SlideShare a Scribd company logo
SHRI M.L. KAKADIYA MCA MAHILA COLLEGE AndSHRI M.L. KAKADIYA MCA MAHILA COLLEGE And
SHRI T.R. TANTI Msc.(IT & CA) MAHILA COLLEGESHRI T.R. TANTI Msc.(IT & CA) MAHILA COLLEGE
By : Suresh HirparaBy : Suresh Hirpara
A
Seminar On
Data Recovery
ContentsContents
-What is Data?-What is Data?
-What is Data recovery?-What is Data recovery?
-What is Data Loss?-What is Data Loss?
-Some Common Computer Problems-Some Common Computer Problems
-What Causes Data Loss?-What Causes Data Loss?
-Data Recovery Tips-Data Recovery Tips
-Data Recovery Process and Techniques-Data Recovery Process and Techniques
-Software used for recovery-Software used for recovery
-Advantages and disadvantages-Advantages and disadvantages
-Summary-Summary
What is Data?
->Computer data is information processed
or stored by a computer.
->This information may be in the form of
text documents, images, audio clips,
software programs, facts stored in a
person's mind or other types of data.
->Computer data may be processed by the
computer's CPU and is stored in files and
folders on the computer's hard disk.
What is Data recovery ?
->It is the process of restoring data from
damaged, failed, corrupted, or
inaccessible secondary storage media
when it cannot be accessed normally.
->Recovery may be required due to
physical damage to the storage device or
logical damage to the file system.
What is Data Loss?What is Data Loss?
->Data has accidentally been erased or
data control structures have been
overwritten.
->Data has been corrupted or made
inaccessible.
->Data is unable to be accessed from a
previous functioning computer system or
backup.
Common Computer ProblemsCommon Computer Problems
-Computer won’t boot up-Computer won’t boot up
-Applications that are unable to run or-Applications that are unable to run or
load dataload data
-Hard drive crashes-Hard drive crashes
-Corrupt files or data-Corrupt files or data
-Accidental reformatting of partitions-Accidental reformatting of partitions
-Inaccessible drives and partitions-Inaccessible drives and partitions
What Causes Data Loss?What Causes Data Loss?
 Hardware ErrorHardware Error
 Virus AttackVirus Attack
 Software CorruptionSoftware Corruption
 Human ErrorHuman Error
 Intentional deletionIntentional deletion
 Accidental overwriting of filesAccidental overwriting of files
 Natural DisasterNatural Disaster
What Causes Data Loss?What Causes Data Loss?
How to Prevent Data LossHow to Prevent Data Loss
 Don’t upgrade hardware or softwareDon’t upgrade hardware or software
without having a backupwithout having a backup
 Physically secure your system fromPhysically secure your system from
intrudersintruders
 Use firewalls and virus protectionUse firewalls and virus protection
 Be prepared for physical disastersBe prepared for physical disasters
Possibility of Data RecoveryPossibility of Data Recovery
 The majority of data loss situations areThe majority of data loss situations are
recoverable.recoverable.
 Computer storage systems may fail, but theComputer storage systems may fail, but the
data stored on them is not always completelydata stored on them is not always completely
lost.lost.
 There are occasions when damage to data isThere are occasions when damage to data is
permanent and complete data recovery is notpermanent and complete data recovery is not
possible. However, some data is usuallypossible. However, some data is usually
always recoverable.always recoverable.
 Data recovery professionals can recover dataData recovery professionals can recover data
from crashed hard drives, operating systems,from crashed hard drives, operating systems,
storage devices, servers, desktops, andstorage devices, servers, desktops, and
laptops using various recovery tools andlaptops using various recovery tools and
techniques.techniques.
Data Recovery TipsData Recovery Tips
 DO’sDO’s
 Backup your data frequently.Backup your data frequently.
 If you believe there is something wrong withIf you believe there is something wrong with
your computer shut it down, do not continueyour computer shut it down, do not continue
to power up because you may do moreto power up because you may do more
damage.damage.
 If you here a clunk, clunk sound when youIf you here a clunk, clunk sound when you
power up the drive, shut down! Do not panicpower up the drive, shut down! Do not panic
nor turn the power button on and off.nor turn the power button on and off.
 Package the drive properly when you send itPackage the drive properly when you send it
in to a data recovery specialist. You canin to a data recovery specialist. You can
cause additional damage to the hard drive ifcause additional damage to the hard drive if
it is poorly packaged.it is poorly packaged.
Data Recovery TipsData Recovery Tips
 DON’TSDON’TS
 Do not ever assume that data recovery isDo not ever assume that data recovery is
impossible; even in the worst cases, such asimpossible; even in the worst cases, such as
natural disasters data recovery specialistsnatural disasters data recovery specialists
have been able to retrieve valuable data.have been able to retrieve valuable data.
 Never remove the cover from the hard drive;Never remove the cover from the hard drive;
