SlideShare a Scribd company logo
CSD AMU ALIGARH
Data Recovery
By:
Rohit Gupta
2015 MCA15
Content
1. Data Loss
1.1 What is data Loss ?
1.2 What causes Data Loss & How to
prevent data Loss ?
2. Data Recovery
2.1 What is Data Recovery ?
2.2 How can it be used ?
3. Data Recovery Techniques
3.1 Software Data Recovery
3.2 Hardware Data Recovery
4. Conclusion
5. Future Scope
CSD AMU ALIGARH
What is Data Loss?
• Data has accidentally been erased or data
control structures have been overwritten.
• Data has been corrupted or made
inaccessible.
• Data loss is distinguished from data
unavailability
CSD AMU ALIGARH
What Causes Data Loss
and
Preventions
CSD AMU ALIGARH
What Causes Data Loss?
• Hardware and System problems
• Software corruption or application error
• Virus Attacks
• Human Error
– Accidental deletion
– Accidental overwriting of files
• Natural Disaster
CSD AMU ALIGARH
Data loss and Preventions
CSD AMU ALIGARH
• Head Crash
the read/write heads of a hard drive
come into physical contact with the
media surface.
Indications:
Unusual noise omitting from the
hard drive – clicking, grinding or
scraping.
What to do?
Shut down the computer
immediately
• Power Surge
Extreme power fluctuations may
severely damage media electronics and
directly effect a drive’s read/write
heads resulting in physical media
damage and/or data corruption.
Indication:
Smoke omitting from computer,
sparks, inaccessible data, drive will not
power up.
What to do?
Unplug devices following all power
outages. CSD AMU ALIGARH
• Water Damage
A single spill from a cup of coffee or
water can bring your computer to a
screeching halt.
What to do:
Immediately power down computer
and keep it off.
Do not attempt to dry your hard drive
or electronics; place in an airtight bag.
CSD AMU ALIGARH
• Virus Attacks
There are literally thousands of viruses
constantly attacking computers in this
internet age.
What to do:
Always protect yourself with antivirus
software and never open emails from
unfamiliar users.
Update antivirus software regularly.
CSD AMU ALIGARH
CSD AMU ALIGARH
Cause Example Percentage
Hardware and
System Problems
Disk drive crashes, Electrical outages and power
surges, Manufacturer defects etc..
45%
Human Errors Accidental Deletion, Overwriting of files etc.. 33%
Software
Corruption or
Application Error
Application displays an error message when
document is opened, Installing corrupt application
etc..
12%
Computer Viruses Viruses such as MyDoom.A or MyDoom.b etc.. 6%
Natural Disasters Fires, Floods, Lightning, Earthquakes etc.. 4%
Backup Hardware
CSD AMU ALIGARH
• CDs, DVDs and Blue-Ray disks
- Inexpensive, quick, months to years of
storage
• Thumb drives
- Inexpensive, quick, larger storage capacity than
CDs/DVDs, months to years of storage
• Internal hard drive
- Easy transfer from one hard drive to another, many
years of storage
• External hard drive
- Easy transfer from internal to external hard drive,
better connection options, long-term storage
What is Data Recovery
• Data recovery is the process of restoring data
that has been lost, accidentally deleted,
corrupted or made inaccessible for any reason,
from electronic storage media (hard drives,
removable media, optical devices, etc...)
• There are occasions when damage to data is
permanent and complete data recovery is not
possible. However, some data is usually always
recoverable.
CSD AMU ALIGARH
Cases of Recovery
FIRE
Found after a fire
destroyed a 100 year
old home – All data
Recovered
CRUSHED
A bus runs over a
laptop – All data
recovered
SOAKED
Notebook trapped
underwater for
two days – All
data recovered
CSD AMU ALIGARH
Data Recovery Techniques
CSD AMU ALIGARH
Data Recovery Using Software
CSD AMU ALIGARH
• Only restore data that is not overwritten.
• Do not work on physically damaged drives.
• Uses various file system such as FAT,NTFS to
recover data
• Can be used to restore permanently deleted files,
from removable devices etc..
• Recuva, Undelete Pro, EasyRecovery, Proliant,
Novanet, etc..
NTFS File System
CSD AMU ALIGARH
• preferred file system for Microsoft’s various desktops
and server.
• File Records are stored in a special table called as
Master File Table (MFT).
• MFT does not store the data of file (unless the data is
small to be able to fit in MFT Entry).
• The information about file is stored in MFT Entry as
series of attributes.
• Each attribute has an identifier which identifies type of
attribute
CSD AMU ALIGARH
Type Type Identifier(Hexadecimal) Attribute Name
Identifier
(Decimal)
16 0x10 $STANDARD_INFORMATION
32 0x20 $ATTRIBUTE_LIST
48 0x30 $FILE_NAME
64 0x40 $VOLUME_VERSION
64 0x40 $OBJECT_ID
80 0x50 $SECURITY_DESCRIPTOR
96 0x60 $VOLUME_NAME
112 0x70 $VOLUME_INFORMATION
128 0x80 $DATA
144 0x90 $INDEX_ROOT
160 0xA0 $INDEX_ALLOCATION
176 0xB0 $BITMAP
192 0xC0 $SYMBOLIC_LINK
192 0xD0 $REPARSE_POINT
208 0xE0 $EA_INFORMATION
224 0xF0 $EA
256 0x100 $LOGGED_UTILITY_STREAM
