since cyber crimes can easily cross borders through the internet.

Valuable data that has been lost and deleted by offenders can be retrieved which becomes substantial evidence in court. Legal professionals are able to produce data in court that were previously impossible.

The first setback when using electronic or digital evidence is making it admissible in court. Data can be easily modified. Analyst must be bale to fully comply with standards of evidence required in the court of law. The computer forensic analyst must show that the data is tampered.

His or her own investigation must also be fully documented and accounted for. Computer forensics must also training of legal standard procedures when handling evidence.

The main disadvantage is the cost of when retrieving data. Computer forensic experts hire per hour. Analysis and reporting of data can take as long as 15 hours but it will also depend on the nature of the case. Another one is that when retrieving data, analyst may inadvertently disclose privilege documents.

Legal practitioners involved in the case must also have knowledge of computer forensics. If not they will not be able to cross examine an expert witness. This also applies to the judge, solicitors and barristers. Computer forensics is still fairly new and some may not understand it. The analyst must be able to communicate his findings in a way that everyone will understand.

Although computer forensics has its disadvantage, this can be solved by the party involved. Evidence on the other hand can only be captured once. The use of computers and the rise of cyber crimes also call for an equally high the method of stopping it.





iAutoblog the premier autoblogger software

Monday 23 April 2012

computer-forensics

What is Computer Forensics?

Computers have radically changed the way we live your lives. Everyday living as become easier and technologically advanced decades ago. It has changed the way we work and the way we live in our houses. Children to day are sometimes even more technologically aware than their parents. Mobiles phones have gotten smaller and laptops have gotten slimmer.

With the launch of the Iphone that used the touch screen technology it will only be a matter of time when this idea permeates into other devices and appliances. Unfortunately, technology also makes it easier for criminals to their dirty job. However, computer forensics makes sure that technology is put to lawful use.

Everyone keeps up with the times, even the criminals. The internet is a public place which makes it vulnerable for fraud. Criminals often take advantage of unsuspecting victims. Law enforcement agencies have incorporated computer science in their investigation process to aid them with computer savvy criminals.

Crime and computers

We have seen a lot of Hollywood movies about hackers stealing from financial institutions. We have also seen two parties making their deals through bank transfers with a bunch of computers. Although these are not possible in real life, there are other ways that criminals can use computers.

Computer forensics is basically applying computer science to assist in the legal process. It entails the technological and systematic inspection of the contents of a computer system for evidence. Individuals in this field are called by different titles such as digital media analyst or computer forensics investigator. These people scanned a computer thoroughly to find out if they have used for a civil wrongdoing or criminal act.

The skills required are more than just normal data collection and using preservation techniques. Other definitions include the use of special tools to meet the Court's criteria and not just a thorough examination of a computer for potential evidence. This definition is similar to Electric Evidentiary Recovery or e-discovery.

Most of the time computer forensic investigators investigate hard drives, portable data devices and data storage devices. These devices include USB Drives, Micro Drives and external Drives.

The first task of the computer forensic investigator is to find sources of documentary or digital evidence. The next step would be to preserve the evidence so that it could be analyzed later on. When dealing with computer systems, important files or data can be quickly lost.

The investigator should take the necessary test because data retrieval can be time consuming and costly. The investigator would then analyze the collected data for potential and supportive evidence. The final step would be presenting the findings. The investigator will render his opinion based on the examination and make a report.

The process of using computer forensics must comply with the standards of evidence that are acceptable in court. This field is both technical and legal. The investigator should also have a complete understanding of the suspect's level of sophistication. If they don't the suspects are assumed to be experts.

Investigators then presume that the criminal have installed a countermeasure to render forensic techniques useless. The computer will then be shutdown completely to prohibit the machine from making further modifications to its drives.

Computer technology has changed the way we live, work, and for others - commit crime. Although the internet may seem like a very convenient place users should always be wary for seemingly innocent offers.





iAutoblog the premier autoblogger software

Sunday 22 April 2012

computer-forensics-problems

What Remains to be Today's Computer Forensics Problem?

Computer forensics is one the fields today which often gets updated. Many agencies have found the application of computer forensics very useful especially in the investigation of fraudulent actions and crimes. More so, computer forensics is the procedure that is applied when electronic devices such as the computer media is placed under careful investigation.

The process involves the discovery and analysis of any available data whether they have been hidden or deleted. These are among the evidences that will support the defense and claim of a particular individual or company as they file for any legal action.

Moreover, computer forensics specialists use the tools that recover both the accidentally and intentionally erased files and information. So whether the loss of the data is blamed to the untoward occurrences of hardware failure, there is a better chance of recuperating them. One of the biggest computer forensics problems though is how to retain the original data without the slightest alteration in them.

So much to say, even during the process of shutting down the computer system to transfer the data into another media may cause changes in them. It is important that the computer forensics expert has the skill to maintain the exact form of the data. Nobody can exactly say when the data may be altered but with the most apt tool and the specialist's skills, it can be possibly prevented.

Computer forensics attracted the attention of the public during the height of the Enron scandal which prompted the widest-ranging computer forensics investigation marked in the world's history. As computers these days are becoming an integral part of human life, big quantities of data are being stored in these electronic devices.

More so, crimes and other fraudulent acts are likewise increasing in intervals. Computer forensics investigations are also done in emails, websites visited, chat histories, and many other forms of electronic communications.

The advances in today's technology have shaped the improvement of computer forensics. The developers continually upgrade their tools to meet the increasing intensities of computer forensics problems. Modern software and tools are coming out into the market which nonetheless makes the task easier for the computer forensics experts. Thus, data is found and restored faster and with more preciseness.

These evidences need to be in their original format especially when they are to be used as evidences in the court. These proofs are often gathered from all kinds of computer media such as the discs, Pen drives, tapes, memory sticks, logs, emails, PDAs, handhelds, deleted information, and hidden documents.

The people's common notion is that when the data is deleted from its location, the file is already completely deleted and unfound. This makes you wrong though. Upon deletion, what is erased is only that of the data's reference location but the actual document remains intact in your computer system.

It is easiest to tell that the data have been deleted but the common computer forensics problem is where and how to find it and how to recover them without making traces of changes. Thus, the solution to the dilemma will entirely depend on the computer forensics professional's skills.

Computer data security is very important so it is also significant that they remain original. Part of the training of these professionals includes the molding of their skills to be careful when handling the recovery of the data at all times.

However, it is not for them to conclude when data may be altered or not. This remains as one of the top computer forensics problems to date.



iAutoblog the premier autoblogger software

Saturday 21 April 2012

computer-forensic-investigation-state-requirements

Computer Forensic Investigation State Requirements

By definition, computer forensics is the procedure wherein an expert sees through the files stored or recorded in a computer's system. These data may have been deleted, hidden, or saved. The search for the computer-related information uncovers the engagement in any crime or deception.

