DATARECOVERYUNION.COM

Raid Data Recovery Software: DiskInternals Raid Recovery

diskinternalsraidrecoveryFile Name: DiskInternals Raid Recovery
Version: 1.5
Publisher: DiskInternals Research
Raid Supported: RAID 0, Raid 1, JBOD, RAID 5, 0+1, Dynamic Disks
Analyze Mode: Automatic and manual mode
Price:Personal License ($249.95 USD) Business License ($499.95 USD)

What can DiskInternals Raid Recovery Do?
• Recover damaged raid arrays
• Recover files from damaged disks
• Recover files from inaccessible drive
• Recover corrupt or damaged partition table.
• Restore disks after crash
• Unformat NTFS drives
• Recover files deleted by accident
• Recover Photos from the erased or formatted media
• Undelete files deleted from the Recycle Bin.

Download: http://www.diskinternals.com/download/Raid_Recovery.exe
Buy: http://www.diskinternals.com/order/raid.shtml

Read More

Avoiding the assignment of duplicate MAC addresses to network interface devices (Part 1)

1. An MAC address management apparatus for assigning an MAC address serving as an identification number unique to a network interface device to the network interface device to be connected to a network, comprising: MAC address storage means for storing an MAC address file and a temporary MAC address file, the MAC address file comprising a plurality of MAC addresses; transmission means for reading out one MAC address from the MAC address file and transmitting the MAC address to the network interface device in order to assign an MAC address to the network interface device; reception means for receiving an MAC address write completion notification indicating that the transmitted MAC address has been assigned to the network interface device; rewrite means for rewriting, in the temporary MAC address file, MAC addresses of the MAC address file except for the transmitted MAC address when said reception means receives the MAC address write completion notification; and delete means for deleting the transmitted MAC address from the MAC address file after said rewrite means rewrites the MAC addresses in the temporary MAC address file.

2. The apparatus according to claim 1, further comprising copy means for copying data stored in the temporary MAC address file to the MAC address file when an abnormality is determined to occur in the MAC address file.

3. An MAC address management apparatus for assigning an MAC address serving as an identification number unique to a network interface device to the network interface device to be connected to a network, comprising: MAC address storage means for storing an MAC address file comprising a plurality of MAC addresses; external storage means for controlling to store a temporary MAC address file in an external storage device connected to said MAC address management apparatus; transmission means for reading out one MAC address from the MAC address file and transmitting the MAC address to the network interface device in order to assign an MAC address to the network interface device; reception means for receiving an MAC address write completion notification indicating that the transmitted MAC address has been assigned to the network interface device; rewrite means for controlling to rewrite, in the temporary MAC address file of the external storage device, MAC addresses of the MAC address file except for the transmitted MAC address when said reception means receives the MAC address write completion notification; and delete means for deleting the transmitted MAC address from the MAC address file after said rewrite means controls to rewrite the MAC addresses in the temporary MAC address file.

4. The apparatus according to claim 3, further comprising copy means for copying data stored in the temporary MAC address file of the external storage device to the MAC address file when an abnormality is determined to occur in the MAC address file.

5. An MAC address management system comprising a network interface device to be connected to a network, and an MAC address management apparatus for assigning an MAC address serving as an identification number unique to the network interface device, said MAC address management apparatus having: MAC address storage means for storing an MAC address file and a temporary MAC address file, the MAC address file comprising a plurality of MAC addresses; transmission means for reading out one MAC address from the MAC address file and transmitting the MAC address to said network interface device in order to assign an MAC address to said network interface device; reception means for receiving an MAC address write completion notification indicating that the transmitted MAC address has been assigned to said network interface device; rewrite means for rewriting, in the temporary MAC address file, MAC addresses of the MAC address file except for the transmitted MAC address when said reception means receives the MAC address write completion notification; and delete means for deleting the transmitted MAC address from the MAC address file after said rewrite means rewrites the MAC address in the temporary MAC address file, and said network interface device having: MAC address reception means for receiving the assigned MAC address from said MAC address management apparatus; write/storage means for writing and storing the MAC address; and write completion notification transmission means for transmitting the MAC address write completion notification upon completion of a write of the MAC address.