this will only cause further damage.this will only cause further damage.
 Do not rest your computer on a moveableDo not rest your computer on a moveable
object or piece of furniture. Shock andobject or piece of furniture. Shock and
vibration can result in serious damage to thevibration can result in serious damage to the
hard drive.hard drive.
 Do not subject the drive to extremeDo not subject the drive to extreme
temperatures changes both hot and cold.temperatures changes both hot and cold.
 In the case where a drive has been exposedIn the case where a drive has been exposed
to water, fire or even smoke do not try toto water, fire or even smoke do not try to
power up.power up.
Data Recovery ProcessData Recovery Process
 Data loss can occur because the hard drive mayData loss can occur because the hard drive may
have problems accessing the data it contains at ahave problems accessing the data it contains at a
software or logical level.software or logical level.
 By making a complete sector copy (an exact copyBy making a complete sector copy (an exact copy
including all deleted information) of the hardincluding all deleted information) of the hard
drive, using a program such as Norton GHOST,drive, using a program such as Norton GHOST,
most data recovery programs search for deletedmost data recovery programs search for deleted
MFT (Master File Table) entries to undelete files.MFT (Master File Table) entries to undelete files.
 If the MFT is corrupt or defective, this method willIf the MFT is corrupt or defective, this method will
not work. Some data recovery programs willnot work. Some data recovery programs will
ignore the MFT and search all of the unallocatedignore the MFT and search all of the unallocated
clusters to try to find and recover files.clusters to try to find and recover files.
Data Recovery ProcessData Recovery Process
 The user may send a failed hard disk drive to aThe user may send a failed hard disk drive to a
private data recovery company that offersprivate data recovery company that offers
secure and confidential data recovery.secure and confidential data recovery.
 The data recovery company will carefullyThe data recovery company will carefully
perform part replacement of the heads, spindleperform part replacement of the heads, spindle
motor and base casting, the electronics board,motor and base casting, the electronics board,
etc. in a clean room environment.etc. in a clean room environment.
 Part replacement has historically beenPart replacement has historically been
successful for data recovery about 40%-60% ofsuccessful for data recovery about 40%-60% of
the time.the time.
Data Recovery ProcessData Recovery Process
 When data is written to a medium, the headWhen data is written to a medium, the head
sets the polarity of most, but not all of thesets the polarity of most, but not all of the
magnetic domains.magnetic domains.
 When a 1 is written to disk the mediaWhen a 1 is written to disk the media
records a 1, and when a 0 is written therecords a 1, and when a 0 is written the
media records a 0. However the actual effectmedia records a 0. However the actual effect
is closer to obtaining a 0.95 when a 0 isis closer to obtaining a 0.95 when a 0 is
overwritten with a 1, and a 1.05 when a 1 isoverwritten with a 1, and a 1.05 when a 1 is
overwritten with a 1.overwritten with a 1.
Data Recovery ProcessData Recovery Process
 Normal disk circuitry is set up so that bothNormal disk circuitry is set up so that both
these values are read as ones, but usingthese values are read as ones, but using
specialized circuitry it is possible to work outspecialized circuitry it is possible to work out
what previous "layers" contained.what previous "layers" contained.
 The recovery of at least one or two layers ofThe recovery of at least one or two layers of
overwritten data isn't too hard to perform byoverwritten data isn't too hard to perform by
reading the signal from the analog headreading the signal from the analog head
electronics with a high-quality digital samplingelectronics with a high-quality digital sampling
device, downloading the sampled waveform todevice, downloading the sampled waveform to
a PC, and analyzing it in software to recovera PC, and analyzing it in software to recover
the previously recorded signal.the previously recorded signal.
Data Recovery TechniquesData Recovery Techniques
 Scanning Probe Microscopy (SPM)Scanning Probe Microscopy (SPM)
 Magnetic Force Microscopy (MFM)Magnetic Force Microscopy (MFM)
 Scanning Tunneling MicroscopyScanning Tunneling Microscopy
(STM)(STM)
Scanning Probe MicroscopyScanning Probe Microscopy
(SPM)(SPM)
 Scanning probe microscopy (SPM) is a newScanning probe microscopy (SPM) is a new
branch ofbranch of microscopymicroscopy that forms images ofthat forms images of
surfaces using a physical probe that scans thesurfaces using a physical probe that scans the
specimen.specimen.
 An image of the surface is obtained byAn image of the surface is obtained by
mechanically moving the probe in amechanically moving the probe in a raster scanraster scan ofof
the specimen, line by line, and recording thethe specimen, line by line, and recording the
