<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Data Recovery source</title><description></description><managingEditor>noreply@blogger.com (raden)</managingEditor><pubDate>Wed, 28 Aug 2024 03:50:05 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">16</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://datarecovery-source.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Data Recovery Source</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>FAT file system</title><link>http://datarecovery-source.blogspot.com/2009/07/fat-file-system.html</link><author>noreply@blogger.com (raden)</author><pubDate>Sat, 18 Jul 2009 09:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-6595125784106682377</guid><description>&lt;div style="text-align: justify;"&gt;&lt;p&gt;When a file is deleted on a &lt;a href="http://en.wikipedia.org/wiki/File_Allocation_Table" title="File Allocation Table"&gt;FAT&lt;/a&gt; file system, its &lt;a href="http://en.wikipedia.org/wiki/Directory_%28file_systems%29" title="Directory (file systems)"&gt;directory entry&lt;/a&gt; remains stored on the disk, slightly renamed in a way that marks the entry in FAT table as available for use by newly created files thereafter. Most of its name, and its time stamp, file length and — most importantly — location on the disk, remain unchanged in the directory entry. The list of disk clusters occupied by the file will be erased from the &lt;a href="http://en.wikipedia.org/wiki/File_Allocation_Table#File_Allocation_Table" title="File Allocation Table"&gt;File Allocation Table&lt;/a&gt;, however, marking those sectors available for use by other files created or modified thereafter.&lt;/p&gt; &lt;p&gt;When undeletion operation is attempted, the following conditions must be met for a successful recovery of the file:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;The entry of the deleted file must still exist in the directory, meaning that it must not yet be overwritten by a new file (or folder) that has been created in the same directory. Whether this is the case can fairly easily be detected by checking whether the remaining name of the file to be undeleted is still present in the directory.&lt;/li&gt;&lt;li&gt;The sectors formerly used by the deleted file must not be overwritten yet by other files. This can fairly well be verified by checking that the sectors are not marked as used in the &lt;i&gt;File Allocation Table&lt;/i&gt;. However, if, in the meantime, a new file had been written to, using those sectors, and then deleted again, freeing those sectors again, this cannot be detected automatically by the undeletion program. In this case an undeletion operation, even if appearing successful, might fail because the recovered file contains different data.&lt;/li&gt;&lt;li&gt;The file must not have been fragmented, meaning that the sectors its data occupied on the disk must have all been in one uninterrupted sequence. Whether this was the case may or may not be detectable by the undeletion program, depending on the arrangement of other files on the disk.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;Chances of recovering deleted files is higher in FAT16 as compared to FAT32 drives; fragmentation of files is usually less in FAT16 due to large cluster size support (1024 Bytes, 2KB, 4KB, 8KB, 16KB, 32KB and 64KB which is supported only in Windows NT) as compared to FAT32 (4KB, 8KB, 16KB only).&lt;/p&gt; &lt;p&gt;If the undeletion program can not detect clear signs of the above requirements not being met, it will restore the directory entry as being in use and mark all consecutive sectors (clusters), beginning with the one as recorded in the old directory entry, as used in the &lt;i&gt;File Allocation Table&lt;/i&gt;. It is then up to the user to open the recovered file and to verify that it contains the complete data of the formerly deleted file.&lt;/p&gt; &lt;p&gt;If the data of the recovered file is not correct, parts of the file may still be stored in other sectors of the disk. Recovery of those is not possible by automatic processes but only by manual examination of each (unused) block of the disk. This usually must be done by specialists that have very good knowledge of both the disk structure and the data being sought.&lt;/p&gt; &lt;p&gt;Norton UNERASE was an important component in &lt;a href="http://en.wikipedia.org/wiki/Norton_Utilities" title="Norton Utilities"&gt;Norton Utilities&lt;/a&gt; version 1.0 in 1981. Microsoft included a similar UNDELETE program in the final version of &lt;a href="http://en.wikipedia.org/wiki/MS-DOS" title="MS-DOS"&gt;MS-DOS&lt;/a&gt;, but applied the Recycle Bin approach instead in later operating systems using FAT.&lt;/p&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Privacy Policy</title><link>http://datarecovery-source.blogspot.com/2009/07/privacy-policy.html</link><category>Privacy Policy</category><author>noreply@blogger.com (raden)</author><pubDate>Thu, 16 Jul 2009 07:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-8411318460968805630</guid><description>&lt;div style="text-align: justify;"&gt;&lt;b&gt;Privacy Policy for datarecovery-source.blogspot.com/&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;If you require any more information or have any questions about our privacy policy, please feel free to contact us by email at radenayu85@gmail.com.&lt;br /&gt;&lt;br /&gt;At datarecovery-source.blogspot.com/, the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by datarecovery-source.blogspot.com/ and how it is used.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Log Files&lt;/b&gt;&lt;br /&gt;Like many other Web sites, datarecovery-source.blogspot.com/ makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Cookies and Web Beacons&lt;/b&gt;&lt;br /&gt;datarecovery-source.blogspot.com/ does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.&lt;br /&gt;&lt;br /&gt; &lt;b&gt;DoubleClick DART Cookie&lt;/b&gt;&lt;br /&gt;.:: Google, as a third party vendor, uses cookies to serve ads on datarecovery-source.blogspot.com/.&lt;br /&gt;.:: Google's use of the DART cookie enables it to serve ads to users based on their visit to datarecovery-source.blogspot.com/ and other sites on the Internet.&lt;br /&gt;.:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html&lt;br /&gt;&lt;br /&gt; Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include ....&lt;br /&gt;Google Adsense&lt;br /&gt;        &lt;br /&gt;&lt;br /&gt;These third-party ad servers or ad networks use technology to the advertisements and links that appear on datarecovery-source.blogspot.com/ send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.&lt;br /&gt;&lt;br /&gt;datarecovery-source.blogspot.com/ has no access to or control over these cookies that are used by third-party advertisers. &lt;br /&gt;&lt;br /&gt;You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. datarecovery-source.blogspot.com/'s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.&lt;br /&gt;&lt;br /&gt;If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites. &lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Recovery software</title><link>http://datarecovery-source.blogspot.com/2009/07/recovery-software.html</link><author>noreply@blogger.com (raden)</author><pubDate>Thu, 16 Jul 2009 07:17:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-4641552833329086682</guid><description>&lt;h3&gt;&lt;span class="mw-headline"&gt;Bootable&lt;/span&gt;&lt;/h3&gt;Data recovery cannot always be done on a running system. As a result &lt;a href="http://en.wikipedia.org/wiki/Boot_disk" title="Boot disk"&gt;boot disk&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Live_CD" title="Live CD"&gt;Live CD&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Live_USB" title="Live USB"&gt;Live USB&lt;/a&gt;, or any other type of &lt;a href="http://en.wikipedia.org/wiki/Live_Distro" title="Live Distro" class="mw-redirect"&gt;Live Distro&lt;/a&gt; containing a minimal operating system and a set of repair tools.&lt;br /&gt;&lt;br /&gt;&lt;h1 id="firstHeading" class="firstHeading"&gt;List of live CDs&lt;/h1&gt;This is a &lt;b&gt;list of live CDs&lt;/b&gt;. A live CD or live DVD is a CD or DVD containing a bootable computer operating system. Live CDs are unique in that they have the ability to run a complete, modern operating system on a computer lacking mutable secondary storage, such as a hard disk drive.