6. An MAC address management system comprising a network interface device to be connected to a network, and an MAC address management apparatus for assigning an MAC address serving as an identification number unique to the network interface device, said MAC address management apparatus having: MAC address storage means for storing an MAC address file comprising a plurality of MAC addresses; external storage means for controlling to store a temporary MAC address file in an external storage device connected to said MAC address management apparatus; transmission means for reading out one MAC address from the MAC address file and transmitting the MAC address to the network interface device in order to assign an MAC address to said network interface device; reception means for receiving an MAC address write completion notification indicating that the transmitted MAC address has been assigned to said network interface device; rewrite means for controlling to rewrite, in the temporary MAC address file of the external storage device, MAC addresses of the MAC address file except for the transmitted MAC address when said reception means receives the MAC address write completion notification; and delete means for deleting the transmitted MAC address from the MAC address file after said rewrite means controls to rewrite the MAC addresses in the temporary MAC address file, and said network interface device having: MAC address reception means for receiving the assigned MAC address from said MAC address management apparatus; write/storage means for writing and storing the MAC address; and write completion notification transmission means for transmitting the MAC address write completion notification upon completion of a write of the MAC address.

7. An MAC address management method applied to an MAC address management apparatus having storage means for storing an MAC address file storing a plurality of MAC addresses and a temporary MAC address file, comprising: the transmission step of controlling to read out one MAC address from the MAC address file and transmit the MAC address to a network interface device in order to assign an MAC address to the network interface device to be connected to a network; the reception step of controlling to receive an MAC address write completion notification indicating that the transmitted MAC address has been assigned to the network interface device; the rewrite step of controlling to rewrite, in the temporary MAC address file, MAC addresses of the MAC address file except for the transmitted MAC address when said reception step receives the MAC address write completion notification; and the delete step of controlling to delete the transmitted MAC address from the MAC address file after said rewrite step rewrites the MAC addresses in the temporary MAC address file.

Read More

Get Your Computer in Gear — Avoid Data Recovery

Avoid Data RecoveryFor many of us, computers are a lot like cars—we don’t absolutely need them, but they can make life a great deal more enjoyable and convenient, we get to do and see things by using them that we probably wouldn’t otherwise see and they both require regular maintenance to keep them in good working order. This is never more true than when talking about avoiding data recovery.

 

Avoid the Crash

Just like with motor vehicles, the best way to steer clear of data recovery and keep your computer in tip-top condition is to keep it from crashing. When your computer freezes up or crashes the potential for data loss increases exponentially. The following are just a few basic measures you can take to avoid a disastrous system crash:

 

  • Utilize Basic Disk Utilities – You have several tools built in to your operating system (defragmentation, disk cleanup, error checking) designed to help keep your computer running at maximum capacity. Just like changing the oil in your car, performing these small tasks every few months can make a world of difference.
  • Run System Updates – Keeping your computer’s operating system current with the latest updates is key for optimal performance. If you’re a Windows user, ignoring update prompts is like ignoring low and worn tires; the longer you go without addressing them, the greater your chances increase for a problem-and hence the possibility of lost data.
  • Protect Against Viruses and Spyware – Computer viruses are designed for destruction and some spyware, like adware, can cause your system to lock up-posing a high risk for data loss. Like potholes and other unseen road hazards, viruses and spyware often appear before it’s too late. By investing in some high-quality anti-virus software and anti-spyware software, you can avoid these dangers altogether.
  • Use a Surge Protector/Power Backup – Power surges and power outages are a fact of life; both can harm your computer and cause data loss. Double-check your power strip and make sure it is also a surge protector.

    Also, if you use your computer for work or some other important role, consider purchasing a power ba ckup unit. Although they cost a few bucks, power backups, like a spare tire, can keep your computer going long enough for you to avoid a major data loss situation, which in itself can be priceless.

  • Give Your Computer the Royal Treatment – Just as you’d baby an expensive car, your computer also needs tender loving care. Avoid jostling your computer when you need to move it-a good rule of thumb is to handle it as if were filled with champagne glasses.

    Avoid exposing your computer to direct sunlight and to extreme temperatures-heat is your computer’s worst enemy. You’ll also want to keep your computer in a place where the air is not too dry, as dry air tends to promote static electricity.