Computer forensics is nonetheless being widely used in the areas of intelligence, military, businesses, and law enforcement agencies. There is obviously a protocol that is followed in the course of the computer forensic investigation since the collected, analyzed, and examined data are presented before the courts of law in the effort of uncovering the malicious acts incurred by certain parties.

Moreover, as it is related to a legal action, it is but necessary that the computer forensic investigation state requirements are observed.

Computer forensics is an application which is not only confined to the recovery of any lost data. Such field is more so used in giving explanations and providing insights to any committed crime. Computer forensic investigation is often employed to collect the pertinent data in finding out the truth about a criminal or suspect to a crime.

With today's wide use of the Internet and the computer, it is very possible that clues may be traced from the electronic media sources. More so, the company employers are nowadays seeking for employees who are equipped with the rightful knowledge on the techniques and tools about computer forensic investigations.

It is necessary that the person is qualified to handle the task. Needless to say, a formal education on the said field is required. Among the instructions which the computer forensics training institutes tackle about are the enhancement of one's computer skills, important legal issues, and the needed computer forensic tools and techniques to be applied in different cases.

There are various computer forensic investigation state requirements and they vary from one state to another. However, we must touch on with the most common requisites which apply to all of them. The following discussion will provide you with the insights on the computer forensic state requirements for your perusal.

First of all, it is a must that the individual is a computer forensic professional. For one to attain this, a particular training course must be undertaken. Certificate programs in computer forensics are offered in a lot of institutions. The academic requirements differ too and it matters that one passes all of them.

Next, one must contain in him an all-embracing knowledge about the computer systems and how its applications and programs work. With these, one must also have the skill or the ability to restore any lost information from all types of electronic media but without the occurrence of any changes in them.

A forensic investigator must be knowledgeable of the computer software and hardware and must be capable of understanding the various operating systems in use these days.

An investigator should know the techniques to be used in uncovering the data from any type of file structure. There are different tools which need to be used in various cases.

Most importantly, a computer forensic investigator must be able to generate a refined report so that all of the input data are comprehensible enough even for those who don't understand the technicalities of the investigation.

These are just among the computer forensic investigation state requirements that must be strictly observed for a more precise result in the findings and conclusions in a particular case.



iAutoblog the premier autoblogger software

Friday 20 April 2012

Cisco CCNA Certification Error Detection vs. Error Recovery

Passing the CCNA, Intro, and ICND exam is all about knowing and noticing the details. (Which makes perfect sense, since becoming a master networking administrator or engineer is also about noticing the details!) One such detail knows the difference between error detection and error recovery. While the terms are sometimes used interchangeably, they are not the same thing.

Error detection is just that - error detection only. Two common error detection methods are found at the Data Link layer of the OSI model, the FCS (Frame Check Sequence) and CRC (Cyclical Redundancy Check). A mathematical equation is run against the data in the frame, and the result is sent along with the data. The receiver runs the equation again, but this time. If the result is the same, the frame is considered valid; if the result is different, the frame is considered corrupt and is discarded.

Note that the FCS and CRC do nothing in regards to retransmission. They are strictly error detection schemes.

For an example of error recovery, we look to the Transport layer, where TCP runs. TCP performs reliable delivery, and the reason we call it "reliable" is that TCP uses sequence numbers to detect missing segments. If the sender determines from the sequence numbers that the remote host did not receive transmitted segments, the sender will retransmit the missing segments.

The key to keeping the terms straight in your head is to remember that while both error detection and error recovery both detect problems, only error recovery does anything about it. It's also worth reading an exam question twice when you see either term!



iAutoblog the premier autoblogger software

Thursday 19 April 2012

Palm Treo Getting Started With Your New Treo Smartphone

Copyright 2006 Christopher Meinck

Getting Started With a Palm Treo Smartphone

For many, adding a Palm Treo smartphone to their life is an exciting time. Most are coming from a traditional cellphone and the capabilities of a smartphone never seize to amaze. The Palm Treo features a large color LCD screen, full keyboard and software for syncing your personal data with your PC or Mac. Getting familiar with the capabilities of your new Treo smartphone can be overwhelming in the beginning. Once you get over the initial learning curve, owning a Treo can be a rewarding experience.

Protecting Your Treo

The Palm Treo is an expensive gadget, so you should make plans to protect your Treo. In the US, both Verizon and Sprint offer insurance on the Treo. For a fee of roughly $5, you can insure your Treo against loss or accidents. With insurance, youll have the piece of mind that your valuable Treo is protected. If your wireless provider does not offering insurance, another option is to sign up for the StuffBak protection program. Stuffbak is a loss prevention and recovery service. You purchase a Stuffbak label that gets applied to the back of your Treo. Should you lose your Treo, there is an 800# that allows the finder to collect a reward upon return.

Insurance and recovery services are both great options should something happen to your Treo. The best option is to protect your Treo smartphone with a good case and screen protector. There are many options when it comes to selecting a case for the Treo. When choosing a case, you can select from holster, pouch, skin, wallet and more. In most cases, its also a good idea to add a screen protector. Through the daily use of your Treo, you will find yourself touching the screen quite often. A screen protector will guard against scratches and its recommended even if youve opted for an enclosed case. Adding the correct Treo accessory can protect your smartphone for many years.

Treo Software

Out of the box, Palm OS based Treo smartphones comes bundled with all the software you need to sync with your PC or Mac. If you own a Mac, then you should avoid the Treo 700w. In order to sync the 700w with a Macintosh, you would have to use third party software such as Missing Sync by Mark/Space and they do not currently support the Treo 700w. If you are upgrading from a previous Palm device, youll still want to install the software that came with your new Treo. Follow the on-screen directions and youll be able to bring your data over to your new Treo. As a previous Palm owner, you should note that some applications might not work on your Treo. To be certain, locate and rename the Backup folder located in your User folder. Once youve completed the transfer of your PIM data, you can add one application at a time to insure compatibility with your Treo.

One of the great things about the Treo is vast catalog of available software applications. There are countless freeware and commercial applications. If you own a Palm OS based Treo, then be sure to look for software that supports your model. Owners of the Treo 700w should look for Pocket PC titles that support the Windows Mobile 5 operating system. In either case, its best to slowly add software. Adding incompatible software is the most common cause of an unstable Treo.

Get To Know Treo

The Treo is a remarkable device that offers robust software to help you manage your calendar, check email, browse the web, take photos, listen to MP3s and more. With any new technology, there is a slight learning curve and the Treo is no different. I encourage any new Treo owner to explore the features of their new smartphone. If you have questions, there are several good resources online or you can visit your local bookstore. Once youve mastered the basics, youll be left wondering how you ever managed without a Treo.



iAutoblog the premier autoblogger software

Wednesday 18 April 2012

what could macedonia learn from a tiger the asian tigers and the phenomenon of uninterrupted economic growth

The first reaction of economies in transition is a sharp decline in their production, mainly in industrial production. In the countries which attained independence with the demise of the British Empire (where the sun never set) - industrial production fell by 20% on average. Even this was because these countries continued to maintain economic ties with the "mother" (the United Kingdom). They also continued to trade among themselves, with the rest of the British Empire, through the Commonwealth mechanism.