&lt;br /&gt;&lt;h2&gt;&lt;span class="mw-headline"&gt;Rescue and Repair Live CDs&lt;/span&gt;&lt;/h2&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Billix" title="Billix"&gt;Billix&lt;/a&gt; – a multiboot distribution and system administration toolkit with the ability to install any of the included Linux distributions&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Hiren%27s_Boot_CD" title="Hiren's Boot CD" class="mw-redirect"&gt;Hiren's Boot CD&lt;/a&gt; – DOS-based computer rescue CD (&lt;a href="http://en.wikipedia.org/wiki/Partition" title="Partition"&gt;partition&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Filesystem" title="Filesystem" class="mw-redirect"&gt;filesystem&lt;/a&gt;, and Windows tools)&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Inquisitor_%28hardware_testing_software%29" title="Inquisitor (hardware testing software)"&gt;Inquisitor&lt;/a&gt; – Linux-based hardware diagnostics, stress testing and benchmarking Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Recovery_Is_Possible" title="Recovery Is Possible"&gt;RIP: (R)ecovery (I)s (P)ossible&lt;/a&gt; is a Linux-based CD with partition tool and network tools (&lt;a href="http://en.wikipedia.org/wiki/Samba_%28software%29" title="Samba (software)"&gt;Samba&lt;/a&gt;), based on the 2.6.17 kernel.&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/SystemRescueCD" title="SystemRescueCD"&gt;SystemRescueCD&lt;/a&gt; is a Linux-based CD with tools for Windows and Linux repairs, based on the 2.6 kernel.&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Trinity_Rescue_Kit" title="Trinity Rescue Kit"&gt;Trinity Rescue Kit&lt;/a&gt; – Mandriva Linux-based CD for use on a Windows or Linux based system.&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/w/index.php?title=Ultimate_Boot_CD&amp;amp;action=edit&amp;amp;redlink=1" class="new" title="Ultimate Boot CD (page does not exist)"&gt;Ultimate Boot CD&lt;/a&gt;&lt;sup id="cite_ref-0" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/List_of_LiveDistros#cite_note-0"&gt;&lt;span&gt;[&lt;/span&gt;1&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; – Linux/freeDOS-based computer rescue CD (&lt;a href="http://en.wikipedia.org/wiki/Partition" title="Partition"&gt;partition&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Filesystem" title="Filesystem" class="mw-redirect"&gt;filesystem&lt;/a&gt;, and Windows tools)&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/UBCD4Win" title="UBCD4Win" class="mw-redirect"&gt;UBCD4Win&lt;/a&gt;&lt;sup id="cite_ref-1" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/List_of_LiveDistros#cite_note-1"&gt;&lt;span&gt;[&lt;/span&gt;2&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; – the Windows version of Ultimate Boot CD (&lt;a href="http://en.wikipedia.org/wiki/BartPE" title="BartPE"&gt;BartPE&lt;/a&gt; based)&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Parted_Magic" title="Parted Magic" class="mw-redirect"&gt;Parted Magic&lt;/a&gt; – GNU/Linux live CD with rescue and partitioning tool&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h2&gt;&lt;span class="mw-headline"&gt;BSD-based&lt;/span&gt;&lt;/h2&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Anonym.OS" title="Anonym.OS"&gt;Anonym.OS&lt;/a&gt; – an &lt;a href="http://en.wikipedia.org/wiki/OpenBSD" title="OpenBSD"&gt;OpenBSD&lt;/a&gt;-based disk for secure anonymous web browsing&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/DesktopBSD" title="DesktopBSD"&gt;DesktopBSD&lt;/a&gt; – as of 1.6RC1&lt;sup id="cite_ref-2" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/List_of_LiveDistros#cite_note-2"&gt;&lt;span&gt;[&lt;/span&gt;3&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; FreeBSD and FreeSBIE based&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/DragonFly_BSD" title="DragonFly BSD"&gt;DragonFly BSD&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/FreeNAS" title="FreeNAS"&gt;FreeNAS&lt;/a&gt; – m0n0wall based&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/FreeSBIE" title="FreeSBIE"&gt;FreeSBIE&lt;/a&gt; – &lt;a href="http://en.wikipedia.org/wiki/FreeBSD" title="FreeBSD"&gt;FreeBSD&lt;/a&gt; based&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/GNU_variants#Ging" title="GNU variants"&gt;Ging&lt;/a&gt; – &lt;a href="http://en.wikipedia.org/wiki/GNU_variants#Debian_GNU.2FkFreeBSD" title="GNU variants"&gt;Debian GNU/kFreeBSD&lt;/a&gt; based&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/M0n0wall" title="M0n0wall"&gt;m0n0wall&lt;/a&gt; – FreeBSD based&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/PfSense" title="PfSense"&gt;pfSense&lt;/a&gt; – m0n0wall based&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Jibbed" title="Jibbed" class="mw-redirect"&gt;Jibbed&lt;/a&gt; – NetBSD based&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Debian-based&lt;/span&gt;&lt;/h3&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Damn_Small_Linux" title="Damn Small Linux"&gt;Damn Small Linux&lt;/a&gt; – very light and small with &lt;a href="http://en.wikipedia.org/wiki/JWM" title="JWM"&gt;JWM&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/Fluxbox" title="Fluxbox"&gt;fluxbox&lt;/a&gt;, installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/DemoLinux" title="DemoLinux"&gt;DemoLinux&lt;/a&gt; (versions 2 and 3) – one of the very first Live CDs&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Dreamlinux" title="Dreamlinux"&gt;Dreamlinux&lt;/a&gt; – installable Live CD to hard drives or flash media&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Finnix" title="Finnix"&gt;Finnix&lt;/a&gt; – a small system administration Live CD. A PowerPC version is available.&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Freeduc-cd" title="Freeduc-cd"&gt;Freeduc-cd&lt;/a&gt; – an educational live CD using &lt;a href="http://en.wikipedia.org/wiki/Xfce" title="Xfce"&gt;Xfce&lt;/a&gt; realized with the help of &lt;a href="http://en.wikipedia.org/wiki/UNESCO" title="UNESCO"&gt;UNESCO&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/GnuLinEx" title="GnuLinEx"&gt;gnuLinEx&lt;/a&gt; – includes &lt;a href="http://en.wikipedia.org/wiki/GNOME" title="GNOME"&gt;GNOME&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/GNUstep" title="GNUstep"&gt;GNUstep&lt;/a&gt; – works on i386, AMD64, UltraSPARC, and PowerPC&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Grml" title="Grml"&gt;grml&lt;/a&gt; – installable Live CD for sysadmins and text tool users&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Kanotix" title="Kanotix"&gt;Kanotix&lt;/a&gt; – installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Knoppix" title="Knoppix"&gt;Knoppix&lt;/a&gt; – the "original" Debian-based Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/MEPIS" title="MEPIS"&gt;MEPIS&lt;/a&gt; – installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Sidux" title="Sidux"&gt;sidux&lt;/a&gt;&lt;sup id="cite_ref-3" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/List_of_LiveDistros#cite_note-3"&gt;&lt;span&gt;[&lt;/span&gt;4&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; based on Debian unstable (Sid), installable Live CD, DVD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Tuquito" title="Tuquito"&gt;Tuquito&lt;/a&gt; – created in Argentina&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/ULAnux/ULAnix" title="ULAnux/ULAnix"&gt;ULAnux/ULAnix&lt;/a&gt; – created in Mérida, Venezuela, and available on CD/DVD and USB forms&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;&lt;span class="mw-headline"&gt;Ubuntu-based&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;p&gt;These are based at least partially on &lt;a href="http://en.wikipedia.org/wiki/Ubuntu_%28operating_system%29" title="Ubuntu (operating system)" class="mw-redirect"&gt;Ubuntu&lt;/a&gt;, which is based on Debian:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/CrunchBang_Linux" title="CrunchBang Linux"&gt;CrunchBang Linux&lt;/a&gt; – installable Live CD, using &lt;a href="http://en.wikipedia.org/wiki/Openbox" title="Openbox"&gt;Openbox&lt;/a&gt; as &lt;a href="http://en.wikipedia.org/wiki/Window_manager" title="Window manager"&gt;window manager&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Edubuntu" title="Edubuntu"&gt;Edubuntu&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Kubuntu" title="Kubuntu"&gt;Kubuntu&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Xubuntu" title="Xubuntu"&gt;Xubuntu&lt;/a&gt; – installable Live CDs&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/GNewSense" title="GNewSense"&gt;gNewSense&lt;/a&gt; – supported by the &lt;a href="http://en.wikipedia.org/wiki/Free_Software_Foundation" title="Free Software Foundation"&gt;Free Software Foundation&lt;/a&gt;, includes &lt;a href="http://en.wikipedia.org/wiki/GNOME" title="GNOME"&gt;GNOME&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/GOS_%28operating_system%29" title="GOS (operating system)"&gt;gOS&lt;/a&gt; – a series of lightweight &lt;a href="http://en.wikipedia.org/wiki/Operating_systems" title="Operating systems" class="mw-redirect"&gt;operating systems&lt;/a&gt; based on Ubuntu with &lt;a href="http://en.wikipedia.org/wiki/Ajax" title="Ajax"&gt;Ajax&lt;/a&gt;-based &lt;a href="http://en.wikipedia.org/wiki/List_of_Google_products" title="List of Google products"&gt;applications&lt;/a&gt; and other Web 2.0 applications, geared to beginning users, installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Linux_Mint" title="Linux Mint"&gt;Linux Mint&lt;/a&gt; – installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/OpenGEU" title="OpenGEU"&gt;openGEU&lt;/a&gt; – installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Sage_%28mathematics_software%29" title="Sage (mathematics software)"&gt;Sage&lt;/a&gt; – designed solely for the use of sage mathematics software&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Ubuntu_%28operating_system%29" title="Ubuntu (operating system)" class="mw-redirect"&gt;Ubuntu&lt;/a&gt; – installable Live CD&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Super_OS" title="Super OS"&gt;Super OS (formerly Super Ubuntu)&lt;/a&gt; – installable Live DVD, can be converted to a &lt;a href="http://en.wikipedia.org/wiki/Live_USB" title="Live USB"&gt;Live USB&lt;/a&gt; using the built-in &lt;a href="http://en.wikipedia.org/wiki/Cd2usb" title="Cd2usb" class="mw-redirect"&gt;cd2usb&lt;/a&gt; or &lt;a href="http://en.wikipedia.org/wiki/Usb-creator" title="Usb-creator" class="mw-redirect"&gt;usb-creator&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/TurnKey_Linux" title="TurnKey Linux"&gt;TurnKey Linux&lt;/a&gt; – family of installable Live CD appliances optimized for ease of use in server-type usage scenarios&lt;/li&gt;&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/WeakNet_Linux" title="WeakNet Linux"&gt;WeakNet Linux&lt;/a&gt; - installable Live CD with Security tools coded by members of &lt;a href="http://en.wikipedia.org/wiki/WeakNet_Laboratories" title="WeakNet Laboratories"&gt;WeakNet Laboratories&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Data erasure</title><link>http://datarecovery-source.blogspot.com/2009/07/data-erasure.html</link><author>noreply@blogger.com (raden)</author><pubDate>Mon, 13 Jul 2009 01:36:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-6175045042018255209</guid><description>&lt;div style="text-align: justify;"&gt;&lt;p&gt;&lt;b&gt;Data erasure&lt;/b&gt; is a method of software-based overwriting that completely destroys all &lt;a href="http://en.wikipedia.org/wiki/Data_remanence" title="Data remanence"&gt;electronic data residing&lt;/a&gt; on a &lt;a href="http://en.wikipedia.org/wiki/Hard_drive" title="Hard drive" class="mw-redirect"&gt;hard drive&lt;/a&gt; or other &lt;a href="http://en.wikipedia.org/wiki/Digital_media" title="Digital media"&gt;digital media&lt;/a&gt;. Permanent data erasure goes beyond basic &lt;a href="http://en.wikipedia.org/wiki/File_deletion" title="File deletion"&gt;file deletion&lt;/a&gt; commands, which only remove direct pointers to data &lt;a href="http://en.wikipedia.org/wiki/Disk_sector" title="Disk sector"&gt;disk sectors&lt;/a&gt; and make &lt;a href="http://en.wikipedia.org/wiki/Data_recovery" title="Data recovery"&gt;data recovery&lt;/a&gt; possible with common software tools. Unlike &lt;a href="http://en.wikipedia.org/wiki/Degaussing" title="Degaussing"&gt;degaussing&lt;/a&gt; and physical destruction, which render the disk unusable, data erasure removes all information while leaving the disk operable, preserving assets and the environment.&lt;/p&gt; &lt;p&gt;Software-based overwriting uses a software application to write patterns of meaningless data onto each of a hard drive's sectors. There are key differentiators between data erasure and other overwriting methods, which can leave data intact and raise the risk of data breach or &lt;a href="http://en.wikipedia.org/wiki/Data_spill" title="Data spill"&gt;spill&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Identity" title="Identity"&gt;identity&lt;/a&gt; theft and failure to achieve regulatory compliance. Data erasure also provides multiple overwrites so that it supports recognized government and industry standards. It provides verification of data removal, which is necessary for meeting certain standards.&lt;/p&gt; &lt;p&gt;To protect data on lost or stolen media, some data erasure applications remotely destroy data if the password is incorrectly entered. Data erasure tools can also target specific data on a disk for routine erasure, providing a &lt;a href="http://en.wikipedia.org/wiki/Hacking" title="Hacking"&gt;hacking&lt;/a&gt; protection method that is a less time-consuming than &lt;a href="http://en.wikipedia.org/wiki/Encryption" title="Encryption"&gt;encryption&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;&lt;span class="mw-headline"&gt;Importance&lt;/span&gt;&lt;/h2&gt;nformation technology (IT) assets commonly hold large volumes of confidential data. Social security numbers, credit card numbers, bank details, medical history and classified information are often stored on computer hard drives or &lt;a href="http://en.wikipedia.org/wiki/Servers" title="Servers" class="mw-redirect"&gt;servers&lt;/a&gt; and can inadvertently or intentionally make their way onto other media such as printer, &lt;a href="http://en.wikipedia.org/wiki/USB" title="USB" class="mw-redirect"&gt;USB&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Flash_memory" title="Flash memory"&gt;flash&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Iomega_Zip_drive" title="Iomega Zip drive"&gt;Zip&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Iomega_Jaz_drive" title="Iomega Jaz drive"&gt;Jaz&lt;/a&gt;, and &lt;a href="http://en.wikipedia.org/wiki/Iomega_REV" title="Iomega REV"&gt;REV&lt;/a&gt; drives.&lt;br /&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Data breach&lt;/span&gt;&lt;/h3&gt;Increased storage of sensitive data, combined with rapid technological change and the shorter lifespan of IT assets, has driven the need for permanent data erasure of electronic devices as they are retired or refurbished. Also, compromised networks and &lt;a href="http://en.wikipedia.org/wiki/Laptop_theft" title="Laptop theft"&gt;laptop theft&lt;/a&gt; and loss, as well as that of other portable media, are increasingly common sources of data breaches. If data erasure does not occur when a disk is retired or lost, an organization or user faces that possibility that data will be stolen and compromised, leading to identity theft, loss of corporate reputation, threats to regulatory compliance and financial impacts. Companies have spent nearly $5 million on average to recover when corporate data was lost or stolen.&lt;br /&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Regulatory compliance&lt;/span&gt;&lt;/h3&gt;Strict industry standards and government regulations are in place that force organizations to mitigate the risk of unauthorized exposure of confidential corporate and government data. These regulations include &lt;a href="http://en.wikipedia.org/wiki/HIPAA" title="HIPAA" class="mw-redirect"&gt;HIPAA&lt;/a&gt; (Health Insurance Portability and Accountability Act); &lt;a href="http://en.wikipedia.org/wiki/FACTA" title="FACTA" class="mw-redirect"&gt;FACTA&lt;/a&gt; (The Fair and Accurate Credit Transactions Act of 2003); GLB (&lt;a href="http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act" title="Gramm-Leach-Bliley Act"&gt;Gramm-Leach Bliley&lt;/a&gt;); &lt;a href="http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act" title="Sarbanes-Oxley Act"&gt;Sarbanes-Oxley Act&lt;/a&gt; (SOx); and Payment Card Industry Data Security Standards (&lt;a href="http://en.wikipedia.org/wiki/PCI_DSS" title="PCI DSS" class="mw-redirect"&gt;PCI DSS&lt;/a&gt;). Failure to comply can result in fines and damage to company reputation, as well as civil and criminal liability.&lt;br /&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Preserving assets and the environment&lt;/span&gt;&lt;/h3&gt;Data erasure offers an alternative to physical destruction and degaussing for secure removal of all disk data. Physical destruction and degaussing destroy the digital media, requiring its disposal and contributing to &lt;a href="http://en.wikipedia.org/wiki/Electronic_waste" title="Electronic waste"&gt;electronic waste&lt;/a&gt; while negatively impacting the &lt;a href="http://en.wikipedia.org/wiki/Carbon_footprint" title="Carbon footprint"&gt;carbon footprint&lt;/a&gt; of individuals and companies.&lt;sup id="cite_ref-environment_1-0" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/Data_erasure#cite_note-environment-1"&gt;&lt;span&gt;[&lt;/span&gt;2&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; Data erasure allows secure disposal of obsolete equipment and preserves the potential to refurbish a computer for future use, protecting viable IT assets.&lt;br /&gt;&lt;h2&gt;&lt;span class="mw-headline"&gt;Differentiators&lt;/span&gt;&lt;/h2&gt;Software-based data erasure uses a special application to write a combination of 1's and 0's onto each hard drive sector. The level of security depends on the number of times the entire hard drive is written over.