--- 0xFFFFFFFF End of Attributes
CSD AMU ALIGARH
• first sixteen entries in MFT only for NTFS metadata files which
are reserved
• File Records for user created files are added after that
reserved entries.
NTFS FILE SYSTEM METADATA FILES
Entry Number NFTS Metadata File Name
0 $MFT
1 $MFTMirr
2 $LogFile
3 $Volume
4 $AttrDef
5 . (Dot)
6 $Bitmap
7 $Boot
8 $BadClus
9 $Secure
10 $Upcase
11 $Extend
CSD AMU ALIGARH
• Files and folders are differentiated using simple flag values
present in MFT Entry
MFT HEADER FALG VALUE DETAILS
Value Description
0x00 Deleted File Entry
0x01 File Entry
0x02 Deleted Folder Entry
0x03 Folder Entry
CSD AMU ALIGARH
When we delete a file on NTFS file system:
Step 1:
File’s MFT Entry is made unallocated by changing the flag
values in MFT Entry Header. For files it is changed from0x01
to 0x00, and for folder it is changed from 0x03 to 0x02.
Step 2:
$Bitmap attribute of $MFT metadata file is processed and
value 0 is set for the file’s MFT Entry.
Step 3:
The non resident attributes of file’s MFT Entry are
processed and their clusters are set to unallocated in $BITMAP
metadata file.
when file is deleted on NTFS files system, actual data content of
the file is not deleted. Only the changes to the MFT Entry Header
and some metadata files are made
Recuva
CSD AMU ALIGARH
• Recuva is a data recovery program for windows. It
is able to recover files that have been
"permanently" deleted. The program can also be
used to recover files deleted from USB flash
drives, memory cards etc.
• The program works on both FAT and NTFS file
systems.
CSD AMU ALIGARH
After installation of Recuva Wizard
CSD AMU ALIGARH
Specify Location
CSD AMU ALIGARH
Scanning required file
CSD AMU ALIGARH
Showing Results
Advantages & Disadvantages of
Data Recovery From Softwares
CSD AMU ALIGARH
Advantages:
• Data Can be Recovered
• Various Software are available
• User Interface.
• Easy to handle.
Disadvantages:
• Not work if data is overwritten.
• Not work on physically damaged
devices
Data Recovery Using Macroscopic
Technique
CSD AMU ALIGARH
Macroscopic Technique
• Scanning Probe Microscopy (SPM)
• Magnetic Force Microscopy (MFM)
• Scanning Tunneling Microscopy
(STM)
CSD AMU ALIGARH
Scanning Probe Microscopy
• Scanning probe microscopy (SPM) is a
new branch of microscopy that forms
images of surfaces using a physical probe
that scans the specimen.
• An image of the surface is obtained by
mechanically moving the probe in a raster
scan of the specimen, line by line, and
recording the probe-surface interaction as
a function of position
CSD AMU ALIGARH
Scanning Probe Microscopy (SPM)
CSD AMU ALIGARH
• Uses a sharp magnetic tip attached to a flexible
cantilever placed close to the surface to be analyzed
• produce a topographic view of the surface, using a
PC as a controller
CSD AMU ALIGARH
Magnetic Force Microscopy
• MFM (Magnetic Force Microscopy) is a
new technique which images the spatial
variation of magnetic forces on a sample
surface.
• MFM is derived from scanning probe
microscopy (SPM) and uses a sharp
magnetic tip attached to a flexible
cantilever for analysis.
• An image of the field at the surface is
formed by moving the tip across the
surface and measuring the force.
CSD AMU ALIGARH
CSD AMU ALIGARH
MFM Working image showing the bits of a
hard disk
Scanning Tunneling Microscopy
• STM (Scanning Tunneling Microscopy) is a
more recent variation of MFM which uses
a probe tip typically made by plating
nickel onto a pre-patterned surface.
• The probe is scanned across the surface
that is to be analyzed. STM measures a
weak electrical current flowing between
the tip and the sample. The image is
then generated in the same way as MFM.
CSD AMU ALIGARH
Advantages & Disadvantages of
Macroscopic Technique
CSD AMU ALIGARH
Advantages:
• Data Can be Recovered
• Gives Topographic View
• Overwritten Data Recovery is possible.
Disadvantages:
• Much costly.
• Can not be done at home.
CSD AMU ALIGARH
CSD AMU ALIGARH
CSD AMU ALIGARH
Conclusion
CSD AMU ALIGARH
• Individuals or companies may experience data loss at
any time for many reasons.
• There are various steps that should be implemented to
help prevent data loss.
• Data loss can be very costly and very upsetting.
• There are several data recovery techniques that have
proven to be successful or partially successful in
recovering data.
• Utilizing qualified professional data recovery specialists
will aid in the degree of success of data recovery.
Future Scope
CSD AMU ALIGARH
• New File Systems Can be developed or upgraded for easy
recovery of data
• New softwares can be developed for data recovery
References
• WWW.Google.co.in
• http://www.intellirecovery.com/data/recovery.html
• http://www.data-recovery-info.com
• http://www.eng.yale.edu/reedlab/research/spm/spm.html
• http://www.ebaumsworld.com
• http://www.disklabs.com
CSD AMU ALIGARH
ANY
QUESTIONS?
CSD AMU ALIGARH

