Data Storage to Be Priority in 2012 – KeepItSafe

Data Storage,KeepItSafeThe storage, securement, access and management of growing volumes of information will mark 2012 within the technology sector, handled online backup and disaster recovery services provider KeepItSafe forecasts.

This rise in the quantity of data does mean using USB stays for data storage will decrease as companies be conscious of the potential risks that may include while using products.

USB sticks are small , portable, and therefore they are able to easily finish up lost or stolen. Research because of it security and data protection company Sophos also says two-thirds of 50 USB stays available on Australian trains and buses were have contracted adware and spyware and contained unencrypted details about their former proprietors.

Therefore, KeepItSafe stated, the virtualisation of servers and desktop computers increases as companies will have to adjust their storage systems to support the growing quantity of data they produce.

“It is impossible for service companies to carry on to handle storage needs with traditional local storage, this can pressure natural evolution to disaster-recovery solutions and data backup towards the cloud. This change won’t be viewed among large businesses but additionally among SMBs. stated Eoin Blacklock, controlling director, KeepItSafe.

“All companies will have to look for flexible, scalable and affordable storage options that may grow using their companies, putting data support high on the diary for 2012.”

Tape has become progressively hard to rely on and it is receding of favour with lots of organisations, Blacklock added.

Technology research and advisory firm Gartner discovered that 71pc of backup tape reinstates fail.

The escape from tape may also benefit companies financially, based on EMC Ireland?¡¥s country manager Jason Ward.

“Companies and public-sector organisations can significantly spend less and be slimmer by eliminating tape, that is cumbersome and susceptible to security breaches,” Ward stated.

Read More

How To Completely Clean Data From Your Hard Drives And SSDs? (Part II)

Seagate (including Maxtor)

SeaTools for DOS
Use Full Erase to zero-fill your hard disk.

Seatools for Dos

Western Digital

Data Lifeguard Diagnostics
Use Write Zeros to drive to zero-fill your hard disk

Data Lifeguard Diagnostics

1. Determine the brand and model of hard disk you want to overwrite.
2. Download a CD ISO image or a floppy disk image (depending upon your equipment) and use the image to create bootable media. The floppy disk image is self-contained: run it, insert a blank floppy disk when prompted, and the image is created on the disk. You will need to use a CD burning program that works with ISO images to convert the ISO image into a bootable CD.
3. Restart your computer with the bootable media you created in Step 2.
4. Select the hard disk to zero-fill when prompted.
5. Choose the option to zero-fill the hard disk.

Clean Data

6. When the program is finished, follow the on-screen instructions to shut down or restart your computer.
7. Remove the wiped hard disk; you can now reuse or recycle the hard disk.

Secure Wiping a Hard Disk

Secure wiping goes beyond zero-fill operations, and provides an extra level of security. Most secure wiping programs are designed to meet DoD 5220 standards, which require three passes of overwriting with a special numeric pattern and verification. More information about this and other secure standards are available from the DataErasure website.

(Note that the 2007 revision of the Defense Security Service, Updated DSS Clearing and Sanitization Matrix (June 28, 2007) (PDF) now recommends degaussing or drive destruction for maximum protection.

Clean Data

Stanford University’s Disk and Data Sanitization Policy and Guidelines, a must-read for understanding data wiping issues, recommends Darik’s Boot and Nuke (DBAN) for secure hard disk wiping.

Secure Wiping a Hard Disk with DBAN

Time Needed: several hours (varies with size and speed of drive)
Software: Darik’s Boot and Nuke (DBAN);
Available from http://www.dban.org/
Media: blank CD (all versions) or floppy disk (version 1.0.7 and older versions)

1. Download the DBAN boot image ZIP file (we used version 1.0.7 and beta version 2.0 for this article); we downloaded the ISO image for CD burning, but a floppy disk builder is also available
2. Extract the contents of the compressed file.
3. Burn the ISO image file extracted in Step 2 to CD; or use the built-in ISO CD image burning support in Windows 7. If you downloaded the floppy image builder, run the program to create a bootable floppy disk.
4. Restart the computer using the CD or floppy disk created in Step 3.
5. Press Enter to run DBAN in interactive mode.
6. Use up and down arrow keys to highlight the drive to wipe.
7. Press the space bar to select the drive.
8. Press M to select the wiping method.
9. Press F10 to begin the wipe process.

Wipe Data

10. At the end of the process, shut down the system. You can reuse or recycle the wiped hard disk.

Note: if DBAN is unable to recognize your SATA hard disks, configure your system BIOS to use IDE mode rather than AHCI mode.