    Lastly, keep the inside of your PC case clean. To do this, make sure your computer case is not sitting directly on the floor. Dirt from carpets and dust bunnies are easily sucked into your computer’s case through cooling fans, settling on circuit boards and other major components. Also, every six months or so you (or someone experienced with computers) should open up your case and clean it out with a small handheld vacuum or compressed air.

By following these steps, you can avoid data recovery and keep your computer in gear and purring like a kitten as you speed down the information superhighway.

Read More

RAID Recovery – Don’t Increase the Level of Difficulty

RAID Recovery More and more enthusiast users encounter the destroyed RAID arrays. Generally, data recovery from such a RAID array is possible, but keep in mind that the effort increases disproportionately. First of all, data has to be copied from a RAID drive onto a server, and the data set has to be put back together. The distribution of data into smaller blocks across one or more drives makes RAID 0 the worst possible type to recover. Increasing performance doesn’t necessarily do your data any good here! If a drive is completely defective, only small files, which ended up on only one of the RAID drives (despite the RAID stripe set), can be recovered (at 64 kB stripe size or smaller). RAID 5 offers parity data, which can be used for recovery as well.

RAID data configuration is almost always proprietary, since all RAID manufacturers set up the internals of their arrays in different ways. However, they do not disclose this information, so recovering from a RAID array failure requires years of experience. Where does one find parity bits of a RAID 5, before or after the payload? Will the arrangement of data and parity stay the same or will it cycle? This knowledge is what you are paying for.

Instead of accessing drives on a controller level, the file system level (most likely NTFS) is used, as logical drives will provide the basis for working on a RAID image. This allows the recovery specialist to put together bits and bytes after a successful recovery using special software. The recovery of known data formats is an important approach in order to reach towards a complete data recovery. Take a JPEG file for example – will you be able to recognize a picture after recovery? Or will you be able to open Word.exe, which is found on almost every office system? The selected file should be as large as possible, so it was distributed across all drives and you can know for sure that its recovery was successful.

Two dead hard drives in a RAID 5 are more likely to be restored than two single platters, since RAID still provides parity data.

Read More

Hard Drive Damage Types

Hard Disk Repair

Data loss might also occur in small drives such as the Hitachi MicroDrive. Ontrack was unable to recover any data in the above right example.

Damage to a drive’s circuit board or defects of the drive heads occur fairly often. In both cases, to access hard drive data, a data recovery specialist will substitute the defective component with a working one. In the best case scenario you regain 100% of your data.

A so called head crash – where a write/read head physically hits the magnetic platter – is much more severe. Simply hitting your drive might cause contact, since the distance between the head and surface of drives is minimal nowadays. It is almost always safe to say that a damaged magnetized surface causes the loss of saved bits. The head might even repeatedly get caught at the area of defect, carrying off more material with each additional contact. This material will be distributed inside the drive, causing scratches or other damage. There is nothing a customer can do in case of an intense head crash, because the head is simply unable to move across the defective area any more.

Overvoltage on write/read heads causing the permanent destruction of data areas or magnetization will also result in irreversible data loss. This means the physical destruction of memory sectors, not the simple deletion of saved bits. Depending on the drive, the data recovery specialist might be able to recover some data. Recovering data from defect Hitachi drives is usually impossible, since the manufacturer does not provide any kind of firmware information. Various other products allow at least reading data from other platters.

Strange but true: even internal imbalances can cause trouble. Irregular data platter rotation due to broken bearings will result in unwanted track changes of which the drive is not aware; the result is sometimes total data hodgepodge. Bearing failure is usually the result of improper handling during transportation of the drive. The data recovery specialist will often be able to recover saved data by balancing the drive (slightly shifting and centrally rearranging the platters).

Logical mistakes do not require processing in the clean room. Usually, those mistakes are accidental misuse or deletion of files, where the drive itself has no malfunctions. Even if the problem lies within the drive, it might be a simple defective sector and nothing more severe. Every drive has defective sectors: a primary list will carry a list of bad sectors from the factory; the secondary, so called growing list, will be updated in the course of operation if more sectors become useless. This occurs rather often and is normal, but if your hard drive S.M.A.R.T. feature tells you that you better save some data fast, you’re in trouble. This often means that the growing list is full and an above-average number of sectors are dying.