More Related Content

What's hot

Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
DINESH KAMBLE
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Data recovery
Data recoveryData recovery
Data recovery
Suresh Hirpara
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
Ahmed Hashad
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 

What's hot (20)

Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Data recovery
Data recoveryData recovery
Data recovery
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 

Viewers also liked

Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
wericsmith
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
emandatarecovery
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
Prannay Shahi
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
Abdullah Khan
 
Principle Of A F S
Principle Of  A F SPrinciple Of  A F S
Principle Of A F Sguestc5e21a
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computersskyhighphoto83
 
6.3 - Magnetic Force and Field
6.3  - Magnetic Force and Field6.3  - Magnetic Force and Field
6.3 - Magnetic Force and Field
simonandisa
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
guest19ab3c
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
Methods of data recovery
Methods of data recoveryMethods of data recovery
Methods of data recovery
Syed Awais Mazhar Bukhari
 
tablet presentation
tablet presentationtablet presentation
tablet presentationAnju K John
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computershafia Nadeem
 
Data recovery
Data recoveryData recovery
Data recovery
Ravi Malik
 

Viewers also liked (15)

Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
 
Tablet PC
Tablet PCTablet PC
Tablet PC
 
Principle Of A F S
Principle Of  A F SPrinciple Of  A F S
Principle Of A F S
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
 
