Simple Guide for Hard Drive Data Recovery

This method can only be used to hard drive data recovery and solve problems on errors that are still within the limits of logical. Logical error / recovery in this case the partition is formatted, folders deleted through Shift + Del, error partition table/ MBR etc.

1. Shutdown your system immediately (after deleted files, formatted or otherwise).
2. Install the recovery software on another HDD. Do not be on the HDD that has a problem.
3. HDD in trouble (which is formatted or lost data) must as the position of the slave on another PC. Do as the master.
4. Prepare another HDD to accommodate the data to be saved. HDD in trouble should not be used for storing data recovery

So the standard:
There are 3 hard disk should be prepared: HDDA (troubled) HDDB (who installed prgram recovery) and HDDC (for holding the data to be saved) :
- HDDB as a bootable master (with Windows and other)
- HDDA as a victim who will be saved
- HDDC as shelter data

Recommended Software:
1. WinHex (from www.x-ways.net)
2. TestDisk (from www.cgsecurity.org)
3. GetDataBack (from www.runtime.org)
There are many other recovery software that can be used to hard drive data recovery. Please you are looking for and adjust to your needs. The principle works the same. What is important is standardization HDDA, HDDB, HDDC as above.

In situations where the HDD is not accessible, remember the following:
1. Do not panic, turn off your PC / notebook / external HDD first
2. Try to remember the folder or any file that do not exist. Create list
3. Find a backup on CD or in other storage. What is complete? Check 2x
4. Backup still Ok?
5. If there is no backup, record what happened before problems arise.
6. Disconnect all power cables, remove the HDD.

OK, now we will analyze your case distinguished natural. See your HDD, is there any part of the PCB which burns? Chip is on fire, causing a distinctive odor. If there is a burning, means PSU questionable stability. Stop your analysis.

If nothing is burning, you can continue your analysis as follows, Turn on the computer, REMEMBER not to install another HDD or used (USB Flash, external HDD or others). Does your Mobo normal? Can you do a POST and BIOS detects everything?

If you find that "Normal", the problem is not on the Mobo or RAM and processor

Turn off the computer and test the port IDE / SATA drives, by installing a CD ROM or other to the port IDE / SATA HDD you, turn on the computer, if the CDROM is detected in BIOS?

If "normal" means the port IDE / SATA is not a problem, maybe the cable IDE / SATA HDD that had the problem, now attach the HDD with a CD Rom IDESATA cable and immediately go into the BIOS, if your HDD appears in the BIOS? If so we can continue, if not: The computer does not boot or total dead computer, then the problem is in the PCB or even on the HDD.
Note: Some HDD, PCB her die without showing signs of burning ..

If your HDD appears in the BIOS and detected a "normal" and no sounds strange, consider the following:
1. Have you been online and receive e-mail "hot" and are you open? Or put on a CD, floppy or USB which are not clear security?
If yes, there is a chance you got a virus or other attack when opening e-mail or a specific file. Scan your computer with antivirus database is updated until the day of the problem, if the virus is not found, do not be convinced first, because there is a chance you've had the new virus and not in the database of your antivirus.

2. If you are not online, if your computer hangs before opening applications or files?
If yes, is possible only Windows or an error in your program. check the adequacy of your memory to run the application or file. You must first Uninstall the program before, through the safe mode of Windows.

3. Had Windows gives the message "CRC error"? or "Write delayed failed"? or "Partition table is corrupt and unreadable"? or "Error file not found"?
If so, you should get ready to work even longer to check this HDD. see step 4 (you have to get ready joking with your HDD in DOS mode and not Windows mode)

4. If there is another computer (or a friend's), disconnect the HDD and go get a floppy disk which contains MHDD or other utilities (Victoria, THDD and others). Put your HDD in the machine. Insert a floppy and set the boot options to the floppy, turn on the computer and then test with the software, if your HDD error?
Most of the HDD, when the system hangs will record the error in the SMART table, and if SMART indicates danger, then the BIOS will display a warning to immediately back up data. Check your SMART. If using MHDD or Victorian press F8, if THDD then you can immediately see it in the top left corner. If the SMART value indicates an error and there is a problem, you have to get this SMART before they can retrieve your data.

