Google Search Engine

Tuesday, December 1, 2009

Fixing Your Mistake With Hard Disc Recovery

You may need to perform hard disc recovery if you have downloaded a virus or just deleted a file whether it is on purpose or by accident. There are many different options available and your computer may come with its own data recovery software. It is important to remember that there are options and you do not have to start over from scratch.

When you delete a file or put it in the recycling bin you are not actually wiping that file from your computer at that moment. Instead the space that that file occupies is now considered free and can be used to write other data or programs. So your data can actually last on your computer for a long time after you have deleted it.

There are plenty of data recovery programs that can be obtained and used to restore you deleted data. There are even some programs that can recover data from reformatted discs.

You should not jump the gun but take some time to research the recovery options available for your problem. Many times actually opening inaccessible files is much easier then you may think.

However sometimes you cannot access your data due to a hard drive hardware error as something mechanical in the hard drive is not working. In this case you may need to use the services of a data recovery specialist as it is not recommended that you open the hard drive yourself. Additionally hitting, throwing and freezing your hard drive will only damage the drive further.

The best way to recover data is to take preventative steps. You should always back up your hard drive regularly. Just ask yourself how much data are you willing to lose. If the answer is none then you should back up every day or every time after you change data on your hard drive.

ecure Your Data With Backups and Encryption

Anyone who regularly uses computers has experienced a disaster of some sort. Either your computer crashes just before you save your document to disk, or in the worst case a computer failure renders your disk unreadable. While you might think that hard disks don't fail very often, it happens much more often than you think.

It's important to prepare for this type of disaster, and of course being prepared means having your data backed up. When - not if - the worst happens you need to be able to recover important documents and information from other sources.

Backing up is actually quite easy to do these days. There are many simple, automated solutions, a good selection of which are also free. Even if the right tool for you is not free, if you have ever experienced a failure you'll quickly agree that a reliable backup strategy is worth every penny.

You may not even need to look far. Many operating systems and most external hard drives now come complete with automatic backup software which you can schedule to complete daily at a time convenient for you.

Another scenario to prepare for is theft; your computer, particularly a portable laptop or netbook, could be stolen. Then not only do you lose your data, but some thief might now have access to it.

This is when encryption plays an important part in keeping your personal data and sensitive information secure and safe. One approach is to use encryption tools such as TrueCrypt to create virtual encrypted drives whose contents are nearly impossible to access without the passphrase.

Stand-alone single-file encryption tools such as AxCrypt, or encryption options in tools such as 7-Zip are also reliable and secure options for keeping data secure. Do not rely on password protection built into most general purpose applications such as Word or Excel - most of those are fine for keeping honest people honest, but are easily cracked with information found on the internet. Similarly, it's unwise to rely on Windows own Encrypted Filesystem - not because it's easy to crack, but rather for just the opposite: there are common scenarios that, without appropriate precautions, can render your data completely inaccessible - even to you.

While you may not experience a computer disaster anytime soon, like the Boy Scouts you still need to be prepared. Back up your computer and consider keeping your sensitive information safe and secure in some encrypted form. With the process both simple and often free, it pays to be prepared.

Error Message - iPod Service Error

Ever since iPods have been introduced, their popularity has been on the rise. There are a number of different types available with different storage capacities. Portable media players are useless if the data on them ever becomes inaccessible. iPod data is vulnerable even when you have problems with iTunes. Whenever anyone gets a new storage device, the first thing one is advised is to take a back-up of whatever is stored on it. No matter how many back-ups you take, in dire circumstances we tend to panic. If your back-ups are inaccessible for some reason, use a recovery software and reclaim your data.

One of the most common error messages one sees is:

"iPod Service Error"

Cause:

The reason behind such kinds of error messages are mainly:

-the software is corrupted

-device-interface errors

-software conflicts

-windows does not recognize the iPod

Since iTunes is the interface between the computer and the iPod, this error message means that iTunes is not functioning properly. (This error message is only seen by Windows users. Mac users should not face most of the above problems since both have been manufactured by the same company.)

Resolution:

You can resolve the above problem by un-installing and then re-installing iTunes. Although your data is supposed to remain safe during the process, ensure you have a back-up of your iTunes data. This is just in case for some reason you do need to recover iTunes data.

