SlideShare a Scribd company logo
1 of 2
Download to read offline
■Protect the important data on which business and operations should be based!
*HDD: hard disk drive.
●
●
●
(*Cited from the dictionary of the 3rd edition of the Evidence Preservation Guidelines)
Clone Enterprise Edition
MASAMUNE Clone Enterprise Edition is a specialized software developed by Data Salvage
for cloning the information from electronic recording media such as HDDs*.This powerful
software duplicator is designed to advance fast data recovery and preservation of
evidence required by forensic investigations.In MASAMUNE Clone Enterprise Edition, our
company which provided data recovery and forensic investigation functionality to main
Japanese enterprises, municipalities and administrative corporations, could embody
automatic elimination of read errors in electronic recording media and highly accurate
physical data recovery by our proprietary algorithm (patent pending) based on many
years of experience.
Among damaged HDDs processed for data recovery, the most common failure type is
the read errors. If a sector cannot be read as a rule it is marked as bad sector,but that
does not mean it is really a bad sector data from which cannot be recovered.There is a
possibility that such sector can still be read by a data recovery specialist with high
experience. In other words, it is not a bad(unrecoverable)sector but a sector which
contains possibly recoverable read errors. Read errors comprise more than half of all
physical damages.
Can I fix these read errors somehow and read my data?
– Software duplicator MASAMUNE Clone Enterprise Edition can answer this question.
Because software is running from CD, it does not require a special system; a common PC
on-hand can be used for disk copying which reduces work expenses.
Proprietary algorithm based on the experience of Data Salvage, implements physical data
reproduction with small number of errors using such methods as bad sector skip, reverse
reading and thorough read/retry. Additionally, the ability to detect unauthorized data
alteration using hash values* allows using the software as evidence preservation tool in
the cases of national and international lawsuits, incidents, frauds, etc, making it an
effective digital forensic tool to produce electromagnetic evidence.
*Hash values: values produced by applying a hash function (MDA-5, SHA-1, SHA-2 or
other unidirectional function) to the data of arbitrary size. Because of their ability to
produce different hash values from different input data of any size even of 1 bit hash
functions can be used to check the identity of data.
In the more and more complex digital information society, a
reliable tool to protect important data which is the core of an
organization has appeared!
Track down bad sectors (recovery impossible) and process them as
read errors(which can be recovered)!
A common PC on-hand can be used as a duplicator contributing to
work cost reduction!
Reliably supports business information protection by detectig unau-
thorized data alteration using hash values!
■Examples of practical application of the MASAMUNE Clone Enterprise Edition’s features
 
The software can be used in the following situations.
 
●Copying contents of the disks of a notebook PC which is hard to dismantle.
・Physical reproduction of data on external HDD without removing internal HDD/SDD from a slim notebook PC.
 
●Copying contents of the disks of a server PC.
・Image copies of disks from UNIX certified servers and RAID arrays can be created.
 ※Can create copies of even copy-protected storage devices.
 
●Copying contents of HDDs from old systems.
・Can support all interfaces and create physical copies of various electronic recording media.
・
 
●Field works with minimal equipment.
・
●
*Please read the user manual before using MASAMUNE Clone software.
*Depending on media condition creation of Clone may be impossible.
*Specifications and design of MASAMUNE products may be modified for improvement without prior notice.
Combining functionality of the MASAMUNE Clone Recovery Edition and MASAMUNE Clone Forensic Edition,
the software duplicator MASAMUNE Clone Enterprise Edition implements fast and accurate HDD copying
functionality required by business customers.
Linux based software running from CD allows physical reproduction of data on external HDD without
removing internal HDD from PC.
If a disk copy of an old system working in a production line is created in advance, it is safe to restart such system after mainte-
nance or even after production stop.
Because software is running from CD, it does not require a special system; a common PC on-hand can be used for
disk copying.
Depending on combination of hardware and cables, high speed of 42 GB/min (actual measured value)
can be achieved.