NOTE: Please note that the MHDD, Victoria and THDD only advisable to check only and should not be used to fix the errors occurred. This software does not guarantee the integrity of your data.

Now MHDD or THDD and Victoria did not show any error at sector level as well as SMART attributes, so the problem is in the file system or partition. Actions that must be done to save the data:

1. Image your HDD to another HDD with the same capacity or larger. Remember! LBA Maxtor has a greater capacity than other brands. For imaging, you can use a variety of software: Norton Ghost (sector copy!) or Acronis and others. Choose whichever you think is most preferred. Just make sure it all went off without any error log.

2. Well, after finishing in-image, the image was put up HDD (HDD-1) to another computer which already have its OS. If possible and advisable at all, HDD-1 was used as external USB box (use a chipset which is good (Lenox, Smart Drive or other). As for the HDD-0 (which was first in trouble) is better kept well-good.

3. After the OS is displayed, Antivirus and all that is done loading, now turn on the HDD-1 results earlier image. See the Properties, Disk Management, if the partition had an error occur? If yes, you can try to access the partition and copy the data as much as possible. Make a folder, do not jump to the whole. So if there is an error you can record and see where location of the problem.

4. There is a problem, appears in Disk Management, but the HDD / partition is not accessible - 0 bytes and other error messages (Partition come up with weird names). Means no errors in the partition table or MBR. The way we should go to copy the data are still winding again. (You work with his image alone, all the changes that occurred did not cause any problems)

This means:
1. MBR error
2. FAT0 and FAT an error (on FAT 32)
3. MFT mirror error (on NTFS)

Note: MBR = Master Boot Record, Boot Record and Boot Sector, was first formed when the HDD is formatted

FAT = File Allocation Table (not the file system). Formed when Directory and files filled to HDD

MFT = Master File Table (same as FAT). There is only on NTFS (Win NT, Win2K, etc). there are 4 copies, more than FAT32, NTFS One of the benefits (in addition to supporting the encryption and the security hierarchy).

How Secure Your Data?

Floods, earthquakes, or disasters caused by human error comes in many forms and events that took place some time past has emphasized the need for businesses to have a comprehensive disaster data recovery backup plan.
However, the businesses, both large and small, often make the mistake of not providing the resources and sufficient time to evaluate the impact of disturbances to the system and their IT services.

Losses that often occur directly experienced by the two impacts, financial losses due to service unavailability (downtime) and loss of customer trust that can potentially damage the reputation of the business concerned.

Businesses need to create an effective disaster data recovery (DR) plan and comprehensive as a priority. The risk of disaster is always present and DR even more vital in today's business world due to increased dependence on IT to support critical applications.

System failures, natural disasters, and even user error can make hampered operations and bring negative impact to the business. Provide time to create a disaster plan, events, or crises can determine the difference between success and failure after an interruption of business.

An effective DR plan to overcome not only the protection and data recovery technology, but also including, People, Process and procedures needed to bring the perfect end result. DR Plan also allows users to manage corporate risk, respond to potential problems, and solve new business transactions while protecting a very important transaction records for the business.

Increasing Success
Increasing the strength and effectiveness of DR plans, communications, and precision at the level executives and IT management is essential. In fact, high executive involvement will result in the level of success of DR plans is higher.

Regular testing is also needed to ensure that DR plans will succeed and the employees know what will happen when the real crisis comes. In addition, the test also allows businesses to improve and customize their plan based on their specific needs.

They also have to remember several things: to know how long it takes to activate a backup server; know how to access the data if they do not go to the office, and where they can access the software copies that are not disturbed if the malware has infected the IT system. Time spent at this stage to test and adjust the data recovery options to ensure ease of data recovery for business in the future.

Automation is one of the key factors of success. For many businesses, the data recovery system is a manual process that takes time, however, use the automated approach can restore the system within minutes after it crashes and eliminate human error as well as service unavailability (downtime).

An automated solution also know that it is not always possible for IT administrators to physically access the affected system shortly after the disaster, so that certain activities should be handled from a distance.

Server virtualization has become an important technology in a server-based data center today. He applied the technology that allows virtual machines running various operating systems on one server, each of which function independently of each other with the operating system itself.