This was not the case when the second biggest empire of modern times collapsed, the Soviet empire. When the USSR and the Eastern Bloc disintegrated - the COMECON trading bloc was dismantled, never to be replaced by another. All the constituents of the former Eastern Bloc preferred to trade with the west rather than with one another. The Empire left in its wake mountains of trade debts, total lack of liquidity and money losing barter operations carried out in unrealistic prices.

Thus, industrial production plunged in the newly established countries (CIS and the countries which were part of Former Yugoslavia) as well as in other former members of the Eastern Bloc by 40-60% over a period of 5 years. A slow recovery is discernible only in the last two years and industrial production is picking up at an annual rate of 2% (Estonia) to 8% (the Czech Republic) - depending on the country.

This disastrous drop in the most important parameter of economic health was largely attributable to a few, cumulative factors:

The sudden evaporation of all the traditional export markets - simultaneously. Macedonia has lost 80% of its export markets with the bloody and siege-laden disintegration of the Former (federation of) Yugoslavia. Similar vicissitudes were experienced by other countries in transition.

A huge, unsustainable internal debt between the companies themselves (each acting in the dual role of supplier and of client) - and between the enterprises and the state. This burden was only very mildly ameliorated by bartering. Mostly, it led to severe cases of insolvency or lack of liquidity and to a reversion to pre-monetary economic systems.

This lack of liquidity also prevented the investment in capital assets (plant modernization, personnel training, data processing and decision making tools) necessary to sustain efficiency gains, increase productivity and maintain competitiveness.

Gross inefficiency of the industrial plants which was due to massive hidden unemployment, low maintenance standards and the aforementioned lack of capital.

Outmoded and outdated management techniques. The old guard of managers in industry were ill adapted to the rapid changes wrought about them by capitalism and wise industries. They continued "to fight the last (and lost) wars", to bemoan their fate and not to provide a sense of direction, a vision of the future and the management decisions which are derivatives of the above.

Faulty legislation, dysfunctioning law enforcement systems, crony capitalism and privateering (the sale of state assets to political allies or to family members of influential political and economic figures) - all led to fuzzy ownership structures and to a virtual abandonment of the protection of property rights. In the absence of clear ownership and under the threat ever—imminent loss of property, the profit motivation has degenerated into speculative binges and bouts and decision making was transformed into power contests.

These industries produced and manufactured goods in accordance with some central planning, an theoretical model of the marketplace, or rule-of-thumb thinking. The result was mountains of shoddy merchandise, of low quality and very little demand. Antiquated design and lack of responsiveness to market needs and consumers’ wishes only exacerbated the situation.

This absence of market research, market analysis and, more generally, market awareness led to the almost complete absence of marketing, sales promotion, or advertising (in the modern sense). Paradoxically, the communist era industries demonstrate a deeper belief in "the invisible hand of the market" than do their capitalist brethren. They entrust the function of the dissemination of information and its influence upon the decisions made by consumers - entirely to the market. If the product is either needed or good enough, it will sell itself, was the thinking. Marketing and advertising were thought of as illegitimate cajoling, pushing consumers to make decisions that they would not have made otherwise.

Industry operated under all these crushing constraints in an environment of heavy to impossible regulation, trade protectionism (which denied them the benefits of competition), corrupt bureaucracy, rolls of red tape, heavy political involvement and a total distortion of economic considerations by "social" ones. This was further compounded by a decaying banking system (where the distinction between lender and borrower was rendered superfluous by the concept of "social capital" which belongs to everyone equally). It could not supply the industrial sector with capital replenishment and the total absence of capital markets did not help.

Last - but far from being least - was the non existence of a "Protestant" or "Asian values" work ethic. Low salaries, feigned "equality" and absent profit motivation - all led to a disincentived work environment. The norm in many of these countries is still: "come to work, open and close the door and get paid", as the saying goes. This is the benign case. Stealing from the workplace has become an acceptable way of complementing income and moonlighting was done at the expense of the official "primary" workplace.

But it seems that the worst is over and that the scene is fast changing.

However sloppy or criminal the process of privatization, still hundreds of thousands of new capitalists were brewed and introduced, willy nilly, to the profit motive. The spectre of capital gains, made most of them (except the most hardened) discover marketing, advertising, design, export, trade financing, public offerings, strategic partnerships, concessions and business plans.

Industries are much more focussed and market oriented. The new religion of capitalism, replete with entrepreneurship, free choice, personal profit and the invisible hand of the market has been successfully phased in.

Both the domestic markets and international trade are recovering nicely. Consumption is growing and with it exports. The political level is withdrawing from the scene through more or less successful privatization or transformation schemes and appropriate legislation to minimize the role of the state in the economy.

Some countries have opted to "skip" some of the industrial portion of the classic, evolutionary economic cycle - and go directly to investing in information and knowledge industries. They educate their workforce and retrain it accordingly. They invite multinationals - using a cocktail of tax incentives and direct grants and subsidies - to open back office operations (accounting, administration) and telemarketing operations in their countries. This calls for lower investment than in classic (or sunset) industries and has a high value added to the economy.

But the single largest driving force behind economic recovery is foreign capital. Foreign Direct Investment (FDI) is pouring in and with it: new markets, technology transfers through joint ventures, new, attractive product mixes, new management, new ideas and new ownership - clear and decisive.

So, industrial production is picking up and will continue to grow briskly in all countries in transition that have the peaceful conditions necessary for long term development. If Macedonia will follow the examples of the Baltic countries, of Poland, the Czech Republic, Hungary, Slovenia, even Russia, Ireland, Egypt, Chile, Indonesia, Israel and the Philippines - it will double its industrial production within 10 years and redouble it again in 15 years.

Israel, Ireland and … France and Japan (!) are examples of poor, agricultural countries, which made the transition to thriving industrial countries successfully.

But was their secret? How come Hong Kong and Singapore are richer than Britain by some measures? Together with South Korea and Taiwan they have been growing at an average rate of 7.5% annually for the last 30 years. China, Indonesia, Malaysia, Thailand, The Philippines have joined the "Asian Tigers" club.

They all share some common features:

Massive injections of labour (by massive immigration from rural areas to the cities, urbanization). Massive injections of capital and technology. The above injections were financed by an exceedingly high level of savings and investments (savings amount to 35% of GDP, on average).

Wise government direction provided through a clear industrial policy. This, though, is a double edged sword: a less wise policy would have backfired with the same strength.

