Notebook reinstallation system automatic partition recovery is successful

Case:Samsung laptop, Windows operating system, customers used the CD -ROM reinstallation system, and found that all the original data was lost.The reason is that the one -click automatic partition function comes with the CD -ROM has transformed the hard disk to 4 partitions and formatted. It was originally 5 partitions. Solution:The engineer connected the mobile…

Read More

External Hard Drive

image An external hard drive is a type of hard drive which is connected to a computer by a USB cable or other means. Modern entries into the market consist of standard SATA, IDE, or SCSI hard drives in portable disk enclosures with SCSI, USB, IEEE 1394 Firewire, eSATA client interfaces to connect to the host computer.

Modern external hard drives are compatible with all operating systems supporting the relevant interface standards they operate with, such as USB MSC or IEEE1394. These standards are supported by all major modern server and desktop operating systems and many embedded devices. Obsolete systems such as Windows 98 (original edition), Windows NT (any version before Windows 2000) old versions of Linux (older than kernel 2.4), or Mac OS 8.5.1 or older do not support them out-of-the-box, but may depend on later updates or third party drivers.

How to add an External Hard Drive to you computer?

Adding an external hard drive to your computer is an easy way to increase your computer storage. You can use your external drive to back up files or transfer files from computer to computer.

  1. External hard drives connect to your computer via an USB, firewire or SATA cable. Check your computer to see which interface your computer supports. In general, firewire is the fastest, so if your top priority is transfer speeds you may choose to go with firewire. On the other hand, if you intend on using the drive with multiple computers you may prefer to get a USB 2.0 external hard drive since most computers have a USB interface port.
  2. Determine your storage needs. Computer storage is pretty cheap these days so it’s a good idea to get the most storage you can. 100GB may seem like a lot, but if you download music and movies it can add up quickly. Compare prices and find a compatible drive with sufficient space for your needs
  3. Once you have found the right drive for your computer, it’s time to attach it. External drives are very easy to add since they do not require you to open up your computer. Simply connect it to a power source and use the cable it came with to attach it to your USB, firewire, or SATA interface.
  4. Your pc will recognize the drive when you plug it in. After attaching your drive, your computer should recognize it immediately and assign it a letter and name, such as “Removable Drive F:”. At this point your drive is ready to use and you can click on it as you would any other drive to access its contents.

How to Partition an External Hard Drive?

When you add an external hard drive, you may do so for a number of reasons. But once you have that hard drive installed, creating different partitions for different purposes can expand your available options. Partitioning an external hard drive is just like partitioning an internal hard drive—just be sure that you are careful when you start your partitioning and make sure you are working with the external hard drive and not a drive that you want—partitioning a drive will immediately erase all information on the drive forever.

  1. Check your external hard drive to ensure that there is no data on the hard drive that you want. As soon as you start the partitioning process, all data on that drive will be completely and forever erased.
  2. Run the Microsoft Management Console. This can be started by typing “MMC” in a command prompt window, or just typing “MMC” in the “Start Search” box in the Windows Start menu.
  3. In MMC, add the Disk Management snap-in. This can be done through the File menu by selecting add snap-in. Select “Disk Management” from the list.
  4. Right-click on the disk in the list of disks at the bottom of the snap-in. From this short-cut menu, you will have various options related to the partitioning of the drive. You can expand the partition, delete the partition, or shrink the partition. You can also mark it as the primary partition if you like.
  5. Format the new partitions. Using the same shortcut menu, you should format all the partitions that you wish to use. You can also set their drive letters here if you like, so your operating system will know which drive is which letter.

Plan ahead how many partitions you want and what size they will be so you know how you will set this up when you get to that point. Partitioning completely erases all contents of a disk immediately.

Where to buy External Hard Drive?

  • Find the right external hard drive for you at Oyyy.co.uk
  • Top 20 Most Popular External Hard Drives on Amazon.com
Read More

Data Backup Glossary (Letter F)

Failback
After a failback event, the restoration of a failed system component’s share of a load to a replacement component. When a failed controller in a redundant configuration is replaced, the devices that were originally controlled by the failed controller are usually failed back to the replacement controller to restore the I/O balance, and to restore failure tolerance. Similarly, when a defective fan or power supply is replaced, its load, previously borne by a redundant component, can be failed back to the replacement part.