DR Research found that 52 percent of organizations surveyed had to reevaluate their DR plans related to server virtualization. Furthermore, 37 per cent of virtual servers are not covered in their DR plans and only 38 percent backing up more than 90 percent of their virtual systems.

With growing businesses that implement virtualization technologies, there is a greater need to ensure that the virtual assets and information remains secure and available anytime.

How secure is your data?
In situations of intensive business, disaster data recovery planning is an essential part of successful business strategy. It is important to keep the DR plan as a living document that is always up-to-date and in accordance with the rules of policy, technology trends, and other changes in the environment.

Although no organization can guarantee the durability of 100 percent, take steps right through good planning will help them recover more quickly and with the most minimal impact on business operations, if any disturbance occurs - whether natural disasters, human error , or system failure.

Data recovery from hard drive has bad sectors

By using MHDD, if you found an error code "UNC" in several areas (not in groups as a pattern), you can use the option "remapo" = ON.
The function remap = ON is useful to relocate the LBA sector from the damaged area to the table while the damage.

Remap safe to the data recovery from hard drive for not found error codes along the 100 sectors or more. If this occurs, the possibility of data will be corrupted when accessed. To repair the corrupted data, you can use some special utility that is designed for this function.

Here is the complete guide:

1. When the loading process MHDD, press F4, then scan selection box will appear.

2. To activate the remap function: press the down arrow key on your keyboard, to highlight the "remap", then press the space bar to change the option "OFF" to "ON"

3. When finished changing the remap to "ON" press F4 again to remap process running.

4. After the remap process is complete, scan the hard drive again with MHDD, press F4 twice and let the scan run to completion.

5. If no more errors are found, then the bad sectors have all been successfully relocated, and for data recovery from hard drive you can connect the hard drive as slave to another hard drive to copy the data. Or use a cloning software like Media Tools Professional to perform sector to sector cloning to another hard drive healthy.

Hard drive data recovery using paid software

In the paid software, the ability to recover data, both on the Windows operating system, Mac, Linux, and Novell, the more awesome. In many countries, the computer technician has long been familiar with this software.

"We often use software Get Data Back. This software is great because it can recover various types of data that has been permanently deleted. I've also been using the software Tiramisu, but not as good as its ability to Get Data Back, "said computer network technician.

Ever tried to scan the hard drive is already formatted five times, the results were surprising. "I still get the old file, even though it was five times the hard drive is formatted," he said.

Get Data Back is sold at varying prices. Data Recovery for NTFS and FAT Data Recovery cost $79. Get Data Back can also recover e-mail that has been deleted, MS Outlook Recovery, for example, sold for $29.

Hard drive data recovery can be done include: data that has been deleted, lost and could not be accessed, as well as the damaged file. With so many tools, the opportunity to get a variety of digital evidence from computers for the purposes the investigation the higher and more enjoyable.

Data Recovery using free software

Only by relying on search engines such as Google, by typing in keywords, like free data recovery, will show a lot of alternative software that can be used. One that was found is Undelete Plus.

Undelete Plus software is actually not free, but priced at 29.95 U.S. dollars. Only, when visited, the software was giving a free quote for a non-profit individual interests. In the announcement sites mentioned Undelete Plus, it offers limited free time, but is not mentioned until when the end.

In addition to free, great software installation file is only equal to 3.7 MB. With a file size of less than 4 MB and the function is so useful, can not be denied this data recovery software get a lot of awards from various institutions. It should be submitted as well, such software usually has a file size up to hundreds of MB so difficult to download.

Besides could use the normal to recover deleted files on your computer, this software can also be used to revive the files on the USB flash drive or compact flash is used in digital cameras.

In tests conducted to restore the files on my computer, the file that was deleted in 2010 and still had time to appear and can be restored. It should be understood, not all the files that were deleted successfully restored because the recovered sector has been overwritten by another file.

At the trial in a new USB flash drive that I bought about six months ago, all files that ever existed on the USB flash can still be restored. The danger, the files of the virus was also able to be restored and re-infect.

Losing a photo by accident, for example deleting the wrong files, either remove from the digital camera or computer, can still be restored. Only, when the digital storage media (eg Compact Flash) that has been formatted by the camera, software Undelete Plus was unable to recover.