A capitalist, profit seeking mentality.

An annual increase of 2-3% in productivity which is the result of copying technology and other forms of technology transfers from the rich West.

Strong work, family and society ethics within a cohesive, conformist and supportive social environment (the "Asian Values" are the Eastern equivalent of the "Protestant Work Ethic").

Low taxation and small government budgets (less than 20% of GDP compared to twice as much in the West - and 3 times as much in France today).

Flexible and mobile labour and c (in certain countries) capital markets. When mobility or flexibility are restricted (Japan) it is the result of social treaty rather than of legislation, regulation, or other statist intervention.

A firm, long lasting commitment to education and to skill acquisition, even in hard circumstances. The number of educated people is low but growing rapidly, as a result.

Openness to trade, knowledge and to technology.

Imports are composed mostly of investment goods and capital assets. The culture of conspicuous, addictive (or even normal) consumption is less developed there.

Still, these countries started from a very low income base. It is common economic knowledge that low income countries always grow fast because they can increase their productivity simply by purchasing technology and management in the rich country. Purchasing technology is always much cheaper than developing it - while maintaining roughly the same economic benefits.

Thus, Hong Kong grew by 9% in the 60s. This growth coefficient was reduced to 7.5% in the 80s and to 5% in the 90s. But China, Malaysia, Thailand and Indonesia are likely to grow annually by 7-9% during the next decade.

Not that these countries are exempt from problems. The process of maturation creates many of them. There is the dependence on export markets and volatile exchange rates (which determine the terms of trade). When the West reduced its consumption of microchips and the Dollar appreciated by 50% against the Japanese Yen - all the tigers suffered a decline in economic growth rates, current account deficits of 5-8% of their GDP, strikes (South Korea) and Stock Market crashes (Thailand, to name but one of many). In Singapore and in Hong Kong, the industrial production plummeted by 5% last year (1996).

Years of easy money and cheap credits directed by the state at selected industries starved small businesses, created overinvestment and overcapacity in certain, state-supported, industries and destabilized the banking and the financial systems. It helped forge infrastructure bottlenecks and led to a shortage in skilled or educated manpower. In Thailand only 38% of those 14 years old attend school and in China, the situation is not much better.

Finally, the financial markets proved to be too regulated, the government proved to be too bureaucratic, corruption proved to be too rampant (Indonesia, Japan, almost everybody else). There were too many old conglomerate-type mega - companies which prevented competition (e., the Chaebol in South Korea or the Zaibatsu in Japan).

So, the emerging economies are looking to Hong Kong, Singapore and Taiwan to supply the ideal: truly flexible labour markets, no state involvement, lots of nimble, small businesses, deregulated markets, transigent industrial policies. These countries - and the rest of the Asian Tigers - are expected to beat the West at its own game: money. They have many more years of economic growth ahead:

Each Korean worker has only 40% of the capital goods, available to his Western comrade, at his disposal. Putting more technology at his fingertips will increase his productivity.

An industrial worker in the west has a minimum of 10 years of education. In Indonesia and Thailand he has 4 years and even in South Korea he has merely 9 years. On average, an industrial worker in one of the Asian Tigers countries carries 7 years of education in his satchel - hardly the stuff that generals are made of. Research demonstrated that the more educated the worker - the higher his productivity.

Finally, increasing wages and looming current account deficits - will force the tigers to move to higher value added (non labour intensive) industries (the services, information and knowledge industries).

Then, it will be the turn of countries like Macedonia to take their place in some labour intensive areas and to rise to tigerdom.



iAutoblog the premier autoblogger software

Tuesday 17 April 2012

Add Value by Documenting Your Business

By documenting your business you communicate to your people

exactly how your business operates and what work needs to be

completed by Employees filling the Positions in your

business.

It is vitally important to have your business documented if

you are looking to sell your business or looking to secure

external funding. Well written and maintained Business

Systems and Documentation adds great value to your business

and will contribute to you getting more money when selling

or sourcing external funding.

Important information in your business needs to be recorded

and communicated to your employees in a consistent way. This

information should include.

- Strategic Objectives.

- Marketing Plan.

- Company Policies and Procedures.

- Position Contracts.

- Business Systems Documentation.

- Operations Manuals.

Only one version of information should be made available in

your business. It is important to have only one version to

ensure that all employees have access to the most up to date

consistent information.

Access to critical documents should be controlled, Documents

should be made available only to Employees who need to have

access. You should use a tool that allows you to easily

control access to information and allows you to track when

changes have been made and who has made the changes.

Documents and Data should be maintained on a secure central

server with a data backup and recovery plan in place.

Documents should not be stored locally on employee PC



iAutoblog the premier autoblogger software

Monday 16 April 2012

How Computer Programs That Wipe Hard Drive Work

It can be an advocacy but usually, companies that dispose old computers when they buy new units often donate the equipments to institutions and to some people who need personal computers. This is a widely acceptable practice. But are you ready to give much more than the worth of the personal computer you are donating? You might not be fully aware of it but when you are giving your old personal computer to other people, you are also giving the recipient the opportunity to access your old files and information saved previously on the hard disk.

Even if you have deleted the files in the Windows operating system and in the Recycle Bin, there would always be traces of the deleted file somewhere within the hard drive of the computer. The simple process of deletion would only remove the shortcuts to the files. In actuality, the files are still there, though you could hardly trace them. But imagine if in the long process of donating, the personal computer goes to the possession of an expert who could be able to restore and retrieve the deleted files. There are many recovery and restoration software available in the market that could facilitate instant retrieval of deleted files.

Will you be willing to afford to lose sensitive information like trade secrets, personal information, confidential data, bank and credit account numbers and contact details of clients? Much more, will you be willing to take the risk of sharing such important and confidential information to some unscrupulous people who might use the data inappropriately, maliciously and fraudulently? If not, then, it is high time you wipe hard drive of your computer.

Disk wiping is the process of erasing saved data on storage devices like compact discs, thumb drives and hard drives. When you wipe hard drive, you are ensuring that all previously deleted files on the personal computer would never ever be recovered or accessed even with the use of the most powerful data recovery software. Wiping hard drive is actually working by overwriting the entire hard drive not just once but several times. Thus, you can rest assured that no data or file would ever remain in the computer memory for life. To put it simply, it is impossible to retrieve data that have already been overwritten. The process is irreversible.

How does the process work? When you wipe hard drive, the process generally overwrites the whole disk with zero or one. A reformat would follow. The overwriting process takes on and repeats itself several times, solidifying the security purpose. That is the reason why such computer programs usually take some time to complete. When you wipe hard drive, you are practically disk wiping applications by overwriting master boot record, the partition table and each sector present in the computer hard drive.