&lt;br /&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Full disk overwriting&lt;/span&gt;&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;There are many overwriting programs, but data erasure offers complete security by destroying data on all areas of a hard drive. Disk overwriting programs that cannot access the entire hard drive, including hidden/locked areas like the &lt;a href="http://en.wikipedia.org/wiki/Host_protected_area" title="Host protected area"&gt;host protected area&lt;/a&gt; (HPA), &lt;a href="http://en.wikipedia.org/wiki/Device_configuration_overlay" title="Device configuration overlay"&gt;device configuration overlay&lt;/a&gt; (DCO), and remapped sectors, perform an incomplete erasure, leaving some of the data intact. By accessing the entire hard drive, data erasure eliminates the risk of &lt;a href="http://en.wikipedia.org/wiki/Data_remanence" title="Data remanence"&gt;data remanence&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Data erasure also bypasses the &lt;a href="http://en.wikipedia.org/wiki/BIOS" title="BIOS"&gt;BIOS&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/Operating_system" title="Operating system"&gt;OS&lt;/a&gt;. Overwriting programs that operate through the BIOS and OS will not always perform a complete erasure due to altered or corrupted BIOS data and may report back a complete and successful erasure even if they do not access the entire hard disk, leaving data accessible.&lt;/p&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Hardware support&lt;/span&gt;&lt;/h3&gt;Data erasure can be deployed over a network to target multiple &lt;a href="http://en.wikipedia.org/wiki/Personal_computer" title="Personal computer"&gt;PCs&lt;/a&gt; rather than having to erase each one sequentially. In contrast with &lt;a href="http://en.wikipedia.org/wiki/DOS" title="DOS"&gt;DOS&lt;/a&gt;-based overwriting programs that may not detect all network hardware, &lt;a href="http://en.wikipedia.org/wiki/Linux" title="Linux"&gt;Linux&lt;/a&gt;-based data erasure software supports high-end server and &lt;a href="http://en.wikipedia.org/wiki/Storage_area_network" title="Storage area network"&gt;storage area network&lt;/a&gt; (SAN) environments with hardware support for &lt;a href="http://en.wikipedia.org/wiki/Serial_ATA" title="Serial ATA"&gt;Serial ATA&lt;/a&gt;, &lt;a href="http://en.wikipedia.org/wiki/Serial_Attached_SCSI" title="Serial Attached SCSI"&gt;Serial Attached SCSI&lt;/a&gt; (SAS) and &lt;a href="http://en.wikipedia.org/wiki/Fiber_Channel" title="Fiber Channel" class="mw-redirect"&gt;Fiber Channel&lt;/a&gt; disks and remapped sectors. It operates directly with sector sizes such as 520, 524, and 528, removing the need to first reformat back to 512 sector size.&lt;br /&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Standards&lt;/span&gt;&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Many government and industry standards exist for software-based overwriting that removes data. A key factor in meeting these standards is the number of times the data is overwritten. Also, some standards require a method to verify that all data has been removed from the entire hard drive and to view the overwrite pattern. Complete data erasure should account for hidden areas, typically DCO, HPA and remapped sectors.&lt;/p&gt; &lt;p&gt;The 1995 edition of the &lt;a href="http://en.wikipedia.org/wiki/National_Industrial_Security_Program" title="National Industrial Security Program"&gt;National Industrial Security Program&lt;/a&gt; Operating Manual (DoD 5220.22-M) permitted the use of overwriting techniques to sanitize some types of media by writing all addressable locations with a character, its complement, and then a random character. This provision was removed in a 2001 change to the manual and was never permitted for Top Secret media, but it is still listed as a technique by many offerors of data erasure software.&lt;/p&gt; &lt;p&gt;Data erasure software should provide the user with a validation certificate indicating that the overwriting procedure was completed properly. Data erasure software should also comply with requirements to erase hidden areas, provide a defects log list, and list bad sectors that could not be overwritten.&lt;/p&gt; &lt;table class="wikitable"&gt; &lt;tbody&gt;&lt;tr&gt; &lt;th&gt;Overwriting Standard&lt;/th&gt; &lt;th&gt;Date&lt;/th&gt; &lt;th&gt;Overwriting Rounds&lt;/th&gt; &lt;th&gt;Pattern&lt;/th&gt; &lt;th&gt;Notes&lt;/th&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology"&gt;NIST&lt;/a&gt; SP-800-88 &lt;a href="http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf" class="external autonumber" title="http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf" rel="nofollow"&gt;[1]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2006&lt;/td&gt; &lt;td&gt;1&lt;/td&gt; &lt;td&gt;Unspecified&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/National_Security_Agency" title="National Security Agency"&gt;NSA&lt;/a&gt;/&lt;a href="http://en.wikipedia.org/wiki/Central_Security_Service" title="Central Security Service"&gt;CSS&lt;/a&gt; Policy Manual 9-12 &lt;a href="http://www.nsa.gov/ia/_files/government/MDG/NSA_CSS_Storage_Device_Declassification_Manual.pdf" class="external autonumber" title="http://www.nsa.gov/ia/_files/government/MDG/NSA_CSS_Storage_Device_Declassification_Manual.pdf" rel="nofollow"&gt;[2]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2006&lt;/td&gt; &lt;td&gt;not approved&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;td&gt;Degauss or destroy&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;U.S. &lt;a href="http://en.wikipedia.org/wiki/National_Industrial_Security_Program" title="National Industrial Security Program"&gt;National Industrial Security Program&lt;/a&gt; Operating Manual (DoD 5220.22-M)&lt;a href="http://www.dtic.mil/whs/directives/corres/html/522022m.htm" class="external autonumber" title="http://www.dtic.mil/whs/directives/corres/html/522022m.htm" rel="nofollow"&gt;[3]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2006&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;td&gt;not specified&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;U.S. &lt;a href="http://en.wikipedia.org/wiki/United_States_Department_of_Defense" title="United States Department of Defense"&gt;DoD&lt;/a&gt; Unclassified Computer Hard Drive Disposition &lt;a href="http://iase.disa.mil/policy-guidance/asd_hd_disposition_memo060401.pdf" class="external autonumber" title="http://iase.disa.mil/policy-guidance/asd_hd_disposition_memo060401.pdf" rel="nofollow"&gt;[4]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2001&lt;/td&gt; &lt;td&gt;3&lt;/td&gt; &lt;td&gt;A character, its complement, another pattern&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/United_States_Department_of_the_Navy" title="United States Department of the Navy"&gt;U.S. Navy&lt;/a&gt; Staff Office Publication NAVSO P-5239-26&lt;a href="http://www.fas.org/irp/doddir/navy/5239_26.htm" class="external autonumber" title="http://www.fas.org/irp/doddir/navy/5239_26.htm" rel="nofollow"&gt;[5]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;1993&lt;/td&gt; &lt;td&gt;3&lt;/td&gt; &lt;td&gt;A character, its complement, random&lt;/td&gt; &lt;td&gt;Verification is mandatory&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/United_States_Air_Force" title="United States Air Force"&gt;U.S. Air Force&lt;/a&gt; System Security Instruction 5020 &lt;a href="http://jya.com/afssi5020.htm" class="external autonumber" title="http://jya.com/afssi5020.htm" rel="nofollow"&gt;[6]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;1996&lt;/td&gt; &lt;td&gt;4&lt;/td&gt; &lt;td&gt;All 0's, all 1's, any character&lt;/td&gt; &lt;td&gt;Verification is mandatory&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;British HMG Infosec Standard 5, Baseline Standard&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;td&gt;1&lt;/td&gt; &lt;td&gt;All 0's&lt;/td&gt; &lt;td&gt;Verification is optional&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;British HMG Infosec Standard 5, Enhanced Standard&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;td&gt;3&lt;/td&gt; &lt;td&gt;All 0's, all 1's, random&lt;/td&gt; &lt;td&gt;Verification is mandatory&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/Communications_Security_Establishment_Canada" title="Communications Security Establishment Canada"&gt;Communications Security Establishment Canada&lt;/a&gt; ITSG-06 &lt;a href="http://www.cse-cst.gc.ca/its-sti/publications/itsg-csti-eng.html" class="external autonumber" title="http://www.cse-cst.gc.ca/its-sti/publications/itsg-csti-eng.html" rel="nofollow"&gt;[7]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2006&lt;/td&gt; &lt;td&gt;3&lt;/td&gt; &lt;td&gt;All 1's or 0's, its complement, a pseudo-random pattern&lt;/td&gt; &lt;td&gt;For unclassified media&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;German &lt;a href="http://en.wikipedia.org/wiki/Federal_Office_for_Information_Security" title="Federal Office for Information Security"&gt;Federal Office for Information Security&lt;/a&gt; &lt;a href="http://www.bsi.de/english/gshb/manual/s/s02167.htm" class="external autonumber" title="http://www.bsi.de/english/gshb/manual/s/s02167.htm" rel="nofollow"&gt;[8]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2004&lt;/td&gt; &lt;td&gt;2-3&lt;/td&gt; &lt;td&gt;Non-uniform pattern, its complement&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Australian Government ICT Security Manual &lt;a