6.3 - Magnetic Force and Field
6.3  - Magnetic Force and Field6.3  - Magnetic Force and Field
6.3 - Magnetic Force and Field
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Methods of data recovery
Methods of data recoveryMethods of data recovery
Methods of data recovery
 
tablet presentation
tablet presentationtablet presentation
tablet presentation
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computer
 
Data recovery
Data recoveryData recovery
Data recovery
 

Similar to Data recovery

COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
JemarManatad1
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backups
John Rood
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
Marvin Bronoso
 
Lesson 1 presentation
Lesson 1 presentationLesson 1 presentation
Lesson 1 presentation
Kereen Tatham
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
kndnewguade
 
Basic_Fundamentals_for_all.ppt
Basic_Fundamentals_for_all.pptBasic_Fundamentals_for_all.ppt
Basic_Fundamentals_for_all.ppt
NaseerAhmed87205
 
Data recovery system
Data recovery systemData recovery system
Data recovery system
karanbhale
 
COMPONENTS OF COMPUTER SYSTEM.pptx
COMPONENTS OF COMPUTER SYSTEM.pptxCOMPONENTS OF COMPUTER SYSTEM.pptx
COMPONENTS OF COMPUTER SYSTEM.pptx
MagdaLo1
 
Computer basic
Computer basicComputer basic
Computer basic
Renée Howard-Johnson
 
5120224.ppt
5120224.ppt5120224.ppt
5120224.ppt
dedanndege
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
Kaushal Mehta
 
Lecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating SystemsLecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating Systems
Jack Hyman
 
5 Things You Need to Know About Enterprise Fl
 5 Things You Need to Know About Enterprise Fl 5 Things You Need to Know About Enterprise Fl
5 Things You Need to Know About Enterprise Fl
Western Digital
 
E3100 introduction to computer
E3100 introduction to computerE3100 introduction to computer
E3100 introduction to computer
Dhom Nawhki
 
5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
KunalGola6
 
Death of Disk Panel Session - HEC-FSIO Workshop
Death of Disk Panel Session - HEC-FSIO WorkshopDeath of Disk Panel Session - HEC-FSIO Workshop
Death of Disk Panel Session - HEC-FSIO Workshop
Erik Riedel
 

Similar to Data recovery (20)

COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backups
 
CSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer SystemCSS L04 - Integral Parts of the Computer System
CSS L04 - Integral Parts of the Computer System
 
Lesson 1 presentation
Lesson 1 presentationLesson 1 presentation
Lesson 1 presentation
 
MODULE 2.pptx
MODULE 2.pptxMODULE 2.pptx
MODULE 2.pptx
 
Basic_Fundamentals_for_all.ppt
Basic_Fundamentals_for_all.pptBasic_Fundamentals_for_all.ppt
Basic_Fundamentals_for_all.ppt
 
Data recovery system
Data recovery systemData recovery system
Data recovery system
 
Coa presentation3
Coa presentation3Coa presentation3
Coa presentation3
 
COMPONENTS OF COMPUTER SYSTEM.pptx
COMPONENTS OF COMPUTER SYSTEM.pptxCOMPONENTS OF COMPUTER SYSTEM.pptx
COMPONENTS OF COMPUTER SYSTEM.pptx
 
Computer Basics and Hardware
Computer Basics and HardwareComputer Basics and Hardware
Computer Basics and Hardware
 
Computer basic
Computer basicComputer basic
Computer basic
 
5120224.ppt
5120224.ppt5120224.ppt
5120224.ppt
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
 
Lecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating SystemsLecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating Systems
 
5 Things You Need to Know About Enterprise Fl
 5 Things You Need to Know About Enterprise Fl 5 Things You Need to Know About Enterprise Fl
5 Things You Need to Know About Enterprise Fl
 
E3100 introduction to computer
E3100 introduction to computerE3100 introduction to computer
E3100 introduction to computer
 