Wiping Flash Memory Cards and USB Drives

Programs such as DBAN or vendor-supplied hard disk utilities are limited in the devices they support: they are designed to work with internal ATA/IDE or SATA hard disks only. Programs that work with flash memory cards and USB flash drives often support hard disks as well, enabling you to use a single program for all disk wiping processes. Roadkil’s DataWipe can be used with any hard disk, floppy disk, or flash drive that has a drive letter.

Wiping Flash Memory Cards with Roadkil’s DiskWipe

Time Needed: Varies; from a few minutes to several hours, depending upon size and speed of drive and computer
Software: Roadkil’s DiskWipe
Available from http://www.roadkil.net
Media: Can be run from Windows desktop

1. Download Roadkil’s DiskWipe.
2. Extract the contents of the compressed file.
3. Open DiskWipe. If you are running Windows Vista or Windows 7, right-click the program icon and select Run as Administrator.
4. Select the drive to wipe.
5. Select the type of wipe to perform; DiskWipe can zero-fill the disk or write random data.
6. Enter the number of passes.
7. Click Erase to start the process.

DiskWipe

8. At the end of the process, close the program. You can reuse the wiped disk.

Wiping SSDs

To solve write performance problems on drives that don’t support TRIM (check with your drive vendor for firmware upgrades) is to use wiper.exe (included with some SSDs) or to run the Secure Erase feature supported in most recent ATA/IDE and SATA drives. The Secure Erase feature can be activated on many systems by running Secure Erase 4.0 (HDDerase.exe), available from http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml. Version 4.0 works with most recent ATA/IDE and SATA hard disks and SSDs, but if you use an Intel X-25M, X-25E, or X-18M SSD, follow this link to download Secure Erase 3.3 http://www.iishacks.com/index.php/2009/06/30/how-to-secure-erase-reset-an-intel-solid-state-drive-ssd/ . Note that it is no longer being developed, and we were unable to use it on a system running an AMD 690 chipset.

Wipe SSD

Read More

Computer Forensics Degrees Online: Colleges & Programs

Interested in get degrees in computer forensics online? Find computer forensic degrees online offering top accredited Computer Forensics programs, courses and classes Computer Forensics field. Easily find and compare these online Computer Forensics majors, Computer Forensics colleges, and programs.

Top Computer Forensics Colleges

Computer Forensics College: Ashford University
Computer Forensics Program: BA/Social and Criminal Justice – Forensics

Top Computer Forensics Colleges

Augment your Bachelor of Arts in Social and Criminal Justice degree with a specialization in Forensics. Examine and understand principles of criminal liability and the acts, mental state, and attendant circumstances that are central ingredients in crimes against society, persons, or property.

Computer Forensics College: American InterContinental University
Computer Forensics Program: Bachelor’s of Science in Criminal Justice – Forensic Science

Top Computer Forensics Colleges

The Bachelor’s of Science in Criminal Justice with a concentration in Forensic Science is for those students interested in career opportunities like Crime Scene Analyst, Non-Sworn Forensic Personnel and many others. The courses provide clear explanations of the techniques, abilities and limitations within the field of forensic science and its applications to criminal investigations.

Computer Forensics College: Loyola University New Orleans Online
Computer Forensics Program: Master of Science in Criminal Justice Administration – Forensic Science Administration

Loyola University New Orleans now offers an online Master of Science in Criminal Justice Administration (MSCJA) degree program. Designed in response to a growing need for criminal justice experts, Loyola’s MSCJA appeals to both public and private practitioners already working in the field. Long-term trends indicate modern public law enforcement agencies and corporate governance and security entities employ many of the same concepts, skills, and frameworks. Our MSCJA takes into account the needs and demands in both sectors and provides an overview of the foremost scientific knowledge, legal cases, administrative and management practices, and technical innovations employed in the public and private sectors.

Computer Forensics College: Kaplan University
Computer Forensics Programs:

BS in Criminal Justice – Crime Scene Investigation

Learn techniques of locating, collecting, and analyzing crime scene evidence used in courts of law. Identify boundaries of a crime scene and understand the principles of searching the crime scene for specific types of evidence, identifiable forensic material, and other items of evidentiary value. As a graduate, you may qualify for a crime investigation position in a law enforcement organization.

BS in Criminal Justice – Forensic Psychology

If you are seeking to advance your criminal justice career in law enforcement, private security, or corrections or to pursue entry-level opportunities, the Bachelor of Science in Criminal Justice program will help you meet your career goals. This degree provides students with a solid foundation in criminal justice and a broad liberal arts knowledge base. The baccalaureate program is designed to combine the professional skills of various specialized areas of criminal justice with research and analytical skills. Graduates of this program can seek employment opportunities in various criminal justice environments, such as law enforcement, corrections, probation, parole, or juvenile justice facilities.