href="http://www.dsd.gov.au/library/infosec/ism.html" class="external autonumber" title="http://www.dsd.gov.au/library/infosec/ism.html" rel="nofollow"&gt;[9]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2008&lt;/td&gt; &lt;td&gt;1&lt;/td&gt; &lt;td&gt;Unspecified&lt;/td&gt; &lt;td&gt;Degauss or destroy Top Secret media&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;New Zealand &lt;a href="http://en.wikipedia.org/wiki/Government_Communications_Security_Bureau" title="Government Communications Security Bureau"&gt;Government Communications Security Bureau&lt;/a&gt; NZSIT 402 &lt;a href="http://www.gcsb.govt.nz/newsroom/nzsits.html" class="external autonumber" title="http://www.gcsb.govt.nz/newsroom/nzsits.html" rel="nofollow"&gt;[10]&lt;/a&gt;&lt;/td&gt; &lt;td&gt;2008&lt;/td&gt; &lt;td&gt;1&lt;/td&gt; &lt;td&gt;Unspecified&lt;/td&gt; &lt;td&gt;For data up to Confidential&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/Gutmann_method" title="Gutmann method"&gt;Peter Gutmann's Algorithm&lt;/a&gt;&lt;/td&gt; &lt;td&gt;1996&lt;/td&gt; &lt;td&gt;Up to 35&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;td&gt;Originally intended for MFM and RLL disks, which are now obsolete&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;a href="http://en.wikipedia.org/wiki/Bruce_Schneier" title="Bruce Schneier"&gt;Bruce Schneier&lt;/a&gt;'s Algorithm&lt;sup id="cite_ref-2" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/Data_erasure#cite_note-2"&gt;&lt;span&gt;[&lt;/span&gt;3&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/td&gt; &lt;td&gt;1996&lt;/td&gt; &lt;td&gt;7&lt;/td&gt; &lt;td&gt;All 1's, all 0's, pseudo-random sequence five times&lt;/td&gt; &lt;td&gt;&lt;br /&gt;&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt;&lt;/table&gt; &lt;p&gt;Data can sometimes be recovered from a broken hard drive. However, if the platters on a hard drive are damaged, such as by drilling a hole through the drive (and the platters inside), then data can only be recovered by bit-by-bit analysis of each platter with advanced forensic technology. &lt;a href="http://en.wikipedia.org/wiki/Seagate" title="Seagate"&gt;Seagate&lt;/a&gt; is the only company in the world to have credibly claimed such technology, although some governments may also be able to do this.&lt;/p&gt;&lt;h3&gt;&lt;span class="mw-headline"&gt;Number of overwrites needed&lt;/span&gt;&lt;/h3&gt;&lt;br /&gt;&lt;p&gt;Data on &lt;a href="http://en.wikipedia.org/wiki/Floppy_disk" title="Floppy disk"&gt;floppy disks&lt;/a&gt; can sometimes be recovered by forensic analysis even after the disks have been overwritten once with zeros (or random zeros and ones). This is not the case with modern hard drives. The bits on modern drives are so small that deviation of tracks between writes cannot be discerned by any means&lt;sup class="noprint Template-Fact" title="This claim needs references to reliable sources from June 2009" style="white-space: nowrap;"&gt;[&lt;i&gt;&lt;a href="http://en.wikipedia.org/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"&gt;citation needed&lt;/a&gt;&lt;/i&gt;]&lt;/sup&gt;.&lt;/p&gt; &lt;p&gt;According to the 2006 &lt;a href="http://en.wikipedia.org/wiki/NIST" title="NIST" class="mw-redirect"&gt;NIST&lt;/a&gt; Special Publication 800-88 (p. 7): "Studies have shown that most of today’s media can be effectively cleared by one overwrite" and "for ATA disk drives manufactured after 2001 (over 15 GB) the terms clearing and purging have converged."&lt;sup id="cite_ref-SP800-88_3-0" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/Data_erasure#cite_note-SP800-88-3"&gt;&lt;span&gt;[&lt;/span&gt;4&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt; &lt;p&gt;According to the Center for Magnetic Recording Research, "Secure erase does a single on-track erasure of the data on the disk drive. The U.S. National Security Agency published an Information Assurance Approval of single pass overwrite, after technical testing at CMRR showed that multiple on-track overwrite passes gave no additional erasure."&lt;sup id="cite_ref-CMMR_4-0" class="reference"&gt;&lt;a href="http://en.wikipedia.org/wiki/Data_erasure#cite_note-CMMR-4"&gt;&lt;span&gt;[&lt;/span&gt;5&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; "Secure erase" is a utility built into modern &lt;a href="http://en.wikipedia.org/wiki/AT_Attachment" title="AT Attachment" class="mw-redirect"&gt;ATA&lt;/a&gt; hard drives that overwrites all data on a disk, including remapped (error) sectors.&lt;/p&gt; Further analysis by Wright et al. seems to also indicate that one overwrite is all that is generally required&lt;a href="http://en.wikipedia.org/wiki/Data_erasure#cite_note-breach-0"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Data carving</title><link>http://datarecovery-source.blogspot.com/2009/07/data-carving.html</link><author>noreply@blogger.com (raden)</author><pubDate>Fri, 10 Jul 2009 22:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-4674390666522541018</guid><description>&lt;div style="text-align: justify;"&gt;Data Carving is a data recovery technique that allows for data with no file system allocation information to be extracted by identifying sectors and clusters belonging to the file. Data Carving usually searches through raw sectors looking for specific desired file signatures. The fact that there is no allocation information means that the investigator must specify a block size of data to carve out upon finding a matching file signature, or the carving software must infer it from other information on the media. There is a requirement that the beginning of the file still be present and that there is (depending on how common the file signature is) a risk of many false hits. Data carving, also known as &lt;a href="http://en.wikipedia.org/wiki/File_carving" title="File carving"&gt;file carving&lt;/a&gt;, has traditionally required that the files recovered be located in sequential sectors (rather than fragmented) as there is no allocation information to point to fragmented file portions. Recent developments in file carving algorithms have led to tools that can recover files that are fragmented into multiple pieces. Carving tends is a time and resource intensive operation&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>n73pu96dbe</title><link>http://datarecovery-source.blogspot.com/2009/07/n73pu96dbe.html</link><author>noreply@blogger.com (raden)</author><pubDate>Thu, 9 Jul 2009 08:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-4755023645887525777</guid><description>n73pu96dbe</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>CHKDSK</title><link>http://datarecovery-source.blogspot.com/2009/07/chkdsk.html</link><author>noreply@blogger.com (raden)</author><pubDate>Thu, 9 Jul 2009 07:56:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-3262143001098519229</guid><description>&lt;p style="text-align: justify;"&gt;&lt;b&gt;CHKDSK&lt;/b&gt; (short for &lt;b&gt;Checkdisk&lt;/b&gt;) is a command on computers running  &lt;a title="DOS" href="/wiki/DOS"&gt;DOS&lt;/a&gt;, &lt;a title="OS/2" href="/wiki/OS/2"&gt;OS/2&lt;/a&gt;  and &lt;a title="Microsoft Windows" href="/wiki/Microsoft_Windows"&gt;Microsoft  Windows&lt;/a&gt; operating systems that displays the &lt;a title="File system" href="/wiki/File_system"&gt;file system&lt;/a&gt; integrity status of &lt;a class="mw-redirect" title="Hard disk" href="/wiki/Hard_disk"&gt;hard disks&lt;/a&gt; and &lt;a title="Floppy disk" href="/wiki/Floppy_disk"&gt;floppy disk&lt;/a&gt; and can fix logical  file system errors. It is similar to the &lt;a title="Fsck" href="/wiki/Fsck"&gt;fsck&lt;/a&gt; command in &lt;a title="Unix" href="/wiki/Unix"&gt;Unix&lt;/a&gt;.&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;On computers running &lt;a title="Windows NT" href="/wiki/Windows_NT"&gt;NT-based&lt;/a&gt; versions of Windows, CHKDSK can also check  the disk surface for physical errors or &lt;i&gt;&lt;a title="Bad sector" href="/wiki/Bad_sector"&gt;bad sectors&lt;/a&gt;&lt;/i&gt;, a task previously done by &lt;a title="SCANDISK" href="/wiki/SCANDISK"&gt;SCANDISK&lt;/a&gt;. This version of CHKDSK can  also handle some physical errors and recover data that is still readable.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;span class="mw-headline"&gt;Windows NT-based CHKDSK&lt;/span&gt;&lt;br /&gt;&lt;span class="mw-headline"&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style="text-align: justify;"&gt;CHKDSK can be run from the &lt;a title="Windows Shell" href="/wiki/Windows_Shell"&gt;Windows Shell&lt;/a&gt;, the Windows &lt;a title="Command Prompt (Windows)" href="/wiki/Command_Prompt_%28Windows%29"&gt;Command  Prompt&lt;/a&gt; or the Windows &lt;a title="Recovery Console" href="/wiki/Recovery_Console"&gt;Recovery Console&lt;/a&gt;. One option for CHKDSK is the  use of the &lt;a class="mw-redirect" title="Command-line" href="/wiki/Command-line"&gt;Command-line&lt;/a&gt;&lt;code&gt;/R&lt;/code&gt; parameter, which  allows the program to repair damage it finds on the hard drive.