SlideShare a Scribd company logo
1 of 17
Data Recovery
Aakash Mehta     Bhaumik Chaudhari
  10IT026           10IT053

     Shankersinh Vaghela Bapu
       Institute Of Technology
            Nov 22nd, 2012
Overview
   What is Data Recovery?
   Disk Structure
   Software used
   Real World Uses
   Advantages & Disadvantages
   Demo

                Shankersinh Vaghela Bapu
                 Institute Of Technology   2
What is data recovery?
   Retrieving deleted/inaccessible data from electronic
    storage media (hard drives, removable media, optical
    devices, etc...)


   Typical causes of loss include:
       Computer Virus
       Data Corruption
       Computer Crime
       Human Error


                          Shankersinh Vaghela Bapu
                           Institute Of Technology         3
Disk Structure
   A. Track

   B. Geometrical Sector

   C. Track Sector

   D. Cluster
                   Shankersinh Vaghela Bapu
                    Institute Of Technology   4
Several forms of Disk Storage


   Comparison of several
    forms of disk storage
    showing tracks.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology   5
How data is Stored ?
   Data is stored into magnetic blocks which are in
    sectors.
   Every time you format HDD, new layer is
    created.
   With the increase of layers memory blocks are
    also increased and it results to variations in data
    transfer(Speed Decrease, Memory consumption
    high).

                     Shankersinh Vaghela Bapu
                      Institute Of Technology         6
How Data Is Recovered?
   At the First time Low Level Format(LLF) is
    performed on the hard disk, the disk’s platters
    start out empty. That’s the last time the platters
    will be empty for the life of the drive.
   If an LLF is done on a disk with data on it
    already, the data is permanently erased.
   The type of formatting that most users are
    familiar with is called high-level formatting and it
    is the process of setting up an empty file system.
                     Shankersinh Vaghela Bapu
                      Institute Of Technology          7
How Data Is Recovered?
   Data stored on the hard drive is not physically
    deleted during formatting.
   The hard drive is re-organized and the table with
    information where files are stored is reset.
   As long as the file system and its settings remain
    the same, none of the actual data previously
    stored on the hard drive is deleted or overwritten
    can subsequently be recovered.

                    Shankersinh Vaghela Bapu
                     Institute Of Technology         8
How Data Is Recovered?
   When Data is overwritten, the magnetic domains
    on the HDD are re-magnetized.
   This is an irreversible process that physically
    removes information previously stored in this
    location. 
   This would require the use of a Magnetic force
    microscopy (MFM) or similar technologies, to
    recover overwritten data successfully.
   There is no software or other technical way
    known to the public that can restore overwritten
    data.             Shankersinh Vaghela Bapu
                       Institute Of Technology       9
Software For Data Recovery
   Stellar Phoenix Windows Data Recovery

   Stellar phoenix Linux Data Recovery

   Get Data Back-NTFS

   Get Data Back-FAT

                   Shankersinh Vaghela Bapu
                    Institute Of Technology   10
Operating Systems
   Helix:
-   Helix is a Linux based forensics operating
    system.
-   It is combined system used to analyse the file
    system and also generates the reports.
   Encase:
-   It is also very rich utility designed for the
    professionals.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         11
Real World Uses
   Average User:
       Recover important lost files
       Keep your private information private
   Law enforcement:
       Locate illegal data
       Restore deleted/overwritten information.
       Prosecute criminals based on discovered data

                     Shankersinh Vaghela Bapu
                      Institute Of Technology     12
Advantages
   Recover important data easily by using various
    software.

   If you work for an organization than your data
    should be most important and you need to
    recover at any cost if it is lost.

   Recover your personal photo's, files and etc
    which is precious to you.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         13
Disadvantages
   There is no surety that all of the lost data can be
    recovered.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology         14
Private Recovery Services
   Many private companies offer quick, secure, and
    confidential data recovery:
       Computer Disk Service http://www.compdisk.com
            20 GB from $195.00
            46 GB and up – from $895.00
       Action Front http://www.datarec.com/
            External cases - $500 to $1500
            Internal cases -$2500 to $4000 for a single hard drive
            Critical Response services start at $5,000.
       Data Recovery Services -
        http://www.datarecovery.net/
                             Shankersinh Vaghela Bapu
                              Institute Of Technology                 15
References
   "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.
    "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13
    October 2012.
    Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box.
    Retrieved 29 February 2012.
    Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of
    Computer Science, University of Auckland
    Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center
    Feenberg, Daniel (14 May 2004). 
    "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau
    of Economic Research. Retrieved 21 May 2008.
   Data Removal and Erasure from Hard Disk Drives
    "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.
    "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18
    March 2009.
    Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .
    "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011.
                                     Shankersinh Vaghela Bapu
                                      Institute Of Technology                                        16
QUESTIONS?