Computer Forensics College: Ashworth College
Computer Forensics Program: Forensic Science

This fascinating course shows you how to identify, collect and analyze evidence for use in capturing criminal perpetrators. We’ll take you from the crime scene to the laboratory to the courtroom. You’ll learn the step by step procedures for analyzing hair, fiber, fingerprints, chemicals and blood stains; testing for drugs and alcohol; examining DNA samples and much more. You’ll also learn how to use specialized forensic equipment, reconstruct a crime scene and prepare a lab report for presentation in court.

Computer Forensics College: Brookline College
Computer Forensics Programs:

Associate of Science in Digital Forensics and Investigation Online

Digital Forensics is a branch of forensic science that pertains to legal evidence found in, or relating to, computers and electronic communication, information, or storage devices as well as the Internet. This program prepares the student to advance in careers paths in government, private, corporate, or entrepreneurial sectors by continuing to develop knowledge and skills in technology, investigative techniques, and communications.

Bachelor of Science in Digital Forensics and Investigation
Digital Forensics is a branch of forensic science that pertains to legal evidence found in, or relating to, computers and electronic communication, information, or storage devices as well as the Internet. This program prepares the student to advance in careers paths in government, private, corporate, or entrepreneurial sectors by continuing to develop knowledge and skills in technology, investigative techniques, and communications.

Computer Forensics College: Grantham University
Computer Forensics Program: Certificate of Learning Computer Forensic Investigations

Grantham UniversityÂ’s Criminal Justice Certificates of Learning offer structured courses, so that a student can gain experience and learning in the field of their choosing. The objectives are for a well-rounded student who strives to gain an advantage in a specialty area to spark interest and understanding of University topics in criminal justice. Grantham University offers Certificates of Learning in: Emergency Operations Management, Computer Forensic Investigations, Juvenile Justice and Criminal Investigation.

Welcome to review these most popular colleges providing Computer Forensics degree online and request details from the colleges you like best.

Read More

Seagate hard drive data recovery data recovery

Case:Customer name: Siemens Company’s hardware operating environment: Seagate 7200.12ST3500418AS software operating environment: Winxp file system: NTFS fault phenomenon: Customer adopting measures: Directly sending data recovery company data recovery process received after the after -disc engineer detection and found that the sound of hard disks was very sound.Normal, the hard disk has been busy, not ready.Read…

Read More

Two mechanisms of defect relocation

When the substitution (Assign) mechanism is used in a drive the latter records to the ID field of a BAD sector the flag of the relocated sector and writes to the data field the number of the reserved sector, i.e. the one, which should be accessed for data recording or reading. As a rule, it is the first available sector after user data area. (figure 2.).

Figure 2. Method of rededicated sector.
During data read/write operations accessing the defective sector drive controller will read the flag and assigned address and reposition the heads to the reserved zone in order to perform reading/writing from/to a good sector. Defective sectors in that case will disappear, but the drive will perform positioning to the reserved area each time it has to address a defective sector. The procedure is accompanied with clicking sounds and slight slow-down. The “Assign” procedure allows relocation only for defects in data fields. Errors pertaining to corruption of ID fields or servo fields cannot be relocated using the “Assign” method.

Another mechanism used for hiding defective sectors at manufacturing factories is skipping of defective sectors. When that method is used, the defective sector is skipped, its number is assigned to the following sector (and so on), and the last sector is shifted to the reserved zone. (figure 3.).

Figure 3. Method of missing sector.
Such method of sector hiding disrupts the continuous integrity of low-level format; the system of LBA conversion to PCHS should also take into account BAD sectors while skipping them. Therefore the method requires obligatory recalculation of translator tables and low-level formatting making it impossible to preserve user data if the method is employed. Exactly for that reason the said method of relocation is applied only in special factory mode of drive operation. It is used in the FUJFMT.EXE utility designed for relocation of defects in FUJITSU drives.

Read More

2060-701266-001 WD PCB Circuit Board

HDD Printed circuit board (PCB) with board number 2060-701266-001 is usually used on these Western Digital hard disk drives: WD1600BB-22GUC0, DCM DSCACTJCA, Western Digital 160GB IDE 3.5 Hard Drive; WD2500BB-22GUC0, DCM DSCACVJAH, Western Digital 250GB IDE 3.5 Hard Drive; WD1600BB-55GUC0, DCM HSBHNTJAH, Western Digital 160GB IDE 3.5 Hard Drive; WD2500BB-55GUC0, DCM DSBACTJAA, Western Digital 250GB…

Read More