&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;Conducting a CHKDSK can take some time, especially if using the  &lt;code&gt;/R&lt;/code&gt; parameter, and the results are often not visible, for various  reasons. The results of a CHKDSK conducted on restart using &lt;a title="Windows 2000" href="/wiki/Windows_2000"&gt;Windows 2000&lt;/a&gt; or later  operating systems are written to the Application Log, with a "Source" name of  &lt;i&gt;&lt;a class="new" title="Wininit (page does not exist)" href="/w/index.php?title=Wininit&amp;amp;action=edit&amp;amp;redlink=1"&gt;Wininit&lt;/a&gt;&lt;/i&gt;  or Winlogon and can be viewed with the &lt;a title="Event Viewer" href="/wiki/Event_Viewer"&gt;Event Viewer&lt;/a&gt;.&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;The standard version of CHKDSK supports the following switches :&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;table style="text-align: left; margin-left: 0px; margin-right: 0px;" class="wikitable" border="1"&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;filename&lt;/td&gt; &lt;td&gt;FAT only. Specifies the file or set of files to check for fragmentation.  Wildcard characters (* and ?) are allowed.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;path&lt;/td&gt; &lt;td&gt;FAT only. Specifies the location of a file or set of files within the folder  structure of the volume.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;size&lt;/td&gt; &lt;td&gt;NTFS only. Changes the log file size to the specified number of kilobytes.  Must be used with the /l switch.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;volume&lt;/td&gt; &lt;td&gt;FAT and NTFS (NTFS support is unofficially supported but works normally).  Specifies the drive letter (followed by a colon), mount point, or volume  name.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/c&lt;/td&gt; &lt;td&gt;NTFS only. Skips checking of cycles within the folder structure.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/f&lt;/td&gt; &lt;td&gt;Fixes errors on the volume. The volume must be locked. If Chkdsk cannot lock  the volume, it offers to check it the next time the computer starts.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/i&lt;/td&gt; &lt;td&gt;NTFS only. Performs a less vigorous check of index entries.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/l&lt;/td&gt; &lt;td&gt;NTFS only. Displays current size of the log file.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/p&lt;/td&gt; &lt;td&gt;Checks disk even if it is not flagged as "dirty".&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/r&lt;/td&gt; &lt;td&gt;Locates bad sectors and recovers readable information (implies /f and /p).  If Chkdsk cannot lock the volume, it offers to check it the next time the  computer starts.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/v&lt;/td&gt; &lt;td&gt;On FAT: Displays the full path and name of every file on the volume. On  NTFS: Displays cleanup messages, if any.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/x&lt;/td&gt; &lt;td&gt;NTFS only. Forces the volume to dismount first, if necessary. All opened  handles to the volume are then invalid (implies /f ).&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/?&lt;/td&gt; &lt;td&gt;Displays this list of Chkdsk switches.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;When running CHKDSK from the &lt;a title="Recovery Console" href="/wiki/Recovery_Console"&gt;Recovery Console&lt;/a&gt; the options are different.  The /p is not read-only as in the standard version but corrects errors :&lt;sup class="reference" id="cite_ref-0"&gt;&lt;a href="#cite_note-0"&gt;&lt;span&gt;[&lt;/span&gt;1&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;table style="text-align: left; margin-left: 0px; margin-right: 0px;" class="wikitable" border="1"&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;/p&lt;/td&gt; &lt;td&gt;Fixes errors on the volume. Same as the /f option in standard  CHKDSK.&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td&gt;/r&lt;/td&gt; &lt;td&gt;Locates bad sectors and recovers readable information (implies /f and /p).  Takes much longer to run than /p by itself.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;A &lt;b&gt;typical&lt;/b&gt; result:&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;Checking file system on C:&lt;br /&gt;The type of the file system is NTFS.&lt;br /&gt;&lt;br /&gt;A disk check has been scheduled.&lt;br /&gt;Windows will now check the disk.&lt;br /&gt;Cleaning up minor inconsistencies on the drive.&lt;br /&gt;Cleaning up 318 unused index entries from index $SII of file 0x9.&lt;br /&gt;Cleaning up 318 unused index entries from index $SDH of file 0x9.&lt;br /&gt;Cleaning up 318 unused security descriptors.&lt;br /&gt;CHKDSK is verifying file data (stage 4 of 5)...&lt;br /&gt;File data verification completed.&lt;br /&gt;CHKDSK is verifying free space (stage 5 of 5)...&lt;br /&gt;Free space verification is complete.&lt;br /&gt;&lt;br /&gt; 14996645 KB total disk space.&lt;br /&gt; 10187752 KB in 88054 files.&lt;br /&gt;    30784 KB in 5774 indexes.&lt;br /&gt;        0 KB in bad sectors.&lt;br /&gt;   164341 KB in use by the system.&lt;br /&gt;    65536 KB occupied by the log file.&lt;br /&gt;  4613768 KB available on disk.&lt;br /&gt;&lt;br /&gt;     4096 bytes in each allocation unit.&lt;br /&gt;  3749161 total allocation units on disk.&lt;br /&gt;  1153442 allocation units available on disk.&lt;br /&gt;&lt;/pre&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;&lt;b&gt;Vista&lt;/b&gt; result (&lt;i&gt;App Event Log&lt;/i&gt;):&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;pre&gt;Checking file system on C:&lt;br /&gt;The type of the file system is NTFS.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;A disk check has been scheduled.&lt;br /&gt;Windows will now check the disk.                        &lt;br /&gt; 79232 file records processed.&lt;br /&gt; 332 large file records processed.&lt;br /&gt; 0 bad file records processed.&lt;br /&gt; 2 EA records processed.&lt;br /&gt; 44 reparse records processed.&lt;br /&gt; 105198 index entries processed.&lt;br /&gt; 0 unindexed files processed.&lt;br /&gt; 79232 security descriptors processed.&lt;br /&gt; Cleaning up 1 unused index entries from index $SII of file 0x9.&lt;br /&gt;Cleaning up 1 unused index entries from index $SDH of file 0x9.&lt;br /&gt;Cleaning up 1 unused security descriptors.&lt;br /&gt; 12984 data files processed.&lt;br /&gt;CHKDSK is verifying Usn Journal...&lt;br /&gt; 35789792 USN bytes processed.&lt;br /&gt;Usn Journal verification completed.&lt;br /&gt;Windows has checked the file system and found no problems.&lt;br /&gt;&lt;br /&gt; 78175231 KB total disk space.&lt;br /&gt; 12902428 KB in 54029 files.&lt;br /&gt;    36068 KB in 12985 indexes.&lt;br /&gt;        0 KB in bad sectors.&lt;br /&gt;   187407 KB in use by the system.&lt;br /&gt;    65536 KB occupied by the log file.&lt;br /&gt; 65049328 KB available on disk.&lt;br /&gt;&lt;br /&gt;     4096 bytes in each allocation unit.&lt;br /&gt; 19543807 total allocation units on disk.&lt;br /&gt; 16262332 allocation units available on disk.&lt;br /&gt;&lt;span class="mw-headline"&gt;&lt;/span&gt;&lt;span class="mw-headline"&gt;&lt;/span&gt;&lt;br /&gt;&lt;/pre&gt;&lt;span class="mw-headline"&gt;Known issues&lt;/span&gt;&lt;br /&gt;Sometimes the check after CHKDSK invoked with the &lt;code&gt;/f&lt;/code&gt; or  &lt;code&gt;/r&lt;/code&gt; option on reboot still fails, giving the error "Cannot open  volume for direct access" on startup, due to an application (&lt;a class="mw-redirect" title="Anti-virus" href="/wiki/Anti-virus"&gt;anti-virus&lt;/a&gt;, &lt;a class="mw-redirect" title="Anti-spyware" href="/wiki/Anti-spyware"&gt;anti-spyware&lt;/a&gt;,  &lt;a class="mw-redirect" title="Firewall (networking)" href="/wiki/Firewall_%28networking%29"&gt;firewall&lt;/a&gt;, and the like) that locks up the  partition before CHKDSK can access it. This has been improved in &lt;a class="mw-redirect" title="Windows XP Service Pack 2" href="/wiki/Windows_XP_Service_Pack_2"&gt;Windows XP Service Pack 2&lt;/a&gt;, but still  happens occasionally. One fix is to set the &lt;code&gt;/SAFEBOOT&lt;/code&gt; option in the  &lt;i&gt;&lt;a class="mw-redirect" title="Boot.ini" href="/wiki/Boot.ini"&gt;boot.ini&lt;/a&gt;&lt;/i&gt;  tab after running &lt;i&gt;&lt;a class="mw-redirect" title="Msconfig" href="/wiki/Msconfig"&gt;msconfig&lt;/a&gt;&lt;/i&gt;.&lt;sup class="reference" id="cite_ref-1"&gt;&lt;a href="#cite_note-1"&gt;&lt;span&gt;[&lt;/span&gt;2&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt; This puts the system  in a minimal/low-resolution mode.