SlideShare a Scribd company logo
1 of 17
Data Recovery
Aakash Mehta     Bhaumik Chaudhari
  10IT026           10IT053

     Shankersinh Vaghela Bapu
       Institute Of Technology
            Nov 22nd, 2012
Overview
   What is Data Recovery?
   Disk Structure
   Software used
   Real World Uses
   Advantages & Disadvantages
   Demo

                Shankersinh Vaghela Bapu
                 Institute Of Technology   2
What is data recovery?
   Retrieving deleted/inaccessible data from electronic
    storage media (hard drives, removable media, optical
    devices, etc...)


   Typical causes of loss include:
       Computer Virus
       Data Corruption
       Computer Crime
       Human Error


                          Shankersinh Vaghela Bapu
                           Institute Of Technology         3
Disk Structure
   A. Track

   B. Geometrical Sector

   C. Track Sector

   D. Cluster
                   Shankersinh Vaghela Bapu
                    Institute Of Technology   4
Several forms of Disk Storage


   Comparison of several
    forms of disk storage
    showing tracks.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology   5
How data is Stored ?
   Data is stored into magnetic blocks which are in
    sectors.
   Every time you format HDD, new layer is
    created.
   With the increase of layers memory blocks are
    also increased and it results to variations in data
    transfer(Speed Decrease, Memory consumption
    high).

                     Shankersinh Vaghela Bapu
                      Institute Of Technology         6
How Data Is Recovered?
   At the First time Low Level Format(LLF) is
    performed on the hard disk, the disk’s platters
    start out empty. That’s the last time the platters
    will be empty for the life of the drive.
   If an LLF is done on a disk with data on it
    already, the data is permanently erased.
   The type of formatting that most users are
    familiar with is called high-level formatting and it
    is the process of setting up an empty file system.
                     Shankersinh Vaghela Bapu
                      Institute Of Technology          7
How Data Is Recovered?
   Data stored on the hard drive is not physically
    deleted during formatting.
   The hard drive is re-organized and the table with
    information where files are stored is reset.
   As long as the file system and its settings remain
    the same, none of the actual data previously
    stored on the hard drive is deleted or overwritten
    can subsequently be recovered.

                    Shankersinh Vaghela Bapu
                     Institute Of Technology         8
How Data Is Recovered?
   When Data is overwritten, the magnetic domains
    on the HDD are re-magnetized.
   This is an irreversible process that physically
    removes information previously stored in this
    location. 
   This would require the use of a Magnetic force
    microscopy (MFM) or similar technologies, to
    recover overwritten data successfully.
   There is no software or other technical way
    known to the public that can restore overwritten
    data.             Shankersinh Vaghela Bapu
                       Institute Of Technology       9
Software For Data Recovery
   Stellar Phoenix Windows Data Recovery

   Stellar phoenix Linux Data Recovery

   Get Data Back-NTFS

   Get Data Back-FAT

                   Shankersinh Vaghela Bapu
                    Institute Of Technology   10
Operating Systems
   Helix:
-   Helix is a Linux based forensics operating
    system.
-   It is combined system used to analyse the file
    system and also generates the reports.
   Encase:
-   It is also very rich utility designed for the
    professionals.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         11
Real World Uses
   Average User:
       Recover important lost files
       Keep your private information private
   Law enforcement:
       Locate illegal data
       Restore deleted/overwritten information.
       Prosecute criminals based on discovered data

                     Shankersinh Vaghela Bapu
                      Institute Of Technology     12
Advantages
   Recover important data easily by using various
    software.

   If you work for an organization than your data
    should be most important and you need to
    recover at any cost if it is lost.

   Recover your personal photo's, files and etc
    which is precious to you.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         13
Disadvantages
   There is no surety that all of the lost data can be
    recovered.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology         14
Private Recovery Services
   Many private companies offer quick, secure, and
    confidential data recovery:
       Computer Disk Service http://www.compdisk.com
            20 GB from $195.00
            46 GB and up – from $895.00
       Action Front http://www.datarec.com/
            External cases - $500 to $1500
            Internal cases -$2500 to $4000 for a single hard drive
            Critical Response services start at $5,000.
       Data Recovery Services -
        http://www.datarecovery.net/
                             Shankersinh Vaghela Bapu
                              Institute Of Technology                 15
References
   "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.
    "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13
    October 2012.
    Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box.
    Retrieved 29 February 2012.
    Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of
    Computer Science, University of Auckland
    Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center
    Feenberg, Daniel (14 May 2004). 
    "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau
    of Economic Research. Retrieved 21 May 2008.
   Data Removal and Erasure from Hard Disk Drives
    "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.
    "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18
    March 2009.
    Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .
    "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011.
                                     Shankersinh Vaghela Bapu
                                      Institute Of Technology                                        16
QUESTIONS?