5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
 
Death of Disk Panel Session - HEC-FSIO Workshop
Death of Disk Panel Session - HEC-FSIO WorkshopDeath of Disk Panel Session - HEC-FSIO Workshop
Death of Disk Panel Session - HEC-FSIO Workshop
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 

Recently uploaded

Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
aishnasrivastava
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Viksit bharat till 2047 India@2047.pptx
Viksit bharat till 2047  India@2047.pptxViksit bharat till 2047  India@2047.pptx
Viksit bharat till 2047 India@2047.pptx
rakeshsharma20142015
 
Large scale production of streptomycin.pptx
Large scale production of streptomycin.pptxLarge scale production of streptomycin.pptx
Large scale production of streptomycin.pptx
Cherry
 
plant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptxplant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptx
yusufzako14
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
IvanMallco1
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
silvermistyshot
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
insect morphology and physiology of insect
insect morphology and physiology of insectinsect morphology and physiology of insect
insect morphology and physiology of insect
anitaento25
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Predicting property prices with machine learning algorithms.pdf
Predicting property prices with machine learning algorithms.pdfPredicting property prices with machine learning algorithms.pdf
Predicting property prices with machine learning algorithms.pdf
binhminhvu04
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 

Recently uploaded (20)

Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Viksit bharat till 2047 India@2047.pptx
Viksit bharat till 2047  India@2047.pptxViksit bharat till 2047  India@2047.pptx
Viksit bharat till 2047 India@2047.pptx
 
Large scale production of streptomycin.pptx
Large scale production of streptomycin.pptxLarge scale production of streptomycin.pptx
Large scale production of streptomycin.pptx
 
plant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptxplant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptx
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
insect morphology and physiology of insect
insect morphology and physiology of insectinsect morphology and physiology of insect
insect morphology and physiology of insect
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Predicting property prices with machine learning algorithms.pdf
Predicting property prices with machine learning algorithms.pdfPredicting property prices with machine learning algorithms.pdf
Predicting property prices with machine learning algorithms.pdf
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 