&lt;br /&gt;&lt;br /&gt;&lt;span class="mw-headline"&gt;DOS-based CHKDSK&lt;/span&gt;&lt;br /&gt;&lt;span class="mw-headline"&gt;&lt;/span&gt; &lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;&lt;span class="mw-headline"&gt;The MS-DOS 5 bug&lt;/span&gt;&lt;/h3&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;The version of CHKDSK (and &lt;a class="mw-redirect" title="Undelete" href="/wiki/Undelete"&gt;Undelete&lt;/a&gt;) supplied with &lt;a title="MS-DOS" href="/wiki/MS-DOS"&gt;MS-DOS&lt;/a&gt; 5.0 has a bug which can corrupt data. This  applies to &lt;code&gt;CHKDSK.EXE&lt;/code&gt; and &lt;code&gt;UNDELETE.EXE&lt;/code&gt; with a date of  04/09/91. If the &lt;a class="mw-redirect" title="File allocation table" href="/wiki/File_allocation_table"&gt;file allocation table&lt;/a&gt; of a disk uses 256  sectors, running &lt;code&gt;CHKDSK /F&lt;/code&gt; can cause data loss and running  &lt;code&gt;UNDELETE&lt;/code&gt; can cause unpredictable results. This normally affects  disks with a capacity of approximately a multiple of 128 MB. This bug was fixed  in MS-DOS 5.0a. A Microsoft Knowledge Base article&lt;sup class="reference" id="cite_ref-2"&gt;&lt;a href="#cite_note-2"&gt;&lt;span&gt;[&lt;/span&gt;3&lt;span&gt;]&lt;/span&gt;&lt;/a&gt;&lt;/sup&gt;  gives more details on this.&lt;/p&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Consistency checking</title><link>http://datarecovery-source.blogspot.com/2009/07/consistency-checking.html</link><author>noreply@blogger.com (raden)</author><pubDate>Mon, 6 Jul 2009 02:17:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-2806249511294815007</guid><description>&lt;div style="text-align: justify;"&gt;The first, consistency checking, involves scanning the logical structure of the disk and checking to make sure that it is consistent with its specification. For instance, in most file systems, a &lt;a href="http://en.wikipedia.org/wiki/Directory_%28file_systems%29" title="Directory (file systems)"&gt;directory&lt;/a&gt; must have at least two entries: a dot (.) entry that points to itself, and a dot-dot (..) entry that points to its parent. A file system repair program can read each directory and make sure that these entries exist and point to the correct directories. If they do not, an error message can be printed and the problem corrected. Both &lt;a href="http://en.wikipedia.org/wiki/Chkdsk" title="Chkdsk" class="mw-redirect"&gt;chkdsk&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/Fsck" title="Fsck"&gt;fsck&lt;/a&gt; work in this fashion. This strategy suffers from two major problems. First, if the file system is sufficiently damaged, the consistency check can fail completely. In this case, the repair program may crash trying to deal with the mangled input, or it may not recognize the drive as having a valid file system at all. The second issue that arises is the disregard for data files. If &lt;a href="http://en.wikipedia.org/wiki/Chkdsk" title="Chkdsk" class="mw-redirect"&gt;chkdsk&lt;/a&gt; finds a data file to be out of place or unexplainable, it may delete the file without asking. This is done so that the operating system may run smoother, but the files deleted are often important user files which cannot be replaced. Similar issues arise when using system restore disks (often provided with proprietary systems like &lt;a href="http://en.wikipedia.org/wiki/Dell" title="Dell"&gt;Dell&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/Compaq" title="Compaq"&gt;Compaq&lt;/a&gt;), which restore the operating system by removing the previous installation. This problem can often be avoided by installing the operating system on a separate partition from your user data.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Recovery techniques</title><link>http://datarecovery-source.blogspot.com/2009/07/recovery-techniques.html</link><author>noreply@blogger.com (raden)</author><pubDate>Mon, 6 Jul 2009 02:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-4689809886492180451</guid><description>&lt;div style="text-align: justify;"&gt;Two common techniques used to recover data from logical damage are consistency checking and data carving. While most logical damage can be either repaired or worked around using these two techniques, data recovery software can never guarantee that no data loss will occur. For instance, in the &lt;a href="http://en.wikipedia.org/wiki/File_allocation_table" title="File allocation table" class="mw-redirect"&gt;FAT file system&lt;/a&gt;, when two files claim to share the same allocation unit ("cross-linked"), data loss for one of the files is essentially guaranteed.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Preventing logical damage</title><link>http://datarecovery-source.blogspot.com/2009/07/preventing-logical-damage.html</link><author>noreply@blogger.com (raden)</author><pubDate>Sat, 4 Jul 2009 00:19:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-3654034467722927935</guid><description>&lt;div align="justify"&gt;The increased use of journaling file systems, such as NTFS 5.0, ext3, and XFS, is likely to reduce the incidence of logical damage. These file systems can always be "rolled back" to a consistent state, which means that the only data likely to be lost is what was in the drive's cache at the time of the system failure. However, regular system maintenance should still include the use of a consistency checker. This can protect both against bugs in the file system software and latent incompatibilities in the design of the storage hardware. One such incompatibility is the result of the disk controller reporting that file system structures have been saved to the disk when it has not actually occurred. This can often occur if the drive stores data in its write cache, then claims it has been written to the disk. If power is lost, and this data contains file system structures, the file system may be left in an inconsistent state such that the journal itself is damaged or incomplete. One solution to this problem is to use hardware that does not report data as written until it actually is written. Another is using disk controllers equipped with a battery backup so that the waiting data can be written when power is restored. Finally, the entire system can be equipped with a battery backup that may make it possible to keep the system on in such situations, or at least to give enough time to shut down properly.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Recovering data after logical damage</title><link>http://datarecovery-source.blogspot.com/2009/07/recovering-data-after-logical-damage.html</link><author>noreply@blogger.com (raden)</author><pubDate>Thu, 2 Jul 2009 02:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-893989560722035177</guid><description>&lt;div align="justify"&gt;Logical damage is primarily caused by power outages that prevent file system structures from being completely written to the storage medium, but problems with hardware (especially RAID controllers) and drivers, as well as system crashes, can have the same effect. The result is that the file system is left in an inconsistent state. This can cause a variety of problems, such as strange behavior (e.g., infinitely recursing directories, drives reporting negative amounts of free space), system crashes, or an actual loss of data. Various programs exist to correct these inconsistencies, and most operating systems come with at least a rudimentary repair tool for their native file systems. Linux, for instance, comes with the fsck utility, Mac OS X has Disk Utility and Microsoft Windows provides chkdsk. Third-party utilities such as The Coroners Toolkit and The Sleuth Kit are also available&lt;br /&gt;&lt;br /&gt;Some kinds of logical damage can be mistakenly attributed to physical damage. For instance, when a hard drive's read/write head begins to click, most end-users will associate this with internal physical damage. This is not always the case, however. Another possibility is that the firmware of the drive or its controller needs to be rebuilt in order to make the data accessible again.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Disk imaging</title><link>http://datarecovery-source.blogspot.com/2009/07/disk-imaging.html</link><author>noreply@blogger.com (raden)</author><pubDate>Thu, 2 Jul 2009 02:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-7470813676436840573</guid><description>&lt;div align="justify"&gt;The extracted raw image can be used to reconstruct usable data after any logical damage has been repaired. Once that is complete, the files may be in usable form although recovery is often incomplete.&lt;br /&gt;&lt;br /&gt;Open source tools such as DCFLdd or DOS tools such as HDClone can usually recover data from all but the physically-damaged sectors. Studies[1][2] have shown that DCFLdd v1.3.4-1 installed on a Linux 2.4 Kernel system produces extra "bad sectors" when executed with certain parameters[3], resulting in the loss of information that is actually available. These studies state that when installed on a FreeBSD Kernel system, only the bad sectors are lost. DC3dd, a tool that has superseded DCFLdd, and ddrescue resolve this issue by accessing the hardware directly[3]. Another tool that can correctly image damaged media is ILook IXImager, a tool available only to government and Law Enforcement.