probe-surface interaction as a function ofprobe-surface interaction as a function of
position.position.
 SPM was founded with the invention of theSPM was founded with the invention of the
scanning tunneling microscopescanning tunneling microscope in 1981.in 1981.
 A technique that is used to image andA technique that is used to image and
measure surfaces at the atomic level.measure surfaces at the atomic level.
Image showing the bits of a hardImage showing the bits of a hard
diskdisk
Some important types ofSome important types of
scanning probe microscopyscanning probe microscopy
AFM,AFM, atomic force microscopyatomic force microscopy
EFM,EFM, electrostatic force microscopeelectrostatic force microscope
FMM,FMM, force modulation microscopyforce modulation microscopy
MFM,MFM, magnetic force microscopymagnetic force microscopy
STM,STM, scanning tunneling microscopyscanning tunneling microscopy
SVM, scanning voltage microscopySVM, scanning voltage microscopy
SHPM, scanning Hall probe microscopySHPM, scanning Hall probe microscopy
Software Data ExtractionSoftware Data Extraction
 Data extraction is the process of movingData extraction is the process of moving
data off of the imaged drive to anotherdata off of the imaged drive to another
destination location.destination location.
 Data extraction software scans sectors ofData extraction software scans sectors of
the hard drive and restructures the filethe hard drive and restructures the file
system either in memory or another hardsystem either in memory or another hard
drive.drive.
 The software can be used to copy theThe software can be used to copy the
recoverable data to a destination location.recoverable data to a destination location.
Software used for recoverySoftware used for recovery
 CDRoller:CDRoller: Recovers data from optical discs.Recovers data from optical discs.
 Data LifeSaver:Data LifeSaver: Data recovery for FAT and NTFS fileData recovery for FAT and NTFS file
systems.systems.
 Data Recovery Wizard:Data Recovery Wizard: Microsoft Windows file recoveryMicrosoft Windows file recovery
utility.utility.
 Drive Vaccine:Drive Vaccine: Microsoft Windows Auto Restore of files onMicrosoft Windows Auto Restore of files on
RebootReboot
 FileSalvage:FileSalvage: A Mac OS X recovery program.A Mac OS X recovery program.
 IsoBuster:IsoBuster: Recovers data from optical discs, USB sticks,Recovers data from optical discs, USB sticks,
Flash drives and Hard Drives.Flash drives and Hard Drives.
 Recuva:Recuva: Microsoft Windows 2000 & later, FAT and NTFS.Microsoft Windows 2000 & later, FAT and NTFS.
 TotalRecovery :TotalRecovery : Microsoft Windows. Bootable backup andMicrosoft Windows. Bootable backup and
recover system.recover system.
 TuneUp Utilities:TuneUp Utilities: Microsoft Windows XP & later. A suite ofMicrosoft Windows XP & later. A suite of
utilities that has a file recovery component.utilities that has a file recovery component.
 Power Data Recovery:Power Data Recovery: Data recovery software by MiniTool.Data recovery software by MiniTool.
1GB free data recovery for personal use.1GB free data recovery for personal use.
Advantages
 Software for data recovery facilities
instant recovery of misplaced data from
external HDD, PenDrive or other similar
storage devices.
 Store data for future use.
Disadvantages
 To successfully use a data recoveryTo successfully use a data recovery
tool you will need to determine thetool you will need to determine the
cause of your data loss.cause of your data loss.
 A simple reboot cause the overA simple reboot cause the over
writing of data.writing of data.
 Data security.Data security.
 Recovery may generate virus.Recovery may generate virus.
SummarySummary
 Individuals or companies may experience dataIndividuals or companies may experience data
loss at any time for many reasons.loss at any time for many reasons.
 There are various steps that should beThere are various steps that should be
implemented to help prevent data loss.implemented to help prevent data loss.
 Data loss can be very costly and veryData loss can be very costly and very
upsetting.upsetting.
 There are several data recovery techniques thatThere are several data recovery techniques that
have proven to be successful or partiallyhave proven to be successful or partially
successful in recovering data.successful in recovering data.
 Utilizing qualified professional data recoveryUtilizing qualified professional data recovery
specialists will aid in the degree of success ofspecialists will aid in the degree of success of
data recovery.data recovery.
BibliographyBibliography
 http://www.intellirecovery.com/data/recovery.htmlhttp://www.intellirecovery.com/data/recovery.html
 http://www.data-recovery-info.comhttp://www.data-recovery-info.com
 http://mechmat.caltech.edu/~kaushik/park/1-3-0.htmhttp://mechmat.caltech.edu/~kaushik/park/1-3-0.htm
 http://www.eng.yale.edu/reedlab/research/spm/spm.http://www.eng.yale.edu/reedlab/research/spm/spm.
htmlhtml
 http://www.cs.auckland.ac.nz/~pgut001/pubs/securehttp://www.cs.auckland.ac.nz/~pgut001/pubs/secure
_del.html_del.html
 http://www.ebaumsworld.comhttp://www.ebaumsworld.com
 http://www.disklabs.comhttp://www.disklabs.com
Data recovery