Now let’s talk about an irreversible defect. Your hard drive will die if fire or another heat source heats it up beyond the Curie temperature of the magnetic material of your drive; this cases the magnetization to be neutralized completely. The Curie temperature depends on the material used in a hard drive; magneto-optical devices use with Curie point principle on purpose (heating via laser), but hard drives do not.

A user who tries to solve issues by himself can make things worse, this is the biggest problem with data recovery. According to statistics, Europeans are worse than Americans in trying to solve problems on their own. Situations also turn bad if, for example, administrators are afraid of their bosses’ reactions. Once, someone even sent a floppy drive instead of the defective hard drive – this is a clear indication of pressure placed on the person involved.

Read More

RAID Data Recovery Is Possible!

RAID Data RecoveryWhat if your hard drive decides to enter the Elysian Fields in this very moment? Sure, you could simply get a new hard drive to substitute for the defective one with a quick run to your favorite hardware store. And with last night’s backup you might even reconstruct your installation quickly. But what if you don’t have a backup? The truth to be more like this: many users don’t even have a backup, or it simply is too old and thus useless for recovering any useful files at all. In case of real hard drive damage, only a professional data recovery specialist can help you – say bye-bye to your vacation savings!

Hard drive failure is especially disastrous for smaller companies working with a single server and a single disk, if they do not have a complete and working data backup at hand. The whole situation is even more complicated if the broken hard drive is a member of a RAID array. Neither hard drive failure in RAID 1 nor RAID 5 will result in data loss, since this scenario has been taken care of by the choice of these RAID levels in advance. But the risk of human error increases: self-made data loss occurs if you accidentally substitute the wrong drive in a degraded RAID 5 array (one with a failed hard drive).

But not all hard drives that show failure symptoms are defective. Sometimes, so called “soft errors” can be fixed using data recovery software. But even in this case, you should weigh the risks to see if it makes sense to take care of the problem yourself or get help from professionals. You might not be able to detect a controller failure right away, for example; usually, users assume a problem with the hard drive. Here is our rule of thumb: if you hear clacking sounds in the potentially defective hard drive, or if the computer’s S.M.A.R.T. function indicates an error during the boot process, something is wrong for sure.

What can you do once you know that an important hard drive is definitely broken? Or what happens if you pulled the wrong drive out of the slot while you were desperately trying to save your data? First of all: don’t panic! You need to act systematically and thoughtfully to be successful, as well as to ensure that you spend as little as possible on recovery – costs can hits four digits easily.

Read More

Top 10 worst computer viruses (Sasser & I Love You)

2. Sasser
Shaun Nichols: Just how much damage can a virus do? Well, take the Sasser worm as one example. This relatively simple little attack managed to cripple airlines, news agencies and even knocked out government systems.

Perhaps most frustrating, however, was that Sasser infection was very easy to prevent. The vulnerability which the attack exploited had been patched for months, and all users had to do was install the most recent security updates from Microsoft.
Sasser was a stark warning that has yet to be heard by many. Unpatched systems are still pervasive around the world, leaving users vulnerable to Sasser and countless other malware attacks that target patched vulnerabilities.

Iain Thomson: I remember the Sasser outbreak well, as I was on holiday and staying with friends in New York when it struck. Being the token geek I spent a good few hours fixing my friend’s computer and cursing the fool who wrote the worm that had me sitting in front of a computer screen when I could be sipping cocktails in Greenwich Village.

The worm caused havoc, not just shutting down a news agency’s systems but causing Delta to cancel some flights and leaving the British coastguard crippled for hours, putting lives at risk. If I’d been a seaman in peril I’d want serious words with the 17-year old author, Sven Jaschan. He was caught after Microsoft put a bounty on his head, something they should do more often.

Jaschan got away with a suspended sentence because he wrote the code before reaching the age of 18. He also caused a storm by accepting a job with a security company in his German homeland. This is not done in the security industry and caused the company, Securepoint, to be shunned by others in the field

1. I Love You
Shaun Nichols: They say you always hurt the ones you love. In 2000, this was taken to extremes when the ILoveYou attack racked up some $5.5bn in damages.