To un-install iTunes:

Go to Control Panel, select Add or Remove Programs. Then choose iTunes from the list and press Remove.
Restart the computer. In the drive where the OS is installed, delete the iTunes folder. Then in the iPod folder, delete the "BIN". Empty the Recycle Bin. Restart the computer again. Download iTunes, and the iPod Software, to reinstall them. Your iPod should now connect to the computer and iTunes properly.

If the above method does not help, try changing the system configuration settings. If during any of the steps, you lose your iTunes/iPod data, you can retrieve it using iPod recovery software available on the Internet.

Stellar Phoenix iPod Recovery, is a utility tool, designed to scan iPods to recover iPod data. The software supports iPod Classic, Nano, Shuffle, and Mini. It also supports MIDI, OGG, AVI, MOV etc file formats, thus making it possible to recover all types of data. You can also view a thumbnail preview of the recoverable files.

How to Recover Accidentally "Deleted All" Photos

A photograph is the best way to capture a moment and hold onto it for life. The best thing about it is, no matter how you have the photo saved, if after a few years you realize that you don't want that particular photo, you can simply delete it. Often when you have a sack-full of pictures, you feel like cutting out the 'not-so-nice' ones. Sometimes due to some silly mistake, we end up deleting pictures that we want. More often than not, we don't even keep back-ups of the images. This means that once we delete those photographs, we have nothing to compensate their loss. All the repenting doesn't help the deed that's done. At such times you can use a photo recovery software to recover the pictures.

An instance of the above situation could arise when you have wedding pictures where the camera-man takes a lot of unwanted ones. You decide you want to delete some of them before you make copies of the CD to distribute to among friends and family. Instead of just a few of your pictures being removed, all of them get deleted. You go to the recycle bin, but they aren't there either.

The reason for this is that most of us have a habit of pressing "SHIFT" while deleting anything. When you right click to delete images, the "DELETE" and "DELETE ALL" option are one after the other. It's possible that instead of choosing the former option, you chose the latter one. When you press "SHIFT + DELETE ALL" every photo in the folder gets deleted permanently. These will not be in the "recycle bin" either.

These pictures can still be recovered. If you have a back-up, nothing like it, just restore the picture from there. In case you don't have one, you can use a photo recovery software and recover lost photos. Even after the pictures have been deleted from your computer, the file system of the computer stores them. This enables specially designed software to scan it and retrieve photos. You must ensure to use a safe one, since using any counterfeits could cause irreversible damage to the pictures.

Photo Recovery is a digital photo recovery tool. It has a simple GUI which also gives users thumbnail previews of the recoverable data. The software supports all popular image, audio and video file formats (JPEG, JPG, BMP, AVI, MOV, WAV etc.) allowing you to salvage photos and videos with just one software.

How to Recover MDB Files Quickly

Finding a corrupt MS Access database or an 'unrecognizable file format' message is all in a day's work for people working with Access databases. Being a well known database for its speed to access data rows and its ability to encrypt data efficiently, MS Access has many laurels in its pocket but being a highly fragile database isn't one of them. If you too are having problems with your Access Databases, its time you learn how to fix them.

From the age old MS Access back in the days to the brand new and most robust MS Access 2007, the Access Database has travelled a long way from being just another common man's tools for using databases to a high end industry database that is easy on the resources and provides almost all the features that big boys like MS SQL, PLSQL and MySql provide. Very useful to professionals as well as newbie's for creating intuitive frontend as well as intensive backend database, MS Access still has its share of downturns and susceptibility to changes is one of them.

Ever tried renaming a MDB file? Changing the order of columns just so it looks more organized? Or changing relationships in the database? If you have performed any of the above tasks, quite more than often, you would have suffered from corrupted Access databases. Follow these steps to recover your MDB files quickly.

• Back it up: If you get a corrupt MDB file, remember to back it up by creating a copy and saving it somewhere else on your system.

• Use inbuilt tools for recovery: MS Access provides many database recovery and performance enhancement utilities. By using the restore feature available in MS Access, users can easily recover MDB files with low level corruptions.