More Related Content

What's hot

Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
N.Jagadish Kumar
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Data recovery
Data recoveryData recovery
Data recovery
Ravi Malik
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Ramesh Ogania
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 

What's hot (20)

Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Data recovery
Data recoveryData recovery
Data recovery
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 

Viewers also liked

database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques Kalhan Liyanage
 
Database recovery
Database recoveryDatabase recovery
Database recovery
Vritti Malhotra
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
pusp220
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMSkoolkampus
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
Abdullah Khan
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IThhuihhui
 
3 phases in transactions 3 units
3 phases in transactions 3 units3 phases in transactions 3 units
3 phases in transactions 3 unitsavniS
 
Recovery Management
Recovery ManagementRecovery Management
Recovery Management
Ram Sekhar
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
wericsmith
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
emandatarecovery
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
Prannay Shahi
 

Viewers also liked (14)

database recovery techniques
database recovery techniques database recovery techniques
database recovery techniques
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
 
17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Disaster Recovery Plan for IT
Disaster Recovery Plan for ITDisaster Recovery Plan for IT
Disaster Recovery Plan for IT
 
3 phases in transactions 3 units
3 phases in transactions 3 units3 phases in transactions 3 units
3 phases in transactions 3 units
 
Recovery Management
Recovery ManagementRecovery Management
Recovery Management
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 

Similar to Data recovery

Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archiveseldige19g0
 
Mac data recovery
Mac data recoveryMac data recovery
Mac data recovery
charliedavibrown
 
Physical media damage is data recoverable from my hard drive
Physical media damage  is data recoverable from my hard drivePhysical media damage  is data recoverable from my hard drive
Physical media damage is data recoverable from my hard drive
Taking IT Mobile Data Solutions
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
efrid630
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
Ken Tucker
 