More Related Content

What's hot

Database failure and recovery 1
Database failure and recovery 1Database failure and recovery 1
Database failure and recovery 1vishal choudhary
 
Mis lesson5 PPT
Mis lesson5 PPTMis lesson5 PPT
Mis lesson5 PPTgeunice
 
Week6 input, output and storage devices
Week6   input, output and storage devicesWeek6   input, output and storage devices
Week6 input, output and storage devicesselcukca84
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vidpringles77
 
Types of computer
Types of computerTypes of computer
Types of computerRonak Patel
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1parulata
 
cosa ho detto nella mia presentazione in inglese
cosa ho detto nella mia presentazione in inglesecosa ho detto nella mia presentazione in inglese
cosa ho detto nella mia presentazione in ingleseMattia Gandini
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer softwareMyra Juan
 
CSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsCSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsRichard Homa
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1OriginalGSM
 
CSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageCSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageRichard Homa
 
Brochure - Stellar Data Recovery Professional for Mac
Brochure - Stellar Data Recovery Professional for MacBrochure - Stellar Data Recovery Professional for Mac
Brochure - Stellar Data Recovery Professional for MacStellar Data Recovery
 
Utility software
Utility softwareUtility software
Utility softwareadeang47
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technologyhaider ali
 
types of computer and software
types of computer and softwaretypes of computer and software
types of computer and softwareAqeel Rafique
 

What's hot (20)

Database failure and recovery 1
Database failure and recovery 1Database failure and recovery 1
Database failure and recovery 1
 
Mis lesson5 PPT
Mis lesson5 PPTMis lesson5 PPT
Mis lesson5 PPT
 
Week6 input, output and storage devices
Week6   input, output and storage devicesWeek6   input, output and storage devices
Week6 input, output and storage devices
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vid
 
Parts of the System Unit
Parts of the System UnitParts of the System Unit
Parts of the System Unit
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1
 
cosa ho detto nella mia presentazione in inglese
cosa ho detto nella mia presentazione in inglesecosa ho detto nella mia presentazione in inglese
cosa ho detto nella mia presentazione in inglese
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
 
CSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsCSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device Basics
 
Software vs hardware
Software vs hardwareSoftware vs hardware
Software vs hardware
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
CSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageCSC103 Processing, Memory & Storage
CSC103 Processing, Memory & Storage
 
Information processing cycle
Information processing cycleInformation processing cycle
Information processing cycle
 
Brochure - Stellar Data Recovery Professional for Mac
Brochure - Stellar Data Recovery Professional for MacBrochure - Stellar Data Recovery Professional for Mac
Brochure - Stellar Data Recovery Professional for Mac
 
Utility software
Utility softwareUtility software
Utility software
 
Fundamentals of information technology
Fundamentals       of          information   technologyFundamentals       of          information   technology
Fundamentals of information technology
 
types of computer and software
types of computer and softwaretypes of computer and software
types of computer and software
 

Similar to MASAMUNE Clone Enterprise Edition

MASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionMASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionHayato Abe
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its applicationABUL HASAN
 
MASAMUNE Clone
MASAMUNE CloneMASAMUNE Clone
MASAMUNE CloneHayato Abe
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It ArchitectureUMaine
 
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Programhaiderali8455
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstationsjkvr100
 
Presentation1
Presentation1Presentation1
Presentation1aterodz
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentalsPANKHURI JAIN
 
hardware software basics
hardware software basicshardware software basics
hardware software basicsDeepa Rani
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesRevolucion
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxchristinemaritza
 

Similar to MASAMUNE Clone Enterprise Edition (20)

MASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic EditionMASAMUNE Clone Forensic Edition
MASAMUNE Clone Forensic Edition
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
MASAMUNE Clone
MASAMUNE CloneMASAMUNE Clone
MASAMUNE Clone
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It Architecture
 
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year ProgramCOMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
COMP-111 Past Paper 2022 complete Solution PU BS 4 Year Program
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
Presentation1
Presentation1Presentation1
Presentation1
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
computer fundamentals
computer fundamentalscomputer fundamentals
computer fundamentals
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
A+ hand out
A+ hand outA+ hand out
A+ hand out
 
