Knowledge base
Whether you are just getting acquainted with data recovery or want to immerse yourself into the nuances of this process, here you can find explanations on most questions related to this topic: how files are stored on different digital media, what may cause their loss, what the chances are to restore them and how you can do that without risks. Also, you can gain an insight into data recovery software, learn to make the right choice of tools and apply them properly in various scenarios.
All Categories
The basics of HPE MSA
HPE MSA SAN has placed itself as a trusted storage solution for small to medium-sized businesses. It has stood the test of time and continues to hold a strong position in the modern IT storage market. Providing enterprise-class capabilities at an affordable price level, such arrays are favored by organizations that require...
The basics of Dell EqualLogic SAN
For many years, Dell EqualLogic SAN stood out as one of the most popular products in the medium-size and enterprise data storage industries. Its innovative approach to storage networking, combined with a scale-out architecture, user-friendly management tools and advanced data protection mechanisms, quickly made it a top choice for businesses in need of efficient IT infrastructure solutions.
The basics of HP EVA SAN
Over the years, HP EVA SAN has been a popular choice for enterprises requiring dependable, flexible and highly powerful storage solutions. It has gained a substantial market share and was widely deployed by businesses of various sizes up to the mid-2010s.
What is TeamViewer and how can it be used?
Nowadays, with the widespread availability of high-speed internet, it is possible to receive assistance for various technical issues from the comfort of your chair, without the need to travel or have a specialist come to your location. Professionals can quickly troubleshoot them from anywhere in the world, irrespective of the geographical distance.
How to accelerate the speed of recovery from RAID with a small stripe size
In most modern systems, the default stripe size for RAID lies in the range from 64 KB to 1 MB. Yet, some controllers may support smaller blocks, even as small as 512 bytes. Though optimal for some specific applications, such a stripe size may cause substantial performance problems in view of frequent I/O requests, especially when data is recovered from a very capacious RAID set.
What is a memory card reader and what is it used for?
A memory card reader (also known as a USB card reader and an SD card reader) is a small device that is used to access, read, copy and backup data from a wide variety of memory cards such as SD (Secure Digital), CF (CompactFlash), MMC (MultiMediaCardC) and others. Memory cards can be found in numerous consumer electronics products, from smartphones and tablets, to drones and surveillance cameras.
What is fragmentation in a file system?
File system is a crucial part of any computer storage, responsible for organizing files and keeping track of their physical locations on the device. And for almost as long as this technology exists, the fragmentation of data within it has been a subject of concern.
The basics of Intel Optane technology
Intel Optane isn’t something frequently encountered in day-to-day experience. And though it has been around for the last few years, the technology still raises questions among a whole lot of users. Marketed as bridging the gap between RAM and solid-state storage, it may have fundamentally different specifics, depending on the actual implementation.
What is eCryptfs and how does it work?
Nowadays, as cyberattacks become ever more frequent, people spare no effort to secure their confidential data. And the Linux platform offers a variety of tools that keep it safe from prying eyes with the help of encryption.
Filesystem type and dara recovery chances
In many situations, a data recovery tool can be an actual savior that miraculously returns the files you’ve mentally said goodbye to. But even though the process may look like a wonder from the perspective of a regular user, we should not forget that it’s certainly not a magic wand.
Is it possible to recover data from a memory flash card?
Memory cards are everywhere: in smartphones, digital cameras, tablets and camcorders. They are small, convenient and offer a big amount of data storage space at a relatively small cost. However, you should never rely blindly on your flash card as it’s neither 100% reliable, nor eternal.
Is it possible to recover data from an external HDD or SSD?
External hard drives could be considered both a blessing and a curse. They let us store terabytes of photos, documents, and more, but all this data is more unsafe than we might assume as these data storages are not as reliable and durable as they seem to be.
5 Rules to follow when restoring data from an external data storage
Data loss from an external storage device is not just an unpleasant experience, sometimes it can be a big problem. And wrong user’s actions could make it even worse. So, when facing such an issue, do not panic and follow these simple rules.
What are the chances to recover files from a USB stick?
Compared to external hard drives (HDD), USB sticks are considered to be more reliable for long-term data storing as they don’t have moving parts and are much more resistant to mechanical shocks, vibrations and temperature fluctuations. In addition, they are small and portable. Still, flash drives have some limitations: they process data slower than HDDs and their memory capacity does not exceed 2 TB. The reliability of such devices may vary depending on the technology, and your usage habits can significantly affect the drive’s performance.