When you wipe a hard drive, you are ensuring the safety and confidentiality of all files that had been saved and later on erased from the computer memory. Such pertinent data and information would never ever be accessed by anyone, especially the unauthorized ones.



iAutoblog the premier autoblogger software

Sunday 15 April 2012

Data Recovery From Laptops

A lot of important data is being stored on laptops today. Laptop use has increased significantly in recent years. Increased demands for portability and convenience have been envisioned in this mobile technology.

Demand for laptops has gone up in part due to the spread of telecommuting in businesses today. Businesses often allow employees to work on laptops at home and bring them to work.

Data loss in a laptop can end up costing the company a lot of employee hours worked. Even people who use their laptops for personal use are not pleased if they lose any important data. Carrying around a laptop all day can cause stress on the machine and increase the chances of data loss.

There are many companies that can help you with the laptop data recovery process. After you contact a company, first you will likely go through an evaluation process to evaluate the extent of damage done.

A lot of companies will offer a free evaluation and a quote if they feel they can successfully perform recovery operations. It may be a good idea to shop around for services to make sure you are getting the best deal. Each company may offer a different price. Some companies even have fixed pricing.

If you are panicking over a blank laptop screen or a hard drive crash, you will be happy to learn that a high percentage of the requests data recovery companies get are successful completed. However you still need to be prepared that some of the data may never be recovered. The only way to find out is get proactive and contact representatives from data recovery firms.

Several data recovery companies have specialized departments for performing data recovery operations on laptops. You can get a lot of your data recovered and receive it in a readable format, even from badly damaged storage devices.

Laptop systems are more fragile and therefore highly susceptible to damage to their hard drives.

There are many companies online that can offer you internet-based laptop data recovery. This allows you to ship of your laptop to company headquarters and have it shipped back to you after the data has been recovered.

Some problems you may experience with your laptop is a dead screen, hard drive crash, etc. There are different types of laptop data recovery operations you can perform. Laptop data recovery can allow you to recover files after such events and after technical malfunctions. You may also be able to recover MS Word, Excel or Power Point files that you may have accidentally deleted.

Laptops can receive a lot of abuse and their hard drives can get damaged. You may need laptop data recovery support if:

You dropped your notebook and it no longer turns on.

An unsolicited e-mail has downloaded a Trojan or virus on your laptop.

The laptop



iAutoblog the premier autoblogger software

Saturday 14 April 2012

Disc and Data Recovery

Data Recovery is probably the last thing on anyone's mind when they buy a computer. Most of us never think something will go wrong until it's too late. Data recovery or Disc Recovery services is something we hope we will never have the need for. Whether your computer simply crashes or you accidentally delete software that is important or imperative to you, it may seem that your information is lost for good. Although, if you have quality data recovery software already in your system or on your computer, you should feel good in the fact that it has backup, even though things like this can and will happen at times. This can be extremely important for you state of mind and well being when it comes to safeguarding your personal or business information and software.

What many don't understand is that there are numerous reasons things can go wrong on their computer. Whether it is your own personal computer you are responsible for, or a large business computer system, having a method of restoring the information when things go wrong can be of the utmost importance. Your computer could run slow or be packed full of non efficacious adware and spyware that can ultimately destroy your important files, siphon and transfer personal data, this could cause a computer crash. In a blink of an eye, everything that is important to you could be gone. Storms can cause Power surges quickly and without much or any advance warning, that could be all it takes to lose everything.

These are not the only ways you can lose the data that is stored on your computer. Most people think this will never happen to them, it's human nature. So what do we do? Nothing, which means you could lose everything. Disc recovery is an absolute must to avoid these things from happening. Disc and Data Recovery is very easy to install and use and can be virtually self maintaining. So why doesn't everybody take advantage of data recovery? It could be the expense, but it doesn't cost much, more likely they just don't understand the importance or simply don't think about it at all until it's too late. Data recovery is quite possibly the most important thing for computer users. Don't get caught without it!



iAutoblog the premier autoblogger software

Friday 13 April 2012

Data Recovery What You Need

Data recovery is something we hope that we will never need. Whether you simply make the mistake of deleting important software or you lose it all in a computer crash, that valuable asset of information may seem like it is lost forever. But, if you have complete and quality data-recovery software on your computer or through your system, you can be confident that it has a backup and it is there even though these things will happen to you. This can be so important when it comes to safeguarding your business or your personal information.

What people do not realize is that there are a number of ways that things can go wrong on their computers. Whether you are responsible for the computers of a large corporation, a small business or even just your own personal computer, having a way to restore information when things go wrong is quite important. Here are some things that could happen to you, well, anytime, even right now. Your computer could be running slowly or be loaded with powerful spyware that can destroy files, transmit personal data or, even worse, cause the computer to crash. All of a sudden, it



iAutoblog the premier autoblogger software

Thursday 12 April 2012

Data Recovery The Easy Way

It's a fact of life that bad things happen to good people's data every now and then. And when it does, too often the victim is not prepared for it. Is that the case with you? Are you prepared in advance for a complete loss of critical files and data on your computer or on your computer network?

If you aren't prepared in advance, you will most likely have to use a data recovery service or data recovery software solution to help get back as much as you can of what was lost. This can be a very good idea if there is no other way to recover your files, but it doesn't have to come to that in most cases.

This is a classic situation of where an ounce of prevention is worth a pound of cure. A very simple backup routine that is adhered to on a daily basis can usually solve any data loss situation quickly and fairly painlessly. And it won't cost you anything but the time neded to restore the data files from your backups, and maybe the program files from the original disks.

There is a wide choice of media that you can backup your files to, inclusing CDs, DVDs, external hard drives, other internal hard drives, tape drives, etc. They all work, it's just that each media choice has it's own pros and cons regarding ease of use, data storage capacity, and so on. A discussion of those limits is beyond the scope of this article, but the most important thing to remember is that the best backup is the one that works. That means that regardless of the media you choose, just make a choice and stick to a backup schedule like glue.

There are sevral good backup programs out there that work very well and will do a fine job, but most Microsoft Windows users have a great backup program included with their operating software. If you are a Windows XP user that program is called NTBackup. If it's not already installed on your computer insert your Windows CD, find the folder titled ValueAddMSFT

tbackup, and run the program in that folder called ntbackup.msi. It will set up the backup software for use on your computer in no time and you will even have simple to use wizards that will walk you through doing file backups and restores simply and easily.

Once the software is installed, it is now up to you to use it faithfully to prepare for data recovery when it is needed. Maybe you never will need it. But don't count on that. You will be so glad that you have a solid reliable way to restore lost files if disaster ever happens on your computer. It's truly the easy way to data recovery!


0

Wednesday 11 April 2012

Data Recovery

Every person who uses a personal computer will eventually face the challenge of data recovery. Computer hardware and software can be temperamental from time to time. Hard drives and other mechanical components of personal computers and servers do not last forever, and when they fail recovering your data can be difficult, time consuming and costly.