Computer Organization
Computer OrganizationComputer Organization
Computer Organization
 
Computer Organization
Computer OrganizationComputer Organization
Computer Organization
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
hardware software basics
hardware software basicshardware software basics
hardware software basics
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 

Recently uploaded

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

MASAMUNE Clone Enterprise Edition

  • 1. ■Protect the important data on which business and operations should be based! *HDD: hard disk drive. ● ● ● (*Cited from the dictionary of the 3rd edition of the Evidence Preservation Guidelines) Clone Enterprise Edition MASAMUNE Clone Enterprise Edition is a specialized software developed by Data Salvage for cloning the information from electronic recording media such as HDDs*.This powerful software duplicator is designed to advance fast data recovery and preservation of evidence required by forensic investigations.In MASAMUNE Clone Enterprise Edition, our company which provided data recovery and forensic investigation functionality to main Japanese enterprises, municipalities and administrative corporations, could embody automatic elimination of read errors in electronic recording media and highly accurate physical data recovery by our proprietary algorithm (patent pending) based on many years of experience. Among damaged HDDs processed for data recovery, the most common failure type is the read errors. If a sector cannot be read as a rule it is marked as bad sector,but that does not mean it is really a bad sector data from which cannot be recovered.There is a possibility that such sector can still be read by a data recovery specialist with high experience. In other words, it is not a bad(unrecoverable)sector but a sector which contains possibly recoverable read errors. Read errors comprise more than half of all physical damages. Can I fix these read errors somehow and read my data? – Software duplicator MASAMUNE Clone Enterprise Edition can answer this question. Because software is running from CD, it does not require a special system; a common PC on-hand can be used for disk copying which reduces work expenses. Proprietary algorithm based on the experience of Data Salvage, implements physical data reproduction with small number of errors using such methods as bad sector skip, reverse reading and thorough read/retry. Additionally, the ability to detect unauthorized data alteration using hash values* allows using the software as evidence preservation tool in the cases of national and international lawsuits, incidents, frauds, etc, making it an effective digital forensic tool to produce electromagnetic evidence. *Hash values: values produced by applying a hash function (MDA-5, SHA-1, SHA-2 or other unidirectional function) to the data of arbitrary size. Because of their ability to produce different hash values from different input data of any size even of 1 bit hash functions can be used to check the identity of data. In the more and more complex digital information society, a reliable tool to protect important data which is the core of an organization has appeared! Track down bad sectors (recovery impossible) and process them as read errors(which can be recovered)! A common PC on-hand can be used as a duplicator contributing to work cost reduction! Reliably supports business information protection by detectig unau- thorized data alteration using hash values!
  • 2. ■Examples of practical application of the MASAMUNE Clone Enterprise Edition’s features   The software can be used in the following situations.   ●Copying contents of the disks of a notebook PC which is hard to dismantle. ・Physical reproduction of data on external HDD without removing internal HDD/SDD from a slim notebook PC.   ●Copying contents of the disks of a server PC. ・Image copies of disks from UNIX certified servers and RAID arrays can be created.  ※Can create copies of even copy-protected storage devices.   ●Copying contents of HDDs from old systems. ・Can support all interfaces and create physical copies of various electronic recording media. ・   ●Field works with minimal equipment. ・ ● *Please read the user manual before using MASAMUNE Clone software. *Depending on media condition creation of Clone may be impossible. *Specifications and design of MASAMUNE products may be modified for improvement without prior notice. Combining functionality of the MASAMUNE Clone Recovery Edition and MASAMUNE Clone Forensic Edition, the software duplicator MASAMUNE Clone Enterprise Edition implements fast and accurate HDD copying functionality required by business customers. Linux based software running from CD allows physical reproduction of data on external HDD without removing internal HDD from PC. If a disk copy of an old system working in a production line is created in advance, it is safe to restart such system after mainte- nance or even after production stop. Because software is running from CD, it does not require a special system; a common PC on-hand can be used for disk copying. Depending on combination of hardware and cables, high speed of 42 GB/min (actual measured value) can be achieved.