• Use a Recent Backup: While using recovery tools it is advised to use a recent copy of the backup and not an age old one.

• Use JetComp.exe: An excellent utility that can be used to recover some files with corruptions, JetComp.exe can be a pocket friendly way to get your MDB files recovered.

If you suffer from frequent errors in your Access databases, you would be happy to know that such file corruptions are easy to fix and you would be able to recover MDB files with ease with the use of Advanced Access Repair that not only recovers MDB files but also recovers and repairs Access Databases with one click function.

Recover Access From Compile Time Errors

After long nights and tiresome days of creating a perfect MS Access database, all hell breaks loose when suddenly you notice that you are not able to save your database because of a compile time error in MS Access. Read on to find out how you can get rid of compile time errors and enjoy the fruits of your labor.

Compile time errors in MS Access can have various causes and this it is difficult to pinpoint the exact one unless a careful study of the MS Access reporting tool is performed. Even though you may be seeing the errors at compile time there are many stages in the compile time that can generate separate errors and thus they can be very beneficial in tracking the exact reason behind an MS Access error. The various states that can trigger an error at compile time in MS Access are:

• Compilation Stage: This stage refers to the actual creation of the database and suffers from most errors because of its constant state of vulnerability. Users frequently test a database with its tables, relations, row and columns and generate reports that access the database elements while creating and dropping connections at a rapid rate. One of the best ways to avoid compile stage errors is to have good database coding without errors. If you are frequently haunted by compilation stage errors, it is better to go for third party software to recover Access database.

• Mounting Stage: This is the part where database is created and finalized for final use. All databases become fit to use after successful completion of this stage only. As database mounting is a hardware intensive procedure you have to make sure you have the right hardware. As the system tries to access the data at a rapid rate, it is only beneficial that you have a fast data seeking hard disk so that nothing is stored in the buffer.

• While Performing Changes: Whether you change the filename or configure some properties, MS Access databases are easier to corrupt and can very easily turn to erroneous one's. It is not possible to always be cautious about the state of Access databases thus, users are advised to use software that can recover Access databases with ease. Software like Advanced Access Repair is one such software that can be used to recover Access quickly and effortlessly.

Repair Access Files That Got Corrupted

You may be the most cautious person when it comes to handling files and folders on your computer, but believe it or not, if you are a user of MS Access Database files, someday or the other, you will end up getting Access database file corruption or in other words, MDB corruption. Read on to know what are the causes as well as the available methods that can be used to repair Access files.

Quite possibly, MS Access files are one of the most fragile files available on your computer's hard disk and there is nothing that cannot corrupt these files. Anything from a friendly rename operation on the MDB files or a shift of path can lead to Access database file corruption. Access files are so fragile because they have a structure that is optimized for fast data retrieval along with equally fast update and insert operations. While Access files can be made more robust by changing the file options, you will lose out on the database speed and agility to read data in case of filters in the database query. The best choice at the end of the day remains to let Access databases be susceptible to changes so as to maintain speed. What about database corruption? Yes, we can take care of that by using utilities available in MS Access as well as using third party professional software that can be used to repair databases with ease. Let's see how.

Using Jet Compact Utility To Repair Access Databases

Jet compact is a useful utility that can be used to heal databases that are corrupted due to changes. Usually, when MS Access finds out that a database file needs repair, it shows a message that allows the user to begin the automatic database repair process, thus eliminating any need for specialization.

Another way to repair access databases is to use the 'Database Utilities' menu item under 'Tools' menu and click 'select and Repair Database' option.

Even though using this utility can be beneficial, it does not serve advanced repairs and thus rises the need to use third party software like Advanced Access Repair that uses sophisticated algorithms to detect the type of database corruption and automatically fixes it all with the click of a single button. Such software also negates the chances of accidently erasing the data that your database files have and assure full Access database repair.

Beginning a Data Recovery Project and Why This is Crucial

Setting up a "Data Recovery" project takes some time to get started. The time you need to develop a full a "Data Recovery" project plan varies considerably, based on the size of your organization, the number of critical business functions, and the level of commitment your business is willing to make.

I estimate that developing a DR project takes three months for the very smallest organization (less than 100 employees and only one or two critical applications) and two years for a large organization (thousands of employees and several critical applications). But you have many other variables besides company size to consider.