If you are working diligently away on a document or spreadsheet in Microsoft Office and the power goes out, you may still be able to recover the documents you were working on when the lights come back on. This type of data recovery is relatively easy and straightforward. Software manufacturers recognize that power outages are inevitable and unpredictable and most office applications incorporate what is known as autosave features. At set intervals, the documents you have open are saved to a cached file. They remain in that cached state and should be accessible once your power is restored. Simply opening Microsoft Word or Excel will usually bring these documents back. For instance, when you open Word after a power failure or a software error, you will be presented with a document followed by the word recovered in parentheses. This is the document you were working on at the most recent autosave point. You may still lose a couple minutes worth of work this way, but it sure be ats having to go back and retype the entire document.

If the recovered document does not appear automatically, search your hard drive for files ending with tmp. Look for one created close to the time of the power failure or software error and open it. This is most likely the document you had open at the time. If this method of data recovery does not work, you may need to follow the steps listed below.

Of course not all data recovery is so easy and so straightforward. If you delete a file accidentally, it is a simple matter to recover it from the recycle bin. Once you empty the recycle bin, however, things become more difficult. The deleted file still resides on your computer somewhere, but the pointer that tells the program where to find the file is now gone. There are various software tools available that promise to help recover deleted files, and they all have their strengths and weaknesses. Some of the major players are Norton, McAfee and Computer Associates. There are a great many smaller vendors as well.

Even if all these products fail to recover your data, you may not be completely out of luck. Data recovery services specialize in recovering data from failed and corrupt hard drives. These data recovery services have tools and equipment not available to the general public.

Government and law enforcement forensic teams will often make use of these advanced data recovery techniques to investigate cases of computer crime. Businesses also will turn to a professional data recovery service to recover mission critical data from damaged hard drives.

It is important to choose a reputable firm any time you need to have data recovery services performed. The firm you choose should be able to provide references from previous clients. You should make sure to follow up with the references they provide.

The cost for the data recovery service will vary according to the type of equipment and the difficulty of the job. You should get several estimates to make sure you are paying a fair price for the service you receive.


0

Tuesday 10 April 2012

Coping with a Serious Data Loss from your Computer Hard Drive

Data loss is an expensive reality. It's a hard fact that it happens more often then users like to admit. A recent study by the accounting firm McGladrey and Pullen estimates that one out of every 500 data centers will experience a severe computer disaster this year. As a result, almost half of those companies will go out of business. At the very least, a data loss disaster can mean lost income and missed business opportunities.

The other side of data loss is the psychological and emotional turmoil it can cause to IT managers and business owners. Despair, panic, and the knowledge that the whole organization might be at risk are involved. In a sense, that's only fair, since human error is one of the two largest contributing factors in data loss. Together with mechanical failure, it accounts for almost 75 per cent of all incidents. (Software corruption, computer viruses and physical disasters such as fire and water damage make up the rest.)

Disk drives today are typically reliable. Human beings, it turns out, are not. A Strategic Research Corp. study done in 2000 found that approximately 15 per cent of all unplanned downtime occurred due to human error. A significant proportion of that happened because users failed to implement adequate backup procedures, either having trouble with their backups, or having no backup at all.

How does it happen that skilled, high-level users put their systems - and their businesses - at such risk?

In many cases, the problem starts long before the precipitating system error is made, that is, when users place their faith in out-of-box solutions that may not, in fact, fit their organization's needs. Instead of assessing their business and technology requirements, then going to an appropriate engineered solution, even experienced IT professionals at large corporations will often simply buy what they're sold. In this case, faith in technology can be an vice instead of a virtue.

But human intervention itself can sometimes be the straw that breaks the technology's back. When the office of a Venezuelan civil engineering firm was devastated by floods, its owners sent 17 soaked, mud-coated disks from three RAID arrays to us in plastic bags. A tough enough salvage job was made even more complex by the fact that someone had frozen the drives before shipping them. As the disks thawed, yet more damage was done. (After eight weeks of painstaking directory-by-directory recovery, all the data from the remaining fifteen disks was retrieved.)

Sometimes, the underlying cause of a data loss event is simply shoddy housekeeping. The more arduous the required backup routine, the less likely it will be done on a regular basis. A state ambulance monitoring system suffered a serious disk failure, only to discover that its automated backup hadn't run for fourteen months. A tape had jammed in the drive, but no-one had noticed.

When disaster strikes, the normal human reaction is panic. Because the loss of data signifies critical consequences, even the most competent IT staff can jump to conclusions, and take inappropriate action. A blank screen at a critical time can lead to a series of naive decisions, each one compounding the preceding error. Wrong buttons get pushed, and the disaster only gets worse. Sometimes the pressure to correct the system failure speedily can result in an attempt to reconfigure an entire RAID array. IT specialists are typically not equipped to deal with crisis modes or data recovery techniques. Just as a good physician is trained to prolong life, the skilled IT specialist is trained to keep the system running. When a patient dies, the physician turns to others, such as nurses or counselors to manage the situation. When significant data loss occurs, the IT specialist turns to the data recovery professional.

Data recovery specialists are innovative problem solvers. Often, the application of basic common sense, when no-one else is in any condition to apply it, is the beginning of the journey towards data recovery. The data recovery specialist draws on a wealth of experience, married to a "never say die" attitude, and a comprehensive tool kit of problem-solving procedures. Successful recovery outcomes hinge on a combination of innovative logistics, applied problem-solving, and "technology triage," the process of stabilizing an affected system quickly, analyzing and treating its wounds, and preparing it for surgery. The triage process sets priorities, such as targeting which files are needed first or which are absolutely vital to the functioning of the business, and establishes whether files might be recovered in less structured formats (such as text-only), which may be desirable when time is crucial.

The art and science of professional data recovery can spell the difference between a business' success or its failure. Before that level of intervention is required, though, users can take steps to ensure that the probability of a data loss disaster is minimized.

Basic to any business technology plan is a regular fire-drill procedure. Back-up routines may be in place, staff may assigned to specific roles, hardware and software may be configured - but, if the user isn't completely sure that everything works the way it should, a data loss event is inevitable. Having adequate, tested, and current backups in place is critical. A hardware breakdown should not be compounded by human error - if the malfunctioning drive is critical, the task of dealing with it should go to a data recovery professional.

Just as data loss disasters are rooted in a combination of mechanical failure and human error, so, too, the data recovery solution lies in a creative marriage of the technological and the human. The underlying philosophy of successful data recovery is that technology is something to be used by human beings, not something that uses us.


0

Monday 9 April 2012

Before You Take the Plunge Essential Information For Users Considering Data Recovery

Know what you're dealing with

The world of data recovery is a big mystery for most consumers and even some IT professionals. This is largely because hard drives themselves are complex devices and their technological specifics are not generally well known. Data recovery companies thrive on their customers' lack of information and often get away with charging obscene rates for any recovery, regardless of complexity. I hope this article will be a helpful resource for consumers and professionals alike. I provide some basic information about data recovery by shedding some light on how hard drives work, how they can fail, what are the chances of successful recovery and how much the user can expect to pay. This information will enable the user to make an informed decision when choosing a data recovery company.