Computer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.SivakumarComputer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.Sivakumar
Sivakumar R D .
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
tutannandi
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
perry57123
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
jrm1224
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoverySejahtera Affif
 
Backups Sharing
Backups SharingBackups Sharing
Backups Sharing
btvssict
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
Four phases of data recovery
Four phases of data recoveryFour phases of data recovery
Four phases of data recoveryDolphin Data Lab
 
Backup data
Backup data Backup data
Backup data
Zaibi Gondal
 
PhpTek Ten Things to do to make your MySQL servers Happier and Healthier
PhpTek Ten Things to do to make your MySQL servers Happier and HealthierPhpTek Ten Things to do to make your MySQL servers Happier and Healthier
PhpTek Ten Things to do to make your MySQL servers Happier and Healthier
Dave Stokes
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
OriginalGSM
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
DigeratiGroup
 

Similar to Data recovery (20)

Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Mac data recovery
Mac data recoveryMac data recovery
Mac data recovery
 
Physical media damage is data recoverable from my hard drive
Physical media damage  is data recoverable from my hard drivePhysical media damage  is data recoverable from my hard drive
Physical media damage is data recoverable from my hard drive
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
1 backup
1 backup1 backup
1 backup
 
Computer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.SivakumarComputer System Oranization-R.D.Sivakumar
Computer System Oranization-R.D.Sivakumar
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Backups Sharing
Backups SharingBackups Sharing
Backups Sharing
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
Four phases of data recovery
Four phases of data recoveryFour phases of data recovery
Four phases of data recovery
 
Backup data
Backup data Backup data
Backup data
 
PhpTek Ten Things to do to make your MySQL servers Happier and Healthier
PhpTek Ten Things to do to make your MySQL servers Happier and HealthierPhpTek Ten Things to do to make your MySQL servers Happier and Healthier
PhpTek Ten Things to do to make your MySQL servers Happier and Healthier
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 

Recently uploaded

Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
AlejandraGmez176757
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
correoyaya
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
James Polillo
 

Recently uploaded (20)

Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 

Data recovery

  • 1. SHRI M.L. KAKADIYA MCA MAHILA COLLEGE AndSHRI M.L. KAKADIYA MCA MAHILA COLLEGE And SHRI T.R. TANTI Msc.(IT & CA) MAHILA COLLEGESHRI T.R. TANTI Msc.(IT & CA) MAHILA COLLEGE By : Suresh HirparaBy : Suresh Hirpara A Seminar On Data Recovery
  • 2. ContentsContents -What is Data?-What is Data? -What is Data recovery?-What is Data recovery? -What is Data Loss?-What is Data Loss? -Some Common Computer Problems-Some Common Computer Problems -What Causes Data Loss?-What Causes Data Loss? -Data Recovery Tips-Data Recovery Tips -Data Recovery Process and Techniques-Data Recovery Process and Techniques -Software used for recovery-Software used for recovery -Advantages and disadvantages-Advantages and disadvantages -Summary-Summary
  • 3. What is Data? ->Computer data is information processed or stored by a computer. ->This information may be in the form of text documents, images, audio clips, software programs, facts stored in a person's mind or other types of data. ->Computer data may be processed by the computer's CPU and is stored in files and folders on the computer's hard disk.
  • 4. What is Data recovery ? ->It is the process of restoring data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. ->Recovery may be required due to physical damage to the storage device or logical damage to the file system.
  • 5. What is Data Loss?What is Data Loss? ->Data has accidentally been erased or data control structures have been overwritten. ->Data has been corrupted or made inaccessible. ->Data is unable to be accessed from a previous functioning computer system or backup.
  • 6. Common Computer ProblemsCommon Computer Problems -Computer won’t boot up-Computer won’t boot up -Applications that are unable to run or-Applications that are unable to run or load dataload data -Hard drive crashes-Hard drive crashes -Corrupt files or data-Corrupt files or data -Accidental reformatting of partitions-Accidental reformatting of partitions -Inaccessible drives and partitions-Inaccessible drives and partitions
  • 7. What Causes Data Loss?What Causes Data Loss?  Hardware ErrorHardware Error  Virus AttackVirus Attack  Software CorruptionSoftware Corruption  Human ErrorHuman Error  Intentional deletionIntentional deletion  Accidental overwriting of filesAccidental overwriting of files  Natural DisasterNatural Disaster
  • 8. What Causes Data Loss?What Causes Data Loss?
  • 9. How to Prevent Data LossHow to Prevent Data Loss  Don’t upgrade hardware or softwareDon’t upgrade hardware or software without having a backupwithout having a backup  Physically secure your system fromPhysically secure your system from intrudersintruders  Use firewalls and virus protectionUse firewalls and virus protection  Be prepared for physical disastersBe prepared for physical disasters
  • 10. Possibility of Data RecoveryPossibility of Data Recovery  The majority of data loss situations areThe majority of data loss situations are recoverable.recoverable.  Computer storage systems may fail, but theComputer storage systems may fail, but the data stored on them is not always completelydata stored on them is not always completely lost.lost.  There are occasions when damage to data isThere are occasions when damage to data is permanent and complete data recovery is notpermanent and complete data recovery is not possible. However, some data is usuallypossible. However, some data is usually always recoverable.always recoverable.  Data recovery professionals can recover dataData recovery professionals can recover data from crashed hard drives, operating systems,from crashed hard drives, operating systems, storage devices, servers, desktops, andstorage devices, servers, desktops, and laptops using various recovery tools andlaptops using various recovery tools and techniques.techniques.
  • 11. Data Recovery TipsData Recovery Tips  DO’sDO’s  Backup your data frequently.Backup your data frequently.  If you believe there is something wrong withIf you believe there is something wrong with your computer shut it down, do not continueyour computer shut it down, do not continue to power up because you may do moreto power up because you may do more damage.damage.  If you here a clunk, clunk sound when youIf you here a clunk, clunk sound when you power up the drive, shut down! Do not panicpower up the drive, shut down! Do not panic nor turn the power button on and off.nor turn the power button on and off.  Package the drive properly when you send itPackage the drive properly when you send it in to a data recovery specialist. You canin to a data recovery specialist. You can cause additional damage to the hard drive ifcause additional damage to the hard drive if it is poorly packaged.it is poorly packaged.