Gaining executive support is a must because "Data Recovery" projects are disruptive. They require the best and brightest minds in the business, taking those minds away from other projects in the organization. From a strictly financial perspective, data recovery planning doesn't provide profitability, nor should you expect the organization to become any more efficient or effective.

You may find selling the idea of a "Data Recovery" project to management difficult. A DR project doesn't have a ROI, any more than data security does. Both data recovery planning and security deal with preparing for and avoiding events that you hope never happen (and if you do your job correctly, the fact that the events don't happen is your return on investment). Still, you may need to convince management that DR planning is a worthwhile investment for any of the following reasons.

Disaster preparation and survival: The most obvious benefit of a completed DR plan is the organization's survival from a disaster. Survival that comes as a result of planning and preparation.

Disaster avoidance: Data recovery planning often leads to the improvement of processes and IT systems that makes those processes and systems more resilient. Events that would result in a severe business interruption before you had the DR plan in place become, in many cases, just a minor event artier you enact the plan.

Due diligence and Due Care: Few organizations have never experienced an accident or event that resulted in the loss of data. Neglecting the need for "Data Recovery" planning can be as serious an offense as neglecting to properly secure information. DR planning protects data against loss. If your organization fails to exercise this due care, it could face civil or criminal lawsuits if a preventable disaster destroys important information.

Stop the Physical Memory Dump Error - What to Do to Make This Error Go Away

The "Physical Memory Dump" error is one of the blue screens of death, which can stop your PC from working, causing it to restart without warning. This is a major problem as it makes your PC lose your work and unsaved games. However, there is a way to fix it.

The physical memory dump is actually an error from the heart of Windows. It's basically like the "ejector seat" for Windows, where it actually 'dumps' all the information that is open in your PC at the time. If Windows hits a serious error, it has to restart... but before it does so, it tends to save a lot of your information in a file that's kept on your hard drive. Although this file is non-recoverable, the error is basically Windows' way of protecting itself from any serious damage.

The error is caused by two things. The first is hardware compatibility - if you've just put a new piece of hardware into your computer, it might not be compatible with other parts of your system... making your PC have a fatal error. This means that if you've just put some new kit in your computer, such as a new hard drive, graphics card or even USB drive, then you will want to remove it immediately and try using your system again. This is a common problem with people who have upgraded their machines, and have non-compatible hardware trying to work together.

The second cause of the error is actually to do with the software of your PC. Whenever you use software on your computer, all sorts of settings and information is being opened by your computer. This is how Windows was designed, but it is really one of the biggest causes of the Physical Memory Dump. What happens is that since all your software needs to 'remember' a lot of information each time it loads up, it saves many details in the 'registry' database. This is a database which stores the likes of your desktop wallpaper and even your Internet bookmarks & is very important for the smooth operation of your PC.

However, the registry is actually used so much that many of its settings and files are saved in the wrong way, making them unreadable. This means that the next time your software needs to open the settings, it cannot, causing a fatal error in Windows and forcing it to perform the Physical Memory Dump procedure. This is the most common cause of the error and explains why it can be very random. But it's also very easy to fix - you just need to use a registry cleaner tool to scan through the entire registry database and fix any of the corrupt files that might be causing a problem. These tools work to get the entire registry in order and fixes all of the corrupt files that might be lurking in there.

How to Resolve "B-Tree Chain Linkage Mismatch" Error Message

The fast results of SQL queries is a result of b-tree indexes used by a SQL Server. A single B-tree consists of number of index nodes, root nodes, branch nodes, and leaf nodes that enable you to systematically store your data.

Corruption in any of the nodes (specially index nodes) can result into inaccessibility of records stored in the database. In most of these situations, you encounter an error message stating the exact cause. To surpass the above database inaccessibility circumstances, you will need to use restore the data stored from an updated backup. However, in absence of an updated backup or backup falls short to restore the required data, then you will need to search for advanced third-party sql repair application.

Consider a practical scenario, where you receive the below error message when you attempt view the records saved in your SQL Server database:

Table error: Object ID O_ID, index ID I_ID. B-tree chain linkage mismatch. P_ID1->next = P_ID2, but P_ID2->Prev =P_ID3.