Undelete Plus can run on operating systems Windows95 OSR2, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Windows XP, Windows 2003, Windows Vista or Windows 7. This program supports all Windows file systems FAT12/16/32, NTFS/NTFS5 and also can recover pictures that have been deleted in the media compact flash, SmartMedia, MultiMedia, and Secure Digital.

Hardrive data recovery from damaged

Accidentally delete files from your computer? Or want to see the pictures on a USB flash drive that has removed the child? What if a good photo on a digital camera that had not been transferred it is not accidentally deleted? Take it easy!

In the field of computer forensics, data recovery from deleted or damaged computer hardrive is an easy job as long as it is still in good condition. So, not only files, confidential letters from officers has been deleted, formatted data can still be "switched on" again.

Now with the progress of the software and the open freedom of sharing experiences through the Internet, hardrive data recovery job is no longer hard work. An elementary school child if he has the software to recover data, only a few clicks, he can get back files that were deleted.

On the Windows operating system, when a file is deleted, that file does not actually disappear. Windows has been providing Recycle Bin facilities capable to recover files that have been deleted.

What if the files in the recycle bin had been removed permanently? The answer remains the same: the file can still be restored. Work to restore files that have been defaced or removed is included in work "forensic" exciting and practically easy.

Exciting, because with running the hardrive data recovery process, we hope to get a lot of files that were deleted. It says easy, because now it's been available many tools, especially software that is easily available, either free or paid.

Work to recover this data has long been engaged, not only by seekers of criminal evidence, but also a computer technician. For computer technicians, data recovery is as easy as installing software that they do everyday.

Many do not know how to recover files that have been deleted from the recycle bin because Windows itself gives knows when it's deleted from the recycle bin is already removed permanently. Actually, when a file is deleted from the recycle bin, Windows only tell if the disk space used by files that you want can be reused. If space is overwritten new file, it is possible to recover files is more severe, but can still be handled by paid software.

Guide for Building a Disaster Data Recovery Plan Server System

Here is tutorial in building or setting up Disaster Recovery Planning. This tutorial is an implementation of the authors in performing daily tasks as IT System Administrator who is obliged to maintain the stability Server System so that we can get ZERO DOWNTIME Server System.

Disaster Recovery Plan is the protection ServerSystem stages that must be prepared for in case of disaster, the data recovery process can be done quickly. DRP is very closely related with ZERO DOWNTIME Server System where the primary purpose of the Server System or DATA CENTER provides non-stop service to the Client and the Customer.

If the Server System or DATA CENTER is not designed properly then the server will experience DOWN or even damaged and takes many minutes even hours. And can we imagine, for example tens up to hundreds of bank customers would queue up in front of an ATM machine or even customers become not believe in banks and withdraw his savings.

Stages of Disaster Data Recovery Plan are as follows:

1. Redundant or Dual Input POWER SOURCE
Prepare the power source of adequate and ready to use, and can also apply on DUAL Input power to the UPS. If no Genset, or may utilize other input resources such as Solar energy, etc..
a. Input Power of Electric Power.
b. Input Power of generator sets.
c. Input Power Source Power from another.


2. DUAL UPS, or Redundant UPS, to PSU
a. UPS A
b. UPS B
We use 2 UPS with Input Power Source is different to supply a server with dual Power Supply Unit. This certainly applies to servers that have 2 pieces Power Supply Unit (PSU). The goal is if there is a problem in one of the Power Source the Server is also still able to live from another Power Supply, or other Power Source.


3. DUAL POWER SUPPLY UNIT (per server)
a. PSUA with input power from the UPS A
b. PSUB with input power from the UPS B
Not all servers have dual power supply facilities, so if our servers have dual power supply then we should use as optimal as possible.

4. LOCAL STORAGE RAID System for OS
System RAID (Redundant Array of Inexpensive Disks) is a group of hard disk that serves mutual replace / redundant to maintain a functional hard drive.


The goal is if one or more hard disk from a disk group is destroyed, then the disk group is a function of not having problems so we are not to experience a loss of data. In a RAID system is recommended using hotplug hard drive, or disk hotswap, so with this hard drive we do not need to turn off the server to process the replacement of the damaged hard drive.