Data recovery

  • 1. CSD AMU ALIGARH Data Recovery By: Rohit Gupta 2015 MCA15
  • 2. Content 1. Data Loss 1.1 What is data Loss ? 1.2 What causes Data Loss & How to prevent data Loss ? 2. Data Recovery 2.1 What is Data Recovery ? 2.2 How can it be used ? 3. Data Recovery Techniques 3.1 Software Data Recovery 3.2 Hardware Data Recovery 4. Conclusion 5. Future Scope CSD AMU ALIGARH
  • 3. What is Data Loss? • Data has accidentally been erased or data control structures have been overwritten. • Data has been corrupted or made inaccessible. • Data loss is distinguished from data unavailability CSD AMU ALIGARH
  • 4. What Causes Data Loss and Preventions CSD AMU ALIGARH
  • 5. What Causes Data Loss? • Hardware and System problems • Software corruption or application error • Virus Attacks • Human Error – Accidental deletion – Accidental overwriting of files • Natural Disaster CSD AMU ALIGARH
  • 6. Data loss and Preventions CSD AMU ALIGARH • Head Crash the read/write heads of a hard drive come into physical contact with the media surface. Indications: Unusual noise omitting from the hard drive – clicking, grinding or scraping. What to do? Shut down the computer immediately
  • 7. • Power Surge Extreme power fluctuations may severely damage media electronics and directly effect a drive’s read/write heads resulting in physical media damage and/or data corruption. Indication: Smoke omitting from computer, sparks, inaccessible data, drive will not power up. What to do? Unplug devices following all power outages. CSD AMU ALIGARH
  • 8. • Water Damage A single spill from a cup of coffee or water can bring your computer to a screeching halt. What to do: Immediately power down computer and keep it off. Do not attempt to dry your hard drive or electronics; place in an airtight bag. CSD AMU ALIGARH
  • 9. • Virus Attacks There are literally thousands of viruses constantly attacking computers in this internet age. What to do: Always protect yourself with antivirus software and never open emails from unfamiliar users. Update antivirus software regularly. CSD AMU ALIGARH
  • 10. CSD AMU ALIGARH Cause Example Percentage Hardware and System Problems Disk drive crashes, Electrical outages and power surges, Manufacturer defects etc.. 45% Human Errors Accidental Deletion, Overwriting of files etc.. 33% Software Corruption or Application Error Application displays an error message when document is opened, Installing corrupt application etc.. 12% Computer Viruses Viruses such as MyDoom.A or MyDoom.b etc.. 6% Natural Disasters Fires, Floods, Lightning, Earthquakes etc.. 4%
  • 11. Backup Hardware CSD AMU ALIGARH • CDs, DVDs and Blue-Ray disks - Inexpensive, quick, months to years of storage • Thumb drives - Inexpensive, quick, larger storage capacity than CDs/DVDs, months to years of storage • Internal hard drive - Easy transfer from one hard drive to another, many years of storage • External hard drive - Easy transfer from internal to external hard drive, better connection options, long-term storage
  • 12. What is Data Recovery • Data recovery is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible for any reason, from electronic storage media (hard drives, removable media, optical devices, etc...) • There are occasions when damage to data is permanent and complete data recovery is not possible. However, some data is usually always recoverable. CSD AMU ALIGARH
  • 13. Cases of Recovery FIRE Found after a fire destroyed a 100 year old home – All data Recovered CRUSHED A bus runs over a laptop – All data recovered SOAKED Notebook trapped underwater for two days – All data recovered CSD AMU ALIGARH
  • 15. Data Recovery Using Software CSD AMU ALIGARH • Only restore data that is not overwritten. • Do not work on physically damaged drives. • Uses various file system such as FAT,NTFS to recover data • Can be used to restore permanently deleted files, from removable devices etc.. • Recuva, Undelete Pro, EasyRecovery, Proliant, Novanet, etc..
  • 16. NTFS File System CSD AMU ALIGARH • preferred file system for Microsoft’s various desktops and server. • File Records are stored in a special table called as Master File Table (MFT). • MFT does not store the data of file (unless the data is small to be able to fit in MFT Entry). • The information about file is stored in MFT Entry as series of attributes. • Each attribute has an identifier which identifies type of attribute
  • 17. CSD AMU ALIGARH Type Type Identifier(Hexadecimal) Attribute Name Identifier (Decimal) 16 0x10 $STANDARD_INFORMATION 32 0x20 $ATTRIBUTE_LIST 48 0x30 $FILE_NAME 64 0x40 $VOLUME_VERSION 64 0x40 $OBJECT_ID 80 0x50 $SECURITY_DESCRIPTOR 96 0x60 $VOLUME_NAME 112 0x70 $VOLUME_INFORMATION 128 0x80 $DATA 144 0x90 $INDEX_ROOT 160 0xA0 $INDEX_ALLOCATION 176 0xB0 $BITMAP 192 0xC0 $SYMBOLIC_LINK 192 0xD0 $REPARSE_POINT 208 0xE0 $EA_INFORMATION 224 0xF0 $EA 256 0x100 $LOGGED_UTILITY_STREAM --- 0xFFFFFFFF End of Attributes