  • 12. Data Recovery TipsData Recovery Tips  DON’TSDON’TS  Do not ever assume that data recovery isDo not ever assume that data recovery is impossible; even in the worst cases, such asimpossible; even in the worst cases, such as natural disasters data recovery specialistsnatural disasters data recovery specialists have been able to retrieve valuable data.have been able to retrieve valuable data.  Never remove the cover from the hard drive;Never remove the cover from the hard drive; this will only cause further damage.this will only cause further damage.  Do not rest your computer on a moveableDo not rest your computer on a moveable object or piece of furniture. Shock andobject or piece of furniture. Shock and vibration can result in serious damage to thevibration can result in serious damage to the hard drive.hard drive.  Do not subject the drive to extremeDo not subject the drive to extreme temperatures changes both hot and cold.temperatures changes both hot and cold.  In the case where a drive has been exposedIn the case where a drive has been exposed to water, fire or even smoke do not try toto water, fire or even smoke do not try to power up.power up.
  • 13. Data Recovery ProcessData Recovery Process  Data loss can occur because the hard drive mayData loss can occur because the hard drive may have problems accessing the data it contains at ahave problems accessing the data it contains at a software or logical level.software or logical level.  By making a complete sector copy (an exact copyBy making a complete sector copy (an exact copy including all deleted information) of the hardincluding all deleted information) of the hard drive, using a program such as Norton GHOST,drive, using a program such as Norton GHOST, most data recovery programs search for deletedmost data recovery programs search for deleted MFT (Master File Table) entries to undelete files.MFT (Master File Table) entries to undelete files.  If the MFT is corrupt or defective, this method willIf the MFT is corrupt or defective, this method will not work. Some data recovery programs willnot work. Some data recovery programs will ignore the MFT and search all of the unallocatedignore the MFT and search all of the unallocated clusters to try to find and recover files.clusters to try to find and recover files.
  • 14. Data Recovery ProcessData Recovery Process  The user may send a failed hard disk drive to aThe user may send a failed hard disk drive to a private data recovery company that offersprivate data recovery company that offers secure and confidential data recovery.secure and confidential data recovery.  The data recovery company will carefullyThe data recovery company will carefully perform part replacement of the heads, spindleperform part replacement of the heads, spindle motor and base casting, the electronics board,motor and base casting, the electronics board, etc. in a clean room environment.etc. in a clean room environment.  Part replacement has historically beenPart replacement has historically been successful for data recovery about 40%-60% ofsuccessful for data recovery about 40%-60% of the time.the time.
  • 15. Data Recovery ProcessData Recovery Process  When data is written to a medium, the headWhen data is written to a medium, the head sets the polarity of most, but not all of thesets the polarity of most, but not all of the magnetic domains.magnetic domains.  When a 1 is written to disk the mediaWhen a 1 is written to disk the media records a 1, and when a 0 is written therecords a 1, and when a 0 is written the media records a 0. However the actual effectmedia records a 0. However the actual effect is closer to obtaining a 0.95 when a 0 isis closer to obtaining a 0.95 when a 0 is overwritten with a 1, and a 1.05 when a 1 isoverwritten with a 1, and a 1.05 when a 1 is overwritten with a 1.overwritten with a 1.
  • 16. Data Recovery ProcessData Recovery Process  Normal disk circuitry is set up so that bothNormal disk circuitry is set up so that both these values are read as ones, but usingthese values are read as ones, but using specialized circuitry it is possible to work outspecialized circuitry it is possible to work out what previous "layers" contained.what previous "layers" contained.  The recovery of at least one or two layers ofThe recovery of at least one or two layers of overwritten data isn't too hard to perform byoverwritten data isn't too hard to perform by reading the signal from the analog headreading the signal from the analog head electronics with a high-quality digital samplingelectronics with a high-quality digital sampling device, downloading the sampled waveform todevice, downloading the sampled waveform to a PC, and analyzing it in software to recovera PC, and analyzing it in software to recover the previously recorded signal.the previously recorded signal.
  • 17. Data Recovery TechniquesData Recovery Techniques  Scanning Probe Microscopy (SPM)Scanning Probe Microscopy (SPM)  Magnetic Force Microscopy (MFM)Magnetic Force Microscopy (MFM)  Scanning Tunneling MicroscopyScanning Tunneling Microscopy (STM)(STM)
  • 18. Scanning Probe MicroscopyScanning Probe Microscopy (SPM)(SPM)  Scanning probe microscopy (SPM) is a newScanning probe microscopy (SPM) is a new branch ofbranch of microscopymicroscopy that forms images ofthat forms images of surfaces using a physical probe that scans thesurfaces using a physical probe that scans the specimen.specimen.  An image of the surface is obtained byAn image of the surface is obtained by mechanically moving the probe in amechanically moving the probe in a raster scanraster scan ofof the specimen, line by line, and recording thethe specimen, line by line, and recording the probe-surface interaction as a function ofprobe-surface interaction as a function of position.position.