 Shankersinh Vaghela Bapu
  Institute Of Technology   17

More Related Content

What's hot

Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage deviceMohit Shah
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic sciencevenati munishareddy
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 

What's hot (20)

Data recovery
Data recoveryData recovery
Data recovery
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic science
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 

Viewers also liked

Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery processemandatarecovery
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Prannay Shahi
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT Abdullah Khan
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computersskyhighphoto83
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computersguest19ab3c
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
tablet presentation
tablet presentationtablet presentation
tablet presentationAnju K John
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData Recovery
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computershafia Nadeem
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (13)

Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
 
Tablet PC
Tablet PCTablet PC
Tablet PC
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
tablet presentation
tablet presentationtablet presentation
tablet presentation
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computer
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Data recovery

ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435Manuel Garza
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayDaniel Nilles
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...ijsrd.com
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archiveseldige19g0
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangementGuy Coates
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storageOwen Funnell
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation Aditya Nag
 

Similar to Data recovery (20)

F1805023942
F1805023942F1805023942
F1805023942
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
 
CSE4004_Module4_1.pptx
CSE4004_Module4_1.pptxCSE4004_Module4_1.pptx
CSE4004_Module4_1.pptx
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
CSE4004_Module2_1.pptx
CSE4004_Module2_1.pptxCSE4004_Module2_1.pptx
CSE4004_Module2_1.pptx
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
test
testtest
test
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangement
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
data recovery-raid
data recovery-raiddata recovery-raid
data recovery-raid
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storage
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Data recovery

  • 1. Data Recovery Aakash Mehta Bhaumik Chaudhari 10IT026 10IT053 Shankersinh Vaghela Bapu Institute Of Technology Nov 22nd, 2012
  • 2. Overview  What is Data Recovery?  Disk Structure  Software used  Real World Uses  Advantages & Disadvantages  Demo Shankersinh Vaghela Bapu Institute Of Technology 2
  • 3. What is data recovery?  Retrieving deleted/inaccessible data from electronic storage media (hard drives, removable media, optical devices, etc...)  Typical causes of loss include:  Computer Virus  Data Corruption  Computer Crime  Human Error Shankersinh Vaghela Bapu Institute Of Technology 3
  • 4. Disk Structure  A. Track  B. Geometrical Sector  C. Track Sector  D. Cluster Shankersinh Vaghela Bapu Institute Of Technology 4
  • 5. Several forms of Disk Storage  Comparison of several forms of disk storage showing tracks. Shankersinh Vaghela Bapu Institute Of Technology 5
  • 6. How data is Stored ?  Data is stored into magnetic blocks which are in sectors.  Every time you format HDD, new layer is created.  With the increase of layers memory blocks are also increased and it results to variations in data transfer(Speed Decrease, Memory consumption high). Shankersinh Vaghela Bapu Institute Of Technology 6
  • 7. How Data Is Recovered?  At the First time Low Level Format(LLF) is performed on the hard disk, the disk’s platters start out empty. That’s the last time the platters will be empty for the life of the drive.  If an LLF is done on a disk with data on it already, the data is permanently erased.  The type of formatting that most users are familiar with is called high-level formatting and it is the process of setting up an empty file system. Shankersinh Vaghela Bapu Institute Of Technology 7
  • 8. How Data Is Recovered?  Data stored on the hard drive is not physically deleted during formatting.  The hard drive is re-organized and the table with information where files are stored is reset.  As long as the file system and its settings remain the same, none of the actual data previously stored on the hard drive is deleted or overwritten can subsequently be recovered. Shankersinh Vaghela Bapu Institute Of Technology 8
  • 9. How Data Is Recovered?  When Data is overwritten, the magnetic domains on the HDD are re-magnetized.  This is an irreversible process that physically removes information previously stored in this location.   This would require the use of a Magnetic force microscopy (MFM) or similar technologies, to recover overwritten data successfully.  There is no software or other technical way known to the public that can restore overwritten data. Shankersinh Vaghela Bapu Institute Of Technology 9
  • 10. Software For Data Recovery  Stellar Phoenix Windows Data Recovery  Stellar phoenix Linux Data Recovery  Get Data Back-NTFS  Get Data Back-FAT Shankersinh Vaghela Bapu Institute Of Technology 10
  • 11. Operating Systems  Helix: - Helix is a Linux based forensics operating system. - It is combined system used to analyse the file system and also generates the reports.  Encase: - It is also very rich utility designed for the professionals. Shankersinh Vaghela Bapu Institute Of Technology 11
  • 12. Real World Uses  Average User:  Recover important lost files  Keep your private information private  Law enforcement:  Locate illegal data  Restore deleted/overwritten information.  Prosecute criminals based on discovered data Shankersinh Vaghela Bapu Institute Of Technology 12
  • 13. Advantages  Recover important data easily by using various software.  If you work for an organization than your data should be most important and you need to recover at any cost if it is lost.  Recover your personal photo's, files and etc which is precious to you. Shankersinh Vaghela Bapu Institute Of Technology 13
  • 14. Disadvantages  There is no surety that all of the lost data can be recovered. Shankersinh Vaghela Bapu Institute Of Technology 14
  • 15. Private Recovery Services  Many private companies offer quick, secure, and confidential data recovery:  Computer Disk Service http://www.compdisk.com  20 GB from $195.00  46 GB and up – from $895.00  Action Front http://www.datarec.com/  External cases - $500 to $1500  Internal cases -$2500 to $4000 for a single hard drive  Critical Response services start at $5,000.  Data Recovery Services - http://www.datarecovery.net/ Shankersinh Vaghela Bapu Institute Of Technology 15
  • 16. References  "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.   "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13 October 2012.   Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box. Retrieved 29 February 2012.   Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of Computer Science, University of Auckland   Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center   Feenberg, Daniel (14 May 2004).  "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau of Economic Research. Retrieved 21 May 2008.  Data Removal and Erasure from Hard Disk Drives   "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.   "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18 March 2009.   Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .   "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011. Shankersinh Vaghela Bapu Institute Of Technology 16
  • 17. QUESTIONS? Shankersinh Vaghela Bapu Institute Of Technology 17