A bit about Hard Drives

A computer hard drive stores data on metal oxide platters which spin up to 10000 revolutions per minute. An actuator arm contains the 'head' which reads and writes the data in the form of magnetic charges one millionth of an inch above the surface. Any given drive can have multiple read and write heads and each head can 'crash' independently. A head crash occurs when the read/write head comes in contact with the platters of the disk (more on head crashes below). As manufacturers strive to cram more space on hard drives without increasing their physical size, the data gets written increasingly closer together, making for very difficult recovery should one or more heads crash. The brain of the hard drive is its controller board and this is unique for each individual hard drive. One other detail worth a mention is the service track of a hard drive. This is an area located on the outer part of the disk platter and it contains the drive's firmware zone. The firmware of a hard drive is the information used by the computer to communicate correctly with the drive. These are the main components that make a hard drive work, now let's talk about what can go wrong.

There are many ways in which a hard disk can fail

Hard drives are extremely fragile and can suffer failures in many different ways, leading to a loss of data. The five most common types of drive failures are: logical errors, mechanical failure, electronic failure, firmware corruption, and bad sectors, or any combination these. Least severe of these is usually data loss due to logical errors.

Logical errors are often the simplest and sometimes the most difficult problems to deal with when recovering data. They can range from an invalid entry in a file allocation table, a simple problem that needs little work; to severe issues such as the corruption or loss of the entire file system. Logical errors can be spotted when files become inaccessible, there is a delay in starting up the computer, and programs do not run properly. Logical errors are often seen as simple because there is nothing wrong with the physical drive leading users to try recovering it themselves by using third party software. This is quite risky, however, as running such software on a damaged drive can result in total loss of data. The most effective way to prevent logical errors on your hard drive is to regularly use the Disk Defragmentation tool in your operating system. For more comprehensive information on preventing data loss, visit the tips section of our website.

Recovering a drive with logical errors can be simple and quick, however if the problem requires manual bit-by-bit reconstruction of the data, it can also be quite complex and time consuming. Normally, logical errors are in the lower end of the price range as they do not require manual disassembly of the drive, however there are cases when logical failures end up in the higher end of the price range. The bottom line with logical errors is the sooner they are caught and the less a user tampers with the drive, the better the chances for a quick and thorough recovery.

Mechanical failures are often much more serious than any other failure and frequently lead to a partial or even total loss of data. The most common type of mechanical failure is a head crash, which is when the read/write head comes in contact with the disk platter. Head crashes can be caused by a variety of reasons, including physical shock, static electricity, power surges, and mechanical read/write failure. Mechanical failures are detected by a constant clicking or grinding noise coming from the drive. If you suspect mechanical failure, you must immediately shut down your computer and call a data recovery company for advice.

Mechanical failures are usually the most severe and most challenging to recover from. All mechanical failures require physical disassembly of the drive. The replacement of a read/write head is one of the most complex and costly procedures that can be performed by a data recovery engineer, especially with larger capacity drives. The chances of recovery depend entirely on how much damage the drive has sustained, however they can be quite good. A crashed head does not mean that all your data is lost! Once again, the sooner you catch a mechanical problem and turn off your drive, the more of your precious data is likely to be rescued.

Electronic failures are most common after a power surge or due to some other electric problem, and the most common type is control board failure. A power surge can knock out the control board, making the drive undetectable in the BIOS. Because each drive is fitted with a unique control board, recovery of this type is relatively complex. However, the good news is that normally once the control board issue is fixed, the data is usually 100% recoverable.

Recovering a drive that has suffered from an electronic failure can be time consuming, mainly because the specific problem takes some time to diagnose. Once diagnosed, though, the recovery is usually not tremendously complex and would probably land in the mid-range in terms of price. Most of the time, we are able to achieve a 100% recovery from drives that have suffered an electronic failure.

Firmware corruption is caused by logical problems or physical damage to the firmware zone on the disk platter. When the firmware becomes corrupt, the computer is often unable to properly communicate with the hard drive, and drive is not recognized in the BIOS. Fortunately, when the drive fails due to firmware corruption, the data is usually fully recoverable once the drive has been repaired.

Recovering a drive that has suffered from Firmware corruption is possible with the use of our proprietary technology. Because the firmware information is isolated on the outer rim of the disk, most of the data can be recovered successfully. The complexity of recovering a drive that has suffered from firmware corruption depends on the amount of damage suffered by the service track on the disk's platter. Expect the cost of this type of recovery to be in the mid- to high-price range.

Bad sectors are a common fate of all hard drives.

Eventually, all drives develop areas that are no longer functional and when this happens, they are isolated by the operating system. Bad sectors are very much like bumps in the road, areas which are avoided by the read/write head and which are no longer accessible to the user. If mission critical data exists on the drive, we recommend to backup as soon as possible, as the formation of bad sectors often indicates the impending demise of the drive. Finally, and most importantly, do NOT under any circumstances run the ScanDisk or Chckdisk utilities when data becomes inaccessible. These utilities are designed to fix only file system errors and not any other types of errors, so if your hard drive has suffered from bad sectors, these utilities only make things worse.

Bad sectors are accessible

We are able to recover drives with bad sectors using our proprietary mirroring technology. The process often involves manual mirroring bit-by-bit, which can be time consuming. The price of this type of recovery will generally be in the mid-range of the pricing schedule.

I hope the above explanations are of some use to all computer users. The basic fact is that data loss happens to everyone. Every hard drive crashes, and often when you least expect it to. Backup is essential for end-users and business users alike, and there are many excellent ways to back up your data. But if you've lost data, attempt to understand the problem before calling a data recovery company. Be informed, save your money, get your data back.


0

Sunday 8 April 2012

pros-and-cons-computer-forensics

The Advantages and Disadvantages of Computer Forensics

Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical know how of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.

There have been issues of authenticity concerned with this type of evidence. Nonetheless it still used today with the help of legal standards to make them admissible in court. Computer forensics is beneficial but it also has disadvantages.

Computers are the most dominant form of technology. It has been used in variety of purposes which has made digital and electronic evidence important. However there are still setbacks to this field.

Pros and Cons

The exchange of information is taking place everyday over the internet. Although this may be convenient for us, it can also pose as an opportunity for criminals. Phishing, corporate fraud, intellectual property disputes, theft, breach of contract and asset recovery are some of the situations wherein computer forensics can be used.

Apart from the technical aspect, legal issues are also involved. Computer forensic analysts make their investigation in such a way that the electronic evidence will be admissible in court.