RAID system that we can use are:
a. RAID 1 +0 / Mirror (minimum), better use RAID5 or RAID6.
b. RAID5 => (N = N-1), 1 piece of hard disk allocated for Fault Tolerance.
c. RAID6 / RAID ADG (Advanced Data Guard) => (N = N-2), 2 pieces of hard disk allocated for Fault Tolerance


5. DUAL / Redundant Connection in every server
Using two or more LAN Card will certainly guarantee Availability servers in the network if there is damage to the LAN Card Server. So that if one LAN connection drop out, then another LAN connection can take over the connection or the automatic Take Over.

Redundant Connections can be:
a. NIC / LAN Card for Redundant Connection & Load Balancing
b. FO for Redundant Connection (Server to the SAN / NAS & FO between theSwitch)


6. EXTERNAL STORAGE Redundant Protection for OS, database and fileserver
External Storage a SAN (Storage Area Network) or NAS (Network Attach Storage) nowadays has become a staple in the Server System. Redundant External Connection from Server to Storage is very important because it is very helpful in improving protection of storage according to the functional Data Storage to function properly.

Connection from Server to the External Storage of Fiber Optic (FOR) or Ethernet Connection (iSCSI) storage and protection to us, in the form:
a. System RAID (RAID 1 +0, RAID5 or RAID6)
b. ASM & OMF (for Oracle Database)


7. TAPE BACKUP, Tape Library, or Virtual Tape Library (VTL)
Tape Backup, Data Protection is to further both the External Catriedge and Virtual Tape Library Tape Catriedge hereinafter be saved into a special place for the event of disaster can be used for data recovery quickly.

a. Tape Backup with Catriedge adequate conventional
b. FO for Redundant Connection (from Server to the Library or VTL / Virtual Tape library)


8. Replication SERVER TECHNOLOGY
Server Technology implemented in our very important role, for example on a Single Server in case of minor problems such as Restart Server, Patch Updates, etc need time to Downtime 5 minutes until 15 minutes to process Running Up Server. Moreover, fatal problems then it took about 1 hour more, to Re-Building the same server as before. So with the Replication Server Technology, Server Downtime can be reduced up to minimize even ZERO Downtime.

There are 2 kinds of techniques in the Replication Server, namely:
a. Mirrored SERVER
b. Clustered SERVER


In the mirrored server is needed IT Administrator interventions to perform switching or takeover Servers including running the script for Passive server can take over the current Active Server Down. While on Clustered Servers are no longer required intervention because of Clustered Server IT administrators can perform automatic takeover. On the server writer, Clustered Server takeover process from NODE1 to NODE2 in Windows Server 2003 only runs in a matter of about 5 seconds.

Clustered System is a technique combines the ability or power of several servers into a Powerful Server System. The phisical, Clustered Server consists of 2 pieces Server or more even up to hundreds of servers. But the system is recognized as a fruit Server System. So Clustered Server is a manifestation or a miniature rather than mainframe servers that cost is very expensive, so with a Clustered Server Mainframe servers purchase cost can be replaced by building a Clustered Server.


9. SERVER CO-LOCATION
Server Colocation is a production server we use day-to-day operations at the replication on our servers which are beyond our Site Server. For example, outside the city, outside the island and even abroad. This implementation is highly dependent on the speed bandwidth connections that we have or we lease from the ISP.

There are 3 kinds of techniques in the Server Co-Location, that is:
a. Mirrored Server Co-Location
b. Clustered Server Co-Location
c. BACKUP Storage to Co-Location Storage (NAS with iSCSI generally use)

There are a few more things to note in the Additional Protection in building a data center. That is:
A. Cooling System is suitable and adequate (AC Precision & redundant).
B. Fire Protection & Fire Alarm (Fire Suppresson, Gas FM-200, etc.).
C. Security Access procedures (finger print, access cards, CCTV, operators, security guard, and others)

Article "Building a Disaster Data Recovery Tips Server System Plan " These tips are suitable for the Protection Server System for Medium & Enterprise Company. Because the costs incurred are also big as needed and appropriate enterprise budget provided. The higher the "High Availability Server System? the desired protection, the more points that should be done also means greater costs.


 
Powered by Blogger