After the above error message appears, the data stored in the database becomes inaccessible. Moreover, you receive the same error message each time you attempt to access the database.

Cause

The root cause for the occurrence of the above error message is the break in the logical page chain at any level (root or leaf) of B-tree. This scenario can occur due to various logical or physical factors.

Resolution

For absolute resolution of the above error message caused due to either logical or physical reasons, you will need to follow the below measures:

Execute DBCC CHECKDB command, with repair clause to resolve the error caused due to logical corruption.
Change the physically damaged component in case of physical corruption. To identify the damaged component, you will need to examine the application the application and Microsoft Windows system logs.

If the above the measures fail to perform, and there is database backup available, then you will need to search for powerful SQL Repair software. These SQL Database Repair tools serve as self explanatory and repair centric tools and are completely non-destructive in nature.

Stellar Phoenix SQL Recovery is an advanced application that is competent enough to repair corrupt SQL Server 2008, 2005, and 2000 databases after all logical scenarios. The repair sql software employs high end scanning methods to recover almost all SQL database components including tables, views, rules, stored procedures, etc.

Saturday, October 31, 2009

How to Fix DLL Errors

The Dynamic Link Library, otherwise known as DLL, is part of an application. Applications depend on DLLs to function properly. If a DLL isn't found, be it a Windows DLL or an application DLL, most likely the software will either fail to start or will not function properly even if it does start. Therefore DLLs are important.

When you encounter a DLL problem, take note of any error messages that appear. Then, do a search on the web by typing in the exact error. There are usually people who have encountered the exact same problem and provide fixes to the problem.

Alternatively, you can try downloading the most updated drivers and installing them, assuming the DLL is for a driver. Otherwise, if it's for an application, you can reinstall the application to see if the problem persists. This step usually resolves the problem.

Another cause for the DLL error can be due to spyware or adware that is installed on the computer. In such a case, use an anti-virus program to detect and clean the system of the problem. You may also want to use AdAware or Spybot as a more lightweight alternative to the anti-virus program, but I suggest using an anti-virus for better flexibility.

After doing all of the above, the next step is to fix the registry. It is highly likely that at this point, the registry needs to have maintenance performed on it to remove wrong entries and to improve system performance. A missing DLL often indicates that there is wrong information inside the registry. This is the easiest to fix if you use a registry cleaner software.

A registry cleaner software helps to go through the entire registry to detect errors and fix them. There are plenty of solutions for registry cleaners so it is very important to find a good one; not all of them are equally good.

A good registry cleaner will help keep your Windows system in good shape and performing optimally. If you are unsure which registry cleaner to use, you can take a look at these reviews of registry cleaners.

Remote Data Backup Pitfalls and Solutions

While backing up data manually takes a lot of time, it still is the most used method these days. A good remote data backup software program automates this entire process and also allows you to backup your data even when you are traveling. The latest software is even sensitive to the need to conserve bandwidth. This allows you to continue to work while it backs up your information by running in the background.

If your company is like most companies you want a good backup software to be a part of their arsenal. Using a computer is common nowadays, and that brings with it, an increased need of finding some solutions to safegard the data. Due to the great demand as well as the fierce competition in the computer segment of the market, the prices of computers are reaching record lows. This has in turn led to a greater demand for a suitable solution for making backups.

Computer users tend to have duplicate data on their computers, estimates say its over 80% duplicate on corporate computers. Thats why it is crucial for businesses to get this problem solved. Source based data deduplication can save up to 90% bandwidth and storage when compared to traditional backup methods. If you have employees in the field using laptops for critical data storage then you need this information.

Though a remote data backup program and access to servers as well as other applications it is convenient for employees backup all their critical data. Most data losses are email related so if Outlook is used as the email client, it is important to backup Outlook as well. One of the main reasons to protect your data is that laptops are frequently stolen or lost while traveling.

Backing up data should be a priority among companies who plan to extend their reach to a global market. It makes work less complex and provides better security for the files and software of the company. Be sure that your remote data backup program has the correct features before implementing it into your company since it is going to be protecting all you critical data.