Is it possible to restore files from an encrypted external drive?
The portability of external data storage devices, such as USB flash drives, HDDs and SSDs, makes them extremely useful when you need to transfer large amounts of data between computers. However, that’s both a benefit and a drawback. The problem is that by default the data on an external drive can be accessed from any computer it is plugged into and literally by any user, even an unauthorized one. But luckily, there is a solution. If you store some sensitive or just important information on a USB stick or an external hard drive, you can protect it with encryption.
What is TRIM and how does it work?
These days, solid-state drives have become a popular choice with many computer users and equipment manufacturers. And it’s hardly surprising, given their accelerated speeds, greater durability and much more compact sizing. In addition, as the prices are coming down and larger capacities become available, the ubiquity of SSDs will probably be increasing.
What are the main differences between full and quick format?
Most ordinary computer users feel terrified when they see a message about disk formatting. Mainly because they have no (or a very general) idea of what it is. So, let’s find out what formatting is, what types of formatting exist and what is the difference between quick and full one.
How to safely disconnect a USB-connected storage from a computer?
When using an external USB-connected data storage device like a USB thumb (or an integrated card reader) sometimes you may doubt whether your PC is still accessing or writing information to it. And if you just unplug the storage in the middle of the process, that might result in your files getting corrupted, unreadable or both. At the same time, when you disconnect it using the safe removal option, the chances of data corruption or loss decrease significantly. So, let’s see how to safely unplug a USB-connected storage from your PC or Mac.
What are external hard drives and what are their main types?
An external hard drive (also referred to as a portable hard drive) is a data storage device that is externally connected to a PC via USB, eSATA, or FireWire connection. Usually such devices get power directly from the computer to which they are attached via USB (except for 3.5" hard drives typically equipped with an external 12V power supply).
What’s inside a USB stick and what types of thumb drives exist?
A USB flash drive, also known as a pen drive, USB stick, USB drive, jump drive, thumb stick, stick drive and memory stick is a small, portable and rewritable data storage device. USB drives do not require additional drivers and are usually compatible with all operating systems (including BIOS) and all types of devices equipped with a USB port.
What is a flash memory card and what types of flash cards exist?
A memory card (also referred to as a flash card, flash memory or flash memory card) is a small portable data storage medium that is commonly used in an electronic device for storing almost all types of data: photos, videos, music, documents, games and programs. Essentially, it’s a chip (a set of electronic circuits) that allows writing and rewriting data multiple times.
What is a WD My Cloud Home volume?
Nowadays, almost everybody has an abundance of digital files they want to keep safe and, preferably, always within reach. For this, some choose the traditional time-tested methods of storing data, like the computer’s local hard drives or portable USB sticks, while others go online and use cloud solutions. One of the existing alternatives to both is building a personal cloud storage network in the house or office.
What is BitLocker and how does it work?
Keeping sensitive files on a digital data storage always entails a risk that, at some point, they might fall into the wrong hands. In view of the constant threats associated with gadgets, especially with portable ones, like laptops or USB sticks, developers are seeking to provide their users with peace of mind by introducing diverse security measures. The Windows OS, on its part, offers BitLocker, which has become a common choice for individuals and businesses looking for strong protection of their data "at rest". Here you can find an overall explanation of this feature.
What is APFS encryption and how does it work?
A random person getting their sticky hands on our confidential files is not something we would like to expect. However, Mac users can rest easy in this regard. As one of the most secure platforms, macOS provides a simple way to protect this information from intruders. The native capability of APFS, the Mac’s standard file system, allows encrypting the content of a drive, making it impossible for unauthorized parties to access the locked storage. Here you can learn more about this feature and find out how it works.
What is LUKS and how does it work?
When sensitive information is available on any computer storage, certain measures have to be taken to keep it away from the prying eyes. And instead of just putting it behind an average password, one can convert this data into unreadable text, so that only an authorized person could decipher it and read the original content. This method of protection is widely known as encryption. On Linux, it can be implemented through LUKS, the kernel’s standard solution serving to encrypt entire disks. Let’s look closer at this technology and its working principles.