  • 18. CSD AMU ALIGARH • first sixteen entries in MFT only for NTFS metadata files which are reserved • File Records for user created files are added after that reserved entries. NTFS FILE SYSTEM METADATA FILES Entry Number NFTS Metadata File Name 0 $MFT 1 $MFTMirr 2 $LogFile 3 $Volume 4 $AttrDef 5 . (Dot) 6 $Bitmap 7 $Boot 8 $BadClus 9 $Secure 10 $Upcase 11 $Extend
  • 19. CSD AMU ALIGARH • Files and folders are differentiated using simple flag values present in MFT Entry MFT HEADER FALG VALUE DETAILS Value Description 0x00 Deleted File Entry 0x01 File Entry 0x02 Deleted Folder Entry 0x03 Folder Entry
  • 20. CSD AMU ALIGARH When we delete a file on NTFS file system: Step 1: File’s MFT Entry is made unallocated by changing the flag values in MFT Entry Header. For files it is changed from0x01 to 0x00, and for folder it is changed from 0x03 to 0x02. Step 2: $Bitmap attribute of $MFT metadata file is processed and value 0 is set for the file’s MFT Entry. Step 3: The non resident attributes of file’s MFT Entry are processed and their clusters are set to unallocated in $BITMAP metadata file. when file is deleted on NTFS files system, actual data content of the file is not deleted. Only the changes to the MFT Entry Header and some metadata files are made
  • 21. Recuva CSD AMU ALIGARH • Recuva is a data recovery program for windows. It is able to recover files that have been "permanently" deleted. The program can also be used to recover files deleted from USB flash drives, memory cards etc. • The program works on both FAT and NTFS file systems.
  • 22. CSD AMU ALIGARH After installation of Recuva Wizard
  • 24. CSD AMU ALIGARH Scanning required file
  • 26. Advantages & Disadvantages of Data Recovery From Softwares CSD AMU ALIGARH Advantages: • Data Can be Recovered • Various Software are available • User Interface. • Easy to handle. Disadvantages: • Not work if data is overwritten. • Not work on physically damaged devices
  • 27. Data Recovery Using Macroscopic Technique CSD AMU ALIGARH
  • 28. Macroscopic Technique • Scanning Probe Microscopy (SPM) • Magnetic Force Microscopy (MFM) • Scanning Tunneling Microscopy (STM) CSD AMU ALIGARH
  • 29. Scanning Probe Microscopy • Scanning probe microscopy (SPM) is a new branch of microscopy that forms images of surfaces using a physical probe that scans the specimen. • An image of the surface is obtained by mechanically moving the probe in a raster scan of the specimen, line by line, and recording the probe-surface interaction as a function of position CSD AMU ALIGARH
  • 30. Scanning Probe Microscopy (SPM) CSD AMU ALIGARH • Uses a sharp magnetic tip attached to a flexible cantilever placed close to the surface to be analyzed • produce a topographic view of the surface, using a PC as a controller
  • 32. Magnetic Force Microscopy • MFM (Magnetic Force Microscopy) is a new technique which images the spatial variation of magnetic forces on a sample surface. • MFM is derived from scanning probe microscopy (SPM) and uses a sharp magnetic tip attached to a flexible cantilever for analysis. • An image of the field at the surface is formed by moving the tip across the surface and measuring the force. CSD AMU ALIGARH
  • 33. CSD AMU ALIGARH MFM Working image showing the bits of a hard disk
  • 34. Scanning Tunneling Microscopy • STM (Scanning Tunneling Microscopy) is a more recent variation of MFM which uses a probe tip typically made by plating nickel onto a pre-patterned surface. • The probe is scanned across the surface that is to be analyzed. STM measures a weak electrical current flowing between the tip and the sample. The image is then generated in the same way as MFM. CSD AMU ALIGARH
  • 35. Advantages & Disadvantages of Macroscopic Technique CSD AMU ALIGARH Advantages: • Data Can be Recovered • Gives Topographic View • Overwritten Data Recovery is possible. Disadvantages: • Much costly. • Can not be done at home.
  • 39. Conclusion CSD AMU ALIGARH • Individuals or companies may experience data loss at any time for many reasons. • There are various steps that should be implemented to help prevent data loss. • Data loss can be very costly and very upsetting. • There are several data recovery techniques that have proven to be successful or partially successful in recovering data. • Utilizing qualified professional data recovery specialists will aid in the degree of success of data recovery.
  • 40. Future Scope CSD AMU ALIGARH • New File Systems Can be developed or upgraded for easy recovery of data • New softwares can be developed for data recovery
  • 41. References • WWW.Google.co.in • http://www.intellirecovery.com/data/recovery.html • http://www.data-recovery-info.com • http://www.eng.yale.edu/reedlab/research/spm/spm.html • http://www.ebaumsworld.com • http://www.disklabs.com CSD AMU ALIGARH