The concept was pretty simple: a user receives a file from a known email contact under the title ‘LoveLetter’ or ‘ILoveYou’. When the attachment is opened, the virus is launched. After infecting the host, the virus then took control of the user’s email program and sent the same ‘ILoveYou’ message to every user in the host’s address book.

Love must have been in the air, because the virus was potent enough to infect some 10 per cent of internet-connected machines at its peak. At a time when many users were still trying to learn the finer points of the internet, ILoveYou was a major wakeup call to some of the dangers on the web.

Iain Thomson: Everybody wants to be loved and ILoveYou was brilliant social engineering. It helped that the virus was spammed out in the early days of internet use and there were a lot of newbies online who had only a vague idea about viruses and how dangerous they could be.

Email was a trusted format and, because the messages came from people the recipient actually knew, the likelihood of them being opened was much higher.

Things are different today, although there are still plenty of people who get caught by social engineering attacks, but ILoveYou makes it so high in the list because it was a brilliant piece of social engineering.

Read More

Top 10 worst computer viruses (Nimda & MyDoom)

Computer Viruses4. Nimda
Iain Thomson: A week after the 11 September atrocities a new virus hit the internet in a big way. Nimda was one of the fastest propagating viruses in history, going from nowhere to become the most common virus online in 22 minutes, according to some reports.

The reason for this speed was that Nimda used every trick in the book to spread itself. It used email, open network shares, IIS vulnerabilities and even web sites to spread. It hit pretty much every version of Windows available and appeared all over the place.

In the paranoid days after the terrorist attack some speculated that this was a digital 11 September, and some security consultants got large speaking fees for suggesting just that. In fact, it was nothing of the sort and was just another attempt at large scale infection.

Shaun Nichols: In the days following the 11 September attacks, everyone was on edge and all types of threats were given plenty of attention. This, in part, helps to explain why Nimda got the attention it did.

Nimda not only played on hype; the worm was also especially virulent due to the sheer number of methods it used to propagate. In addition to spreading via email, Nimda used web site exploits to infect HTML pages and local machine exploits to spread between individual files.

The result was an extremely effective virus circulating at a time when people were more sensitive to all types of threats, both online and offline.

3. MyDoom
Shaun Nichols: Ah yes, the old ‘infect the host then resend to the entire address book’ attack method. Like many other attacks, MyDoom used the tried-and-true practice of spreading through email and address books.

But MyDoom went a step further and targeted peer-to-peer networks. The worm not only spread itself through address books but through the shared folder of users who ran the Kazaa file sharing application.

While definitely skilled programmers, MyDoom’s creators also seemed to be fans of good old-fashioned vigilante justice. One of the early tasks performed by infected users was to take part in a denial-of-service attack against SCO, the infamous software vendor that once tried to lay claim to the patents for Linux.

Iain Thomson: MyDoom was interesting because it was one of the first to use peer to peer as a transmission device, as Shaun notes.

Kazaa was at the peak of its popularity and was causing headaches for Hollywood and the security community. If I had £1 for each time a security expert ranted about the stupidity of using peer-to-peer networks I’d be a rich man. Downloading a file onto your computer from an untrusted source? Madness.

The attack on SCO was also fascinating. SCO was, and to an extent still is, the most hated IT company among users, even more than Microsoft at the time. A worm that attacked a company was something new and raised all sorts of possibilities.

Read More

Top 10 worst computer viruses (Storm & Melissa)

worst computer viruses6. Storm
Shaun Nichols: Before Conficker came around and got everyone worked into a lather, Storm was the big bad botnet on the block. First appearing in early 2007 as a fake news video on European flooding, the Storm malware menaced users for more than a year.

The huge botnet was also influential for its continued use of social engineering tactics. The malware disguised itself as everything from video files to greeting cards, and attacks were continuously refreshed to coincide with holidays and current news events.

While Storm has since been eclipsed by newer botnets, the name still brings to mind one of the most menacing attacks seen in recent years.