Failover
The automatic substitution of a functionally equivalent system component for a failed one. Failover most often involves intelligent controllers connected to the same storage devices and host computers. If one of the controllers fails, failover occurs, and the survivor takes over its I/O load.

Fibre Channel ATA
Fibre Channel ATA (FATA) is a hybrid hard drive first introduced by HP in 2004 that combines both Fibre Channel and ATA technologies. FATA drives use an ATA drive mechanism, offering the same performance and capacity as a standard ATA drive, but also feature a Fibre Channel connector, which enables the FATA drive to be used where conventional Fibre Channel drives are currently connected.

File server
A computer with the primary purpose of serving files to clients. A file server may be a general purpose computer that is capable of hosting additional applications or a special purpose computer capable only of serving files.

Popular data backup media:  Magnetic tape, Hard disk, Optical storage, Floppy disk, Solid state storage, Remote backup service…

Read More

Top 25 Free Anti Spyware/Adware Software Download (Part II)

Eraser 5.86a
– secure file deletion
Eraser 5.86a Eraser is a secure file deletion tool that allows you to completely remove sensitive data from your hard drive by overwriting it several times with sophisticated patterns (Gutman, USDoD and others). You can simply drag and drop files and/or folders onto the on-demand eraser, use the convenient Windows Explorer right-click extension or use the built-in scheduler for automated wiping of unused disk space, browser cache files etc. Easy to use and secure!
Download: Eraser 5.86a

Startup Delayer 2.5.138
– delay the startup of programs
Startup Delayer allows you to configure which programs to start first and which ones to delay when your computer is rebooted. You can set a custom delay for each one, even drag the visual display graph which shows you exactly how your programs are starting and allows you to easily modify the order or adjust delay times.
Download: Startup Delayer 2.5.138

Avira AntiVir Personal 9.0.0.394
– anti-virus scanner
Avira AntiVir Personal 9.0.0.394 Avira AntiVir Personal offers the effective protection against computer viruses for the individual and private use on a single PC-workstation. It detects and removes more than 50,000 viruses and an Internet-Update Wizard for easy updating. The built in resident Virus Guard serves to monitor file movements automatically, for example when downloading files from the internet. Heuristic scanning protects Protection against previously unknown macro viruses. Note: This free version brings up a daily nag screen that advertises the Professional versions which are available from the company.
Download: Avira AntiVir Personal 9.0.0.394

TrendMicro HijackThis 2.0.2
– investigate browser add-ons
TrendMicro HijackThis 2.0.2 TrendMicro HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect, and optionally remove selected items. The program can create a backup of your original settings and also ignore selected items. Additional features include a startup list report, hosts file manager, uninstall manager and some other tools. Intended for advanced users.
Download: TrendMicro HijackThis 2.0.2

Access Manager 2.1.58
– password manager
Access Manager 2.1.58 Access Manager provides fast, easy and secure storage for all your passwords. You can organize passwords into types and categories for easy access and keep notes, web site links and e-mail addresses with each password. Email addresses or web site URLs can be automatically launched from within the program. The program is easy to use and uses a clean MS Outlook style interface and can be protected with a master password. Also included is an option to generate random passwords, search functions, printing of password lists and more. Free for personal use.
Download: Access Manager 2.1.58

Windows CleanUp! 4.5.2
– clean-up junk files
Windows CleanUp! 4.5.2 Windows CleanUp! is an easy to use privacy cleaner that can remove traces of your Internet activity as well as delete a variety of junk files that accumulate over time and litter your hard drive. It offers 4 levels of cleaning, the maximum level is designed for the case that you are selling your PC and want to thoroughly eliminate all personal references, including your IE Favorites. The program can also clean custom directory locations and optionally wipe the deleted files, so they cannot be recovered.
Download: Windows CleanUp! 4.5.2

The Vault 0.9.4.13
– store files in a secure vault
The Vault 0.9.4.13 The Vault enables you to store files and folders in a password protected and encrypted database (vault), out of sight and inaccessible by other users. You can create multiple vaults with virtual folders to organize your files, add new files via drag and drop, launch files from within the vault, and also extract or delete items as needed. The program and vault contents can optionally be transferred to a USB drive. Supports Blowfish, Rijndael, Serpent and Twofish encryption algorithms.
Download: The Vault 0.9.4.13