There are advantages and disadvantages when it comes to computer forensics. This field is relatively new and criminal matters usually dealt with physical evidences. This makes electronic evidence something very new. Fortunately it has been a helpful tool wherein important data needed for a case that has been lost, deleted or damaged can be retrieved.

Computer forensics' main advantage is its ability to search and analyze a mountain of data quickly and efficiently. They can search keywords in a hard drive in different languages which is beneficial since cyber crimes can easily cross borders through the internet.

Valuable data that has been lost and deleted by offenders can be retrieved which becomes substantial evidence in court. Legal professionals are able to produce data in court that were previously impossible.

The first setback when using electronic or digital evidence is making it admissible in court. Data can be easily modified. Analyst must be bale to fully comply with standards of evidence required in the court of law. The computer forensic analyst must show that the data is tampered.

His or her own investigation must also be fully documented and accounted for. Computer forensics must also training of legal standard procedures when handling evidence.

The main disadvantage is the cost of when retrieving data. Computer forensic experts hire per hour. Analysis and reporting of data can take as long as 15 hours but it will also depend on the nature of the case. Another one is that when retrieving data, analyst may inadvertently disclose privilege documents.

Legal practitioners involved in the case must also have knowledge of computer forensics. If not they will not be able to cross examine an expert witness. This also applies to the judge, solicitors and barristers. Computer forensics is still fairly new and some may not understand it. The analyst must be able to communicate his findings in a way that everyone will understand.

Although computer forensics has its disadvantage, this can be solved by the party involved. Evidence on the other hand can only be captured once. The use of computers and the rise of cyber crimes also call for an equally high the method of stopping it.


0

Saturday 7 April 2012

computer-forensics

What is Computer Forensics?

Computers have radically changed the way we live your lives. Everyday living as become easier and technologically advanced decades ago. It has changed the way we work and the way we live in our houses. Children to day are sometimes even more technologically aware than their parents. Mobiles phones have gotten smaller and laptops have gotten slimmer.

With the launch of the Iphone that used the touch screen technology it will only be a matter of time when this idea permeates into other devices and appliances. Unfortunately, technology also makes it easier for criminals to their dirty job. However, computer forensics makes sure that technology is put to lawful use.

Everyone keeps up with the times, even the criminals. The internet is a public place which makes it vulnerable for fraud. Criminals often take advantage of unsuspecting victims. Law enforcement agencies have incorporated computer science in their investigation process to aid them with computer savvy criminals.

Crime and computers

We have seen a lot of Hollywood movies about hackers stealing from financial institutions. We have also seen two parties making their deals through bank transfers with a bunch of computers. Although these are not possible in real life, there are other ways that criminals can use computers.

Computer forensics is basically applying computer science to assist in the legal process. It entails the technological and systematic inspection of the contents of a computer system for evidence. Individuals in this field are called by different titles such as digital media analyst or computer forensics investigator. These people scanned a computer thoroughly to find out if they have used for a civil wrongdoing or criminal act.

The skills required are more than just normal data collection and using preservation techniques. Other definitions include the use of special tools to meet the Court's criteria and not just a thorough examination of a computer for potential evidence. This definition is similar to Electric Evidentiary Recovery or e-discovery.

Most of the time computer forensic investigators investigate hard drives, portable data devices and data storage devices. These devices include USB Drives, Micro Drives and external Drives.

The first task of the computer forensic investigator is to find sources of documentary or digital evidence. The next step would be to preserve the evidence so that it could be analyzed later on. When dealing with computer systems, important files or data can be quickly lost.

The investigator should take the necessary test because data retrieval can be time consuming and costly. The investigator would then analyze the collected data for potential and supportive evidence. The final step would be presenting the findings. The investigator will render his opinion based on the examination and make a report.

The process of using computer forensics must comply with the standards of evidence that are acceptable in court. This field is both technical and legal. The investigator should also have a complete understanding of the suspect's level of sophistication. If they don't the suspects are assumed to be experts.

Investigators then presume that the criminal have installed a countermeasure to render forensic techniques useless. The computer will then be shutdown completely to prohibit the machine from making further modifications to its drives.

Computer technology has changed the way we live, work, and for others - commit crime. Although the internet may seem like a very convenient place users should always be wary for seemingly innocent offers.


0

Friday 6 April 2012

computer-forensics-problems

What Remains to be Today's Computer Forensics Problem?

Computer forensics is one the fields today which often gets updated. Many agencies have found the application of computer forensics very useful especially in the investigation of fraudulent actions and crimes. More so, computer forensics is the procedure that is applied when electronic devices such as the computer media is placed under careful investigation.

The process involves the discovery and analysis of any available data whether they have been hidden or deleted. These are among the evidences that will support the defense and claim of a particular individual or company as they file for any legal action.

Moreover, computer forensics specialists use the tools that recover both the accidentally and intentionally erased files and information. So whether the loss of the data is blamed to the untoward occurrences of hardware failure, there is a better chance of recuperating them. One of the biggest computer forensics problems though is how to retain the original data without the slightest alteration in them.

So much to say, even during the process of shutting down the computer system to transfer the data into another media may cause changes in them. It is important that the computer forensics expert has the skill to maintain the exact form of the data. Nobody can exactly say when the data may be altered but with the most apt tool and the specialist's skills, it can be possibly prevented.

Computer forensics attracted the attention of the public during the height of the Enron scandal which prompted the widest-ranging computer forensics investigation marked in the world's history. As computers these days are becoming an integral part of human life, big quantities of data are being stored in these electronic devices.

More so, crimes and other fraudulent acts are likewise increasing in intervals. Computer forensics investigations are also done in emails, websites visited, chat histories, and many other forms of electronic communications.

The advances in today's technology have shaped the improvement of computer forensics. The developers continually upgrade their tools to meet the increasing intensities of computer forensics problems. Modern software and tools are coming out into the market which nonetheless makes the task easier for the computer forensics experts. Thus, data is found and restored faster and with more preciseness.

These evidences need to be in their original format especially when they are to be used as evidences in the court. These proofs are often gathered from all kinds of computer media such as the discs, Pen drives, tapes, memory sticks, logs, emails, PDAs, handhelds, deleted information, and hidden documents.

The people's common notion is that when the data is deleted from its location, the file is already completely deleted and unfound. This makes you wrong though. Upon deletion, what is erased is only that of the data's reference location but the actual document remains intact in your computer system.

It is easiest to tell that the data have been deleted but the common computer forensics problem is where and how to find it and how to recover them without making traces of changes. Thus, the solution to the dilemma will entirely depend on the computer forensics professional's skills.

Computer data security is very important so it is also significant that they remain original. Part of the training of these professionals includes the molding of their skills to be careful when handling the recovery of the data at all times.

However, it is not for them to conclude when data may be altered or not. This remains as one of the top computer forensics problems to date.


0