&lt;br /&gt;&lt;br /&gt;Typically, Hard Disk Drive data recovery imaging has the following abilities[4]: (1) Communicating with the hard drive by bypassing the BIOS and operating system which are very limited in their abilities to deal with drives that have "bad sectors" or take a long time to read. (2) Reading data from “bad sectors” rather than skipping them (by using various read commands and ECC to recreate damaged data). (3) Handling issues caused by unstable drives, such as resetting/repowering the drive when it stops responding or skipping sectors that take too long to read (read instability can be caused by minute mechanical wear and other issues). and (4) Pre-configuring drives by disabling certain features, such a SMART and G-List re-mapping, to minimize imaging time and the possibility of further drive degradation.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hardware repair</title><link>http://datarecovery-source.blogspot.com/2009/07/hardware-repair.html</link><author>noreply@blogger.com (raden)</author><pubDate>Thu, 2 Jul 2009 02:27:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-3489145059241838202</guid><description>&lt;div align="justify"&gt;Examples of physical recovery procedures are: removing a damaged PCB (printed circuit board) and replacing it with a matching PCB from a healthy drive, performing a live PCB swap (in which the System Area of the HDD is damaged on the target drive which is then instead read from the donor drive, the PCB then disconnected while still under power and transferred to the target drive), read/write head assembly with matching parts from a healthy drive, removing the hard disk platters from the original damaged drive and installing them into a healthy drive, and often a combination of all of these procedures. Some data recovery companies have procedures that are highly technical in nature and are not recommended for an untrained individual. Any of them will almost certainly void the manufacturer's warranty.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Recovery techniques</title><link>http://datarecovery-source.blogspot.com/2009/06/recovery-techniques.html</link><author>noreply@blogger.com (raden)</author><pubDate>Mon, 29 Jun 2009 08:14:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-547262109895353717</guid><description>&lt;div style="text-align: justify;"&gt;Recovering data from physically-damaged hardware can involve multiple techniques. Some damage can be repaired by replacing parts in the hard disk. This alone may make the disk usable, but there may still be logical damage. A specialized disk-imaging procedure is used to recover every readable bit from the surface. Once this image is acquired and saved on a reliable medium, the image can be safely analysed for logical damage and will possibly allow for much of the original file system to be reconstructed.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Recovering data after physical damage</title><link>http://datarecovery-source.blogspot.com/2009/06/recovering-data-after-physical-damage.html</link><author>noreply@blogger.com (raden)</author><pubDate>Mon, 29 Jun 2009 08:12:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-7894565721634064059</guid><description>&lt;div style="text-align: justify;"&gt;&lt;p&gt;A wide variety of failures can cause physical damage to storage media. &lt;a href="http://en.wikipedia.org/wiki/CD-ROM" title="CD-ROM"&gt;CD-ROMs&lt;/a&gt; can have their metallic substrate or dye layer scratched off; hard disks can suffer any of several mechanical failures, such as &lt;a href="http://en.wikipedia.org/wiki/Head_crash" title="Head crash"&gt;head crashes&lt;/a&gt; and failed motors; &lt;a href="http://en.wikipedia.org/wiki/Tape_drive" title="Tape drive"&gt;tapes&lt;/a&gt; can simply break. Physical damage always causes at least some data loss, and in many cases the logical structures of the file system are damaged as well. This causes logical damage that must be dealt with before any files can be salvaged from the failed media.&lt;/p&gt; Most physical damage cannot be repaired by end users. For example, opening a hard disk in a normal environment can allow airborne dust to settle on the platter and become caught between the platter and the &lt;a href="http://en.wikipedia.org/wiki/Read/write_head" title="Read/write head" class="mw-redirect"&gt;read/write head&lt;/a&gt;, causing new head crashes that further damage the platter and thus compromise the recovery process. Furthermore, end users generally do not have the hardware or technical expertise required to make these repairs. Consequently, costly data recovery companies are often employed to salvage important data. These firms often use "Class 100" / ISO-5 &lt;a href="http://en.wikipedia.org/wiki/Cleanroom" title="Cleanroom"&gt;cleanroom&lt;/a&gt; facilities to protect the media while repairs are being made. (Any data recovery firm without a pass certificate of ISO-5 or better will not be accepted by hard drive manufacturers for warranty purposes.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Data Recovery</title><link>http://datarecovery-source.blogspot.com/2009/06/data-recovery.html</link><author>noreply@blogger.com (raden)</author><pubDate>Mon, 29 Jun 2009 07:57:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8326810246939190194.post-1136968336297856111</guid><description>&lt;p style="text-align: justify;"&gt;&lt;b&gt;Data recovery&lt;/b&gt; is the process of salvaging data from damaged, failed, corrupted, or inaccessible &lt;a href="http://en.wikipedia.org/wiki/Computer_data_storage#Secondary_storage" title="Computer data storage"&gt;secondary storage&lt;/a&gt; media when it cannot be accessed normally. Often the data are being salvaged from storage media formats such as &lt;a href="http://en.wikipedia.org/wiki/Hard_disk_drive" title="Hard disk drive"&gt;hard disk drives&lt;/a&gt;, storage tapes, CDs, DVDs, &lt;a href="http://en.wikipedia.org/wiki/RAID" title="RAID"&gt;RAID&lt;/a&gt;, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the &lt;a href="http://en.wikipedia.org/wiki/File_system" title="File system"&gt;file system&lt;/a&gt; that prevents it from being mounted by the host &lt;a href="http://en.wikipedia.org/wiki/Operating_system" title="Operating system"&gt;operating system&lt;/a&gt;.&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;The most common "data recovery" issue involves an &lt;a href="http://en.wikipedia.org/wiki/Operating_system" title="Operating system"&gt;operating system&lt;/a&gt; (OS) failure (typically on a single-disk, single-&lt;a href="http://en.wikipedia.org/wiki/Disk_partition" title="Disk partition" class="mw-redirect"&gt;partition&lt;/a&gt;, single-OS system), where the goal is to simply copy all wanted files to another disk. This can be easily accomplished with a &lt;a href="http://en.wikipedia.org/wiki/Live_CD" title="Live CD"&gt;Live CD&lt;/a&gt;, most of which provide a means to 1) &lt;a href="http://en.wikipedia.org/wiki/Mount" title="Mount"&gt;mount&lt;/a&gt; the system drive, 2) mount and backup disk or media drives, and 3) move the files from the system to the backup with a &lt;a href="http://en.wikipedia.org/wiki/File_manager" title="File manager"&gt;file manager&lt;/a&gt; or &lt;a href="http://en.wikipedia.org/wiki/Optical_disc_authoring_software" title="Optical disc authoring software"&gt;optical disc authoring software&lt;/a&gt;. Further, such cases can be mitigated by &lt;a href="http://en.wikipedia.org/wiki/Disk_partition" title="Disk partition" class="mw-redirect"&gt;disk partitioning&lt;/a&gt; and consistently moving valuable data files to a different partition from the replaceable OS system files.&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;The second type involves a disk-level failure such as a compromised &lt;a href="http://en.wikipedia.org/wiki/File_system" title="File system"&gt;file system&lt;/a&gt;, disk partition, or a &lt;a href="http://en.wikipedia.org/wiki/Hard_disk_failure" title="Hard disk failure"&gt;hard disk failure&lt;/a&gt; —in each of which the data cannot be easily read. Depending on the case, solutions involve repairing the file system, partition table or MBR, or hard disk recovery techniques ranging from software-based recovery of corrupted data to hardware replacement on a physically damaged disk. These last two typically indicate the permanent failure of the disk, thus "recovery" means sufficient repair for a one-time recovery of files.&lt;/p&gt;&lt;div style="text-align: justify;"&gt; &lt;/div&gt;&lt;p style="text-align: justify;"&gt;A third type involves the process of retrieving files that have been &lt;a href="http://en.wikipedia.org/wiki/File_deletion" title="File deletion"&gt;deleted&lt;/a&gt; from a storage media. Although there is some confusion as to the term, the term "data recovery" may be used to refer to such cases in the context of &lt;a href="http://en.wikipedia.org/wiki/Computer_forensics" title="Computer forensics"&gt;forensic&lt;/a&gt; purposes or spying.&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>