Norman Malware Cleaner 2009.06.16
– virus and malware removal tool
Norman Malware Cleaner 2009.06.16 Norman Malware Cleaner is a standalone virus and malware removal tool that can detect and remove specific malicious software (malware) from your PC. The program does not require installation and does not provide proactive protection from future infections. It is designed to clean a computer that has already been infected.
Download: Norman Malware Cleaner 2009.06.16

SpywareBlaster 4.2
– prevent installation of malware
SpywareBlaster 4.2 SpywareBlaster prevents the installation of many so-called spyware, adware and malware programs by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage. This allows you to run Internet Explorer with Active-X enabled, but it will never download or even prompt you for any of the known ActiveX controls. All other Active-X controls or plug-ins will work fine. The SpywareBlaster database contains information on these known spyware Active-X controls and can be updated with the click of a button. The application windows displays a list of all controls that it is able to detect (this is not a list of what was found on your computer). The program cannot detect if you have any of the known objects already installed, but if you do, they will be disabled. The program also allows you to take a snapshot of your computer (certain settings) in its clean state and later revert many changes made by spyware and browser hijackers.
Download: SpywareBlaster 4.2

RoboForm2Go 6.9.95
– portable password manager
RoboForm2Go 6.9.95 RoboForm2Go is a secure password manager and form filler. It stores all your login information and can run directly from a USB drive. Once launched, it attaches itself to Internet Explorer (or other IE based browser) and allows you to login to your sites with a single click from the toolbar. When you remove the USB drive from the host computer, no traces of Pass2Go are left behind. The program can also store personal data for automatic form filling or reference (credit card numbers, social security, driver license numbers etc.). Pass2Go uses AES encryption and password protection to secure your data on the USB drive. The auto-login features work in Internet Explorer and IE-based browsers, however you can also access your stored data from the program interface on any computer, regardless of any browser. The free version allows you to store up to 10 logins.
Download: RoboForm2Go 6.9.95

RISING Antivirus Free Edition 2009 21.22.30
– antivirus program
RISING Antivirus Free Edition 2009 21.22.30 RISING Antivirus Free Edition is a full-featured antivirus program that protects your computers against all types of viruses, Trojans, Worms, Rootkits and other malicious programs. It offers real-time protection, email scanning (POP3/SMTP), automatic updates, scheduled scans and all others standard features, as well as a set of advanced system protection tools that monitor for system changes, suspicious application behavior and other potential issues. The free version offers the same level of protection as the commercial version but does not include a firewall.
Download: RISING Antivirus Free Edition 2009 21.22.30

Comodo Internet Security 3.9.95478.509
– personal firewall and antivirus
Comodo Internet Security 3.9.95478.509 Comodo Internet Security (formerly Comodo Firewall) combines Comodo AntiVirus with a personal firewall that filters ingoing and outgoing traffic on your computer. It alerts you of any applications that attempts to connect to the Internet and allows you to permanently or temporarily allow or block the connection. Advanced users can customize the application and TCP/IP rules based on IP address, protocol and destination port, however this is not required unless you have a reason to customize the rules. In addition to application behavior and network connections, Comodo Firewall also monitors components (dll files etc.) that initiate network connections, as well as parent processes and modifications to executables (checksum verification). Other features include attack prevention (port scanning, flooding), adjustable security levels, trusted networks, activity log and more. The firewall and antivirus features can be installed individually, you do not have to install both.
Download: Comodo Internet Security 3.9.95478.509

ZoneAlarm 8.0.298.000
– personal firewall
ZoneAlarm 8.0.298.000 ZoneAlarm provides essential protection for Internet users. Combining the safety of a dynamic firewall with total control over applications Internet use, ZoneAlarm gives rock-solid protection against thieves and vandals. ZoneAlarm makes ironclad Internet security easy-to-use. ZoneAlarm gives you control over the door to your computer. With Stealth Mode enabled, ZoneAlarm`s Firewall renders your computer invisible to the Internet and potential intruders. If you can t be seen, you can t be attacked. Because you tell ZoneAlarm how you use your computer, the firewall only allows traffic that you understand and initiate. ZoneAlarm s firewall provides the ultimate intrusion security for your personal computer. ZoneAlarm also introduces MailSafe which enables users of ZoneAlarm to detect and control Visual Basic Script attachments to emails they receive while ZoneAlarm is running. Free for personal and non-profit use.
Download: ZoneAlarm 8.0.298.000

Read More