Iain Thomson: When extreme weather hit Europe the damage was bad enough, but the Storm code made things much worse. At a time when many were seriously concerned about the health and safety of friends and family, the last thing anyone needed was an infection.

But Storm was a classic piece of social engineering. At a time when people are concerned they don’t always  think of the consequences, be it approving torture or opening an email attachment.

This kind of social networking is nothing new, of course, but the Storm malware did it very well indeed and proved very effective as a result.

5. Melissa
Shaun Nichols: It was a classic love story. Boy meets girl, girl dances for money, boy goes home and writes computer virus for girl, computer virus gets out of hand and causes millions of dollars in damage. It’s the Romeo and Juliet of our time.

When a New Jersey hacker wrote a small bit of code named after a stripper he met in Florida, he had no idea of the chaos that would ensue. The Melissa virus, as it came to be known, got way, way out of hand.

The virus spread like wildfire throughout the net, and an unintended effect of the worm led to a glut of email traffic that overflowed servers and caused tons of damage and lost work time to corporate IT systems.

The hacker himself was later caught and sentenced to a year and half in prison. Next time he wants to impress a girl, hopefully he’ll stick to chocolates and jewelery.

Iain Thomson: Now, I’ve done some stupid things to impress girls, things that cause me to bite my fist with embarrassment nowadays and one that left me with a small amount of scar tissue, but writing a computer virus makes these pale by comparison.

The real damage of Melissa was not in the code itself, but in its spamming capabilities. The software caused a massive overload of email systems and generated enough traffic to make it highly visible. Current computer malware writers have taken note of code like Melissa and now fly much lower under the wire to attract less attention.

Read More

Top 10 worst computer viruses (Conficker & ExploreZip)

computer viruses8. Conficker
Shaun Nichols: The global catastrophe that wasn’t, the third form of the Conficker attack provided nice theatrics but little in the way of actual damage.

The premise was pretty simple: Conficker.C would spread to as many machines as possible throughout March. Each infected machine was given a huge list of domains, one of which would be contacted by 1 April.

The deadline made all the difference. Now, Conficker wasn’t just a simple malware infection, it was a ‘ticking time bomb’, and a looming menace that would unleash carnage. Or at least that’s what the story turned into when unscrupulous security vendors and tech-newbie news outlets got hold of the story.

Then the deadline passed and, pretty much as every reasonable person in the industry predicted, Conficker didn’t do much of anything. The botnet remains intact and still poses a threat, but nothing near the utter cyber-carnage that many spoke of.

Iain Thomson: Conficker has now started its attacks and has proved to be just another botnet builder like most other malware.

However, the media panic over Conficker has shown that people are still scared of viruses. As Bruce Schneier pointed out at RSA last week, Conficker hit all the right buttons. It had a funny sounding name, was mysterious and was set to do something on a ‘magic’ date.

Conficker has, however, served a useful purpose. It spreads via a vulnerability that has had a patch available since last October. If my company’s servers got hit by a vulnerability that old, my IT manager would be getting a stern talking to, possibly involving a thumbscrew and a hot pair of pliers.

7. ExploreZip
Iain Thomson: ExploreZip was written over a decade ago but is still to be found in the wild today, a good example of how persistent these little programs can be.

ExploreZip, like most viruses of the time, targeted Windows systems a nd was spread via email. The recipient got an email reading ‘I have received your email and I shall send you a reply ASAP. Till then take a look at the attached zipped docs.’

Clicking on the attachment booted the virus onto the user’s computer and it immediately spammed itself out to all of the contacts in Outlook. More worryingly it also overwrote Word documents with lines of zeros, and did some damage to the operating system itself. As destructive worms go it wasn’t too bad, but in the pre-Millennium days of 1999 it certainly caused a panic.

Shaun Nichols: Often, viruses aren’t meant to be overtly destructive. Older viruses often did damage through unintended conflicts, while newer malware tries to remain undetected in order to steal data or hijack programs.

This wasn’t the case with ExploreZip, however. Upon receiving the virus, users would open an attachment that would immediately begin damaging the host computer.

This seems pretty scary at first. But when you think about it, a damaged hard drive is still far less serious than a hijacked bank account.

Read More