 Shankersinh Vaghela Bapu
  Institute Of Technology   17

More Related Content

What's hot

03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
Sunil Kumar
 

What's hot (20)

Data recovery
Data recoveryData recovery
Data recovery
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic science
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 

Viewers also liked

The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
skyhighphoto83
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
tablet presentation
tablet presentationtablet presentation
tablet presentation
Anju K John
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computer
shafia Nadeem
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (13)

Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
 
Tablet PC
Tablet PCTablet PC
Tablet PC
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
tablet presentation
tablet presentationtablet presentation
tablet presentation
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computer
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Data recovery

ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
Manuel Garza
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
eldige19g0
 
computer forensics
computer forensicscomputer forensics
computer forensics
Akhil Kumar
 

Similar to Data recovery (20)

F1805023942
F1805023942F1805023942
F1805023942
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
 
CSE4004_Module4_1.pptx
CSE4004_Module4_1.pptxCSE4004_Module4_1.pptx
CSE4004_Module4_1.pptx
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
CSE4004_Module2_1.pptx
CSE4004_Module2_1.pptxCSE4004_Module2_1.pptx
CSE4004_Module2_1.pptx
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
test
testtest
test
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangement
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
data recovery-raid
data recovery-raiddata recovery-raid
data recovery-raid
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storage
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Data recovery

  • 1. Data Recovery Aakash Mehta Bhaumik Chaudhari 10IT026 10IT053 Shankersinh Vaghela Bapu Institute Of Technology Nov 22nd, 2012
  • 2. Overview  What is Data Recovery?  Disk Structure  Software used  Real World Uses  Advantages & Disadvantages  Demo Shankersinh Vaghela Bapu Institute Of Technology 2
  • 3. What is data recovery?  Retrieving deleted/inaccessible data from electronic storage media (hard drives, removable media, optical devices, etc...)  Typical causes of loss include:  Computer Virus  Data Corruption  Computer Crime  Human Error Shankersinh Vaghela Bapu Institute Of Technology 3
  • 4. Disk Structure  A. Track  B. Geometrical Sector  C. Track Sector  D. Cluster Shankersinh Vaghela Bapu Institute Of Technology 4
  • 5. Several forms of Disk Storage  Comparison of several forms of disk storage showing tracks. Shankersinh Vaghela Bapu Institute Of Technology 5
  • 6. How data is Stored ?  Data is stored into magnetic blocks which are in sectors.  Every time you format HDD, new layer is created.  With the increase of layers memory blocks are also increased and it results to variations in data transfer(Speed Decrease, Memory consumption high). Shankersinh Vaghela Bapu Institute Of Technology 6
  • 7. How Data Is Recovered?  At the First time Low Level Format(LLF) is performed on the hard disk, the disk’s platters start out empty. That’s the last time the platters will be empty for the life of the drive.  If an LLF is done on a disk with data on it already, the data is permanently erased.  The type of formatting that most users are familiar with is called high-level formatting and it is the process of setting up an empty file system. Shankersinh Vaghela Bapu Institute Of Technology 7
  • 8. How Data Is Recovered?  Data stored on the hard drive is not physically deleted during formatting.  The hard drive is re-organized and the table with information where files are stored is reset.  As long as the file system and its settings remain the same, none of the actual data previously stored on the hard drive is deleted or overwritten can subsequently be recovered. Shankersinh Vaghela Bapu Institute Of Technology 8
  • 9. How Data Is Recovered?  When Data is overwritten, the magnetic domains on the HDD are re-magnetized.  This is an irreversible process that physically removes information previously stored in this location.   This would require the use of a Magnetic force microscopy (MFM) or similar technologies, to recover overwritten data successfully.  There is no software or other technical way known to the public that can restore overwritten data. Shankersinh Vaghela Bapu Institute Of Technology 9
  • 10. Software For Data Recovery  Stellar Phoenix Windows Data Recovery  Stellar phoenix Linux Data Recovery  Get Data Back-NTFS  Get Data Back-FAT Shankersinh Vaghela Bapu Institute Of Technology 10
  • 11. Operating Systems  Helix: - Helix is a Linux based forensics operating system. - It is combined system used to analyse the file system and also generates the reports.  Encase: - It is also very rich utility designed for the professionals. Shankersinh Vaghela Bapu Institute Of Technology 11
  • 12. Real World Uses  Average User:  Recover important lost files  Keep your private information private  Law enforcement:  Locate illegal data  Restore deleted/overwritten information.  Prosecute criminals based on discovered data Shankersinh Vaghela Bapu Institute Of Technology 12
  • 13. Advantages  Recover important data easily by using various software.  If you work for an organization than your data should be most important and you need to recover at any cost if it is lost.  Recover your personal photo's, files and etc which is precious to you. Shankersinh Vaghela Bapu Institute Of Technology 13
  • 14. Disadvantages  There is no surety that all of the lost data can be recovered. Shankersinh Vaghela Bapu Institute Of Technology 14
  • 15. Private Recovery Services  Many private companies offer quick, secure, and confidential data recovery:  Computer Disk Service http://www.compdisk.com  20 GB from $195.00  46 GB and up – from $895.00  Action Front http://www.datarec.com/  External cases - $500 to $1500  Internal cases -$2500 to $4000 for a single hard drive  Critical Response services start at $5,000.  Data Recovery Services - http://www.datarecovery.net/ Shankersinh Vaghela Bapu Institute Of Technology 15
  • 16. References  "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.   "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13 October 2012.   Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box. Retrieved 29 February 2012.   Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of Computer Science, University of Auckland   Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center   Feenberg, Daniel (14 May 2004).  "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau of Economic Research. Retrieved 21 May 2008.  Data Removal and Erasure from Hard Disk Drives   "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.   "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18 March 2009.   Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .   "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011. Shankersinh Vaghela Bapu Institute Of Technology 16
  • 17. QUESTIONS? Shankersinh Vaghela Bapu Institute Of Technology 17