Data Recovery From a Burnt Hard Disk Drive

A Hard Disk Drive is the main storage area in your computer system. It stores all your applications, documents, system files etc. The Hard Drive also stores your OS used to run the various applications etc. Today, most people who use computers are aware of the numerous ways in which it can get damaged and are therefore ensure the safety of their data by taking timely back-ups. We protect our systems and data as much as possible to ensure no data loss occurs, or even if it does, we have the means of getting it all back intact. However when our data is lost due to some natural causes such as a fire or flood and the Drive itself does not work, all these 'technologies' are of no use to us. One should then go to Hard Drive Recovery Services.

A simple instance of such a situation could be if your house or office catches fire. Once your hard disk drive is burnt, you would generally loose hope of ever getting back what was on it.

Cause:

All the plastic components and small electrical parts are either burnt, melted or charred.
Added to this is all the fire fighting equipment-water, sand
Debris, smoke etc cause damaging effects to the read/write head etc.

Resolution:

The Hard Drive may have been burnt but experts from Data Recovery Companies, having Hard Drive Recovery Services, can still get back your lost information. Such damaged drives often have undamaged Head Assemblies, which technicians is such companies can use for Data Recovery Services. Data Recovery Companies have specialized Clean Rooms which are sterilized environments where they work and recover data safely.

Stellar Information Systems Ltd., one of the leading Data Recovery companies, offers Hard Drive Recovery Services. They have Class 100 Clean Rooms, trained professional experts who are highly capable of extracting data from hard disk drives that have undergone physical damage due to flood, fire, hurricanes, water or even viruses.

Save Your Data, Save Your Business!

I know the title of my white paper sounds a bit like the television show Heroes and the first season slogan, "Save the cheerleader, save the world," but I wanted to express how important proper and adequate data backup and a disaster recovery plan is to the success and sustainability of your business. Every day I speak with small and mid-sized business owners and technology decision makers that have antiquated or non-existent data backup plans. Some memorable examples include an organization that was backing their network data to tape only to realize their "tape" was really the head cleaner; and a manufacturer who had all their critical data stored in a networked PC that was sitting on the floor, and then a flood swept three feet of water through their facility. In both examples the organizations lost vast amounts of irreplaceable data.

These are just two examples of dozens that I've encountered in the last decade as a consultant. The proliferation of data has made it more crucial than ever to protect it. In 2007, Jeremy Kirk estimated that the amount of data generated from devices of all kinds, including digital cameras as well as IT systems, was comparable to the number of grains of sand on all the world's beaches. A staggering concept made even more incredible in the fact that 60% of that data was flowing through corporate and business networks. Small businesses would be hard pressed to keep up with that tidal wave, let alone safeguard it.

Data is increasingly taking up space on local machines as well as servers, and some of it is crucial to the day-to-day operation of many SMBs. But as shown above, many businesses aren't aware of this criticality, or may even be stubbornly set in the "it can't happen to my business" mindset. The example I spoke of in the first paragraph really happened, and for a business owner or technology decision makers to bury their heads in the sand is incredibly shortsighted and unnecessarily risky. There are specific ways for an SMB organization to take stock of what they are doing, and it then becomes critical to create a solid disaster recovery plan around their scheduled backup policies.

Less than two years ago, AT&T did a comprehensive survey of the SMB space and found some startling results. According to the study, while 9 out of 10 small businesses said they did back up their data, only 7% took the extra precaution of sending the backups offsite. Of those that did employ onsite solutions, many were still relying on the antiquated tape drive method. In these situations, I always like to quiz a decision maker who swears by his tape backups. I ask them if they have an 8-track player in their vehicle, and they often laugh and say of course not. They have a CD player. I then inquire whether they have a VCR as their main source to record and play television shows or movies. This elicits a similar guffaw and they explain that they in fact have a DVR and/or DVD player. That said, I ask them why they are using outdated technology to protect their business's greatest asset, its data! The reactions range from sheepish embarrassment to annoyed rebuttals.

Either way, I believe the point is a critical one. The SMB firm that takes the proper steps will avoid being a statistic. I allude to the fact that 94% of businesses that suffer a catastrophic loss of data will never survive. Even if backups are done, remember that 71% of tape backups fail when attempting a data restoration. So what can you do to strengthen your plan?