  • 19.  SPM was founded with the invention of theSPM was founded with the invention of the scanning tunneling microscopescanning tunneling microscope in 1981.in 1981.  A technique that is used to image andA technique that is used to image and measure surfaces at the atomic level.measure surfaces at the atomic level.
  • 20. Image showing the bits of a hardImage showing the bits of a hard diskdisk
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Some important types ofSome important types of scanning probe microscopyscanning probe microscopy AFM,AFM, atomic force microscopyatomic force microscopy EFM,EFM, electrostatic force microscopeelectrostatic force microscope FMM,FMM, force modulation microscopyforce modulation microscopy MFM,MFM, magnetic force microscopymagnetic force microscopy STM,STM, scanning tunneling microscopyscanning tunneling microscopy SVM, scanning voltage microscopySVM, scanning voltage microscopy SHPM, scanning Hall probe microscopySHPM, scanning Hall probe microscopy
  • 26. Software Data ExtractionSoftware Data Extraction  Data extraction is the process of movingData extraction is the process of moving data off of the imaged drive to anotherdata off of the imaged drive to another destination location.destination location.  Data extraction software scans sectors ofData extraction software scans sectors of the hard drive and restructures the filethe hard drive and restructures the file system either in memory or another hardsystem either in memory or another hard drive.drive.  The software can be used to copy theThe software can be used to copy the recoverable data to a destination location.recoverable data to a destination location.
  • 27. Software used for recoverySoftware used for recovery  CDRoller:CDRoller: Recovers data from optical discs.Recovers data from optical discs.  Data LifeSaver:Data LifeSaver: Data recovery for FAT and NTFS fileData recovery for FAT and NTFS file systems.systems.  Data Recovery Wizard:Data Recovery Wizard: Microsoft Windows file recoveryMicrosoft Windows file recovery utility.utility.  Drive Vaccine:Drive Vaccine: Microsoft Windows Auto Restore of files onMicrosoft Windows Auto Restore of files on RebootReboot  FileSalvage:FileSalvage: A Mac OS X recovery program.A Mac OS X recovery program.  IsoBuster:IsoBuster: Recovers data from optical discs, USB sticks,Recovers data from optical discs, USB sticks, Flash drives and Hard Drives.Flash drives and Hard Drives.  Recuva:Recuva: Microsoft Windows 2000 & later, FAT and NTFS.Microsoft Windows 2000 & later, FAT and NTFS.  TotalRecovery :TotalRecovery : Microsoft Windows. Bootable backup andMicrosoft Windows. Bootable backup and recover system.recover system.  TuneUp Utilities:TuneUp Utilities: Microsoft Windows XP & later. A suite ofMicrosoft Windows XP & later. A suite of utilities that has a file recovery component.utilities that has a file recovery component.  Power Data Recovery:Power Data Recovery: Data recovery software by MiniTool.Data recovery software by MiniTool. 1GB free data recovery for personal use.1GB free data recovery for personal use.
  • 28. Advantages  Software for data recovery facilities instant recovery of misplaced data from external HDD, PenDrive or other similar storage devices.  Store data for future use.
  • 29. Disadvantages  To successfully use a data recoveryTo successfully use a data recovery tool you will need to determine thetool you will need to determine the cause of your data loss.cause of your data loss.  A simple reboot cause the overA simple reboot cause the over writing of data.writing of data.  Data security.Data security.  Recovery may generate virus.Recovery may generate virus.
  • 30. SummarySummary  Individuals or companies may experience dataIndividuals or companies may experience data loss at any time for many reasons.loss at any time for many reasons.  There are various steps that should beThere are various steps that should be implemented to help prevent data loss.implemented to help prevent data loss.  Data loss can be very costly and veryData loss can be very costly and very upsetting.upsetting.  There are several data recovery techniques thatThere are several data recovery techniques that have proven to be successful or partiallyhave proven to be successful or partially successful in recovering data.successful in recovering data.  Utilizing qualified professional data recoveryUtilizing qualified professional data recovery specialists will aid in the degree of success ofspecialists will aid in the degree of success of data recovery.data recovery.
  • 31.
  • 32. BibliographyBibliography  http://www.intellirecovery.com/data/recovery.htmlhttp://www.intellirecovery.com/data/recovery.html  http://www.data-recovery-info.comhttp://www.data-recovery-info.com  http://mechmat.caltech.edu/~kaushik/park/1-3-0.htmhttp://mechmat.caltech.edu/~kaushik/park/1-3-0.htm  http://www.eng.yale.edu/reedlab/research/spm/spm.http://www.eng.yale.edu/reedlab/research/spm/spm. htmlhtml  http://www.cs.auckland.ac.nz/~pgut001/pubs/securehttp://www.cs.auckland.ac.nz/~pgut001/pubs/secure _del.html_del.html  http://www.ebaumsworld.comhttp://www.ebaumsworld.com  http://www.disklabs.comhttp://www.disklabs.com