As you can see from the preceding, I'm not a fan of the tape solutions as the main source of backing up critical information. However, I do see value in tape as a second line of defense, such as for archival purposes. There are more efficient and reliable methods of securing company information, both short and long term. Many SMBs have invested in CD or DVD burners to permanently seal the data on physical media. Others have gone to an external hard drive directly connected to the company server. Both are surely improvements over the tape method, but are limited in their ability in terms of quick restore. Not to mention they fall short in geographical diversity, since they are directly attached to the network. Nor do they have the ability to add data from individual PCs attached to the network.

The headliner would be a solution that utilizes the organization's Internet bandwidth and an offsite receptacle for the data store. Continuous Data Protection, or CDP, is the premier method of this type. It started out much like the external hard drive, with wire-speed transfer of all data as it is being generated. This data was shipped to an appliance connected directly to the corporate network. In this way, you can obtain nearly instantaneous recovery of lost files and information. Have you have ever been working on a document, spreadsheet or other project, and suddenly experienced a program failure that cost you the entire body of work? If the corporate backups occur the night before, there's no backup file that can save you. However, the CDP solution mitigates the loss by offering as close to real-time backup as you can get, so that program crash doesn't cost you hours of work. In many cases, the recovery is as simple as point and click.

The deployment of CDP and related solutions evolved to a more secure remote backup scenario. By performing the same backups over the Internet to a remote appliance or array, you gain the added security of not storing the data onsite in case of a disaster or theft. The SonicWALL CDP device in its initial form had this option, sending the data to their datacenter in San Francisco, as well as an agent that can do a full "bare-metal" backup of a server or PC's full contents, including programs and operating systems. In addition, there are software solutions such as CA's ArcServe line. Many IT businesses have started to offer it as a managed service offering, and in some cases as part of an entire Managed Environment offering as an essential module to the management of an SMB network by a trusted partner.

No matter what the decision is on hardware, software or services, the key must be planning and thought. No one likes to think about what could happen in an emergency, it's just not a comfortable happy place for many people. So many small business owners just keep going on their path, with fingers crossed behind their backs. This can be a fatal misstep. A brief article in August of 2008 by technology journalist Ed Bott really summarized the four crucial steps that must be put on paper and prepared for:

1. Know what your data is worth
2. Find a repair/recovery specialist you can trust
3. Have a data disaster plan
4. Do regular data recovery drills

This last step is the one I find most often overlooked or not even considered. So many decision makers just believe that if they have it, it will work. This sounds like the voice in the classic film "Field of Dreams," doesn't it? Many make the mistake of hoping some similar mystical overseer will ensure it all works. As I mentioned before, seven out of ten attempts to restore from the most used tape backup solution fail. There's an old proverb that states simply, "If you fail to plan you are planning to fail." In trying to find the unknown author for this wisdom, I ran across another that seems to fit. "A little risk management saves a lot of fan cleaning." So get fired up about your data, do what you have to do to protect it at all costs from all threats, seen and unseen. Your future just may depend on it, in more ways than one.

SecurElement delivers a comprehensive blend of essential hardware, software, technical personnel, support and maintenance through the innovative Managed Environment program. Offering unparalleled value at a controlled cost, businesses of any size are able to leverage leading-edge technologies and services that maximize productivity, drive bottom line success and solve critical business issues.

Time Out Error Communicating With Server in Outlook Express

Outlook Express DBX files store emails of corresponding folders. The files can get damaged due to several reasons counting unexpected shutdown, virus infection, network errors and others. Since OE doesn't provide any DBX file repair utility, you need to apply and use a suitable backup or a third-party DBX Repair Tool if backup fails.

For instance, the below error might occur when starting Outlook Express:

A time-out occurred while communicating with the server 0x800ccc19

This error doesn't allow you to download or send any email message.

Cause

Among other reasons, prominent reasons for this error to occur are:

  • Antivirus software scanning OE mail folders
  • SMTP or POP3 Mail Server or services issues
  • Inbox.dbx and/or Sent Items.dbx is damaged

Solution

To resolve the existing problem, try following these steps:

  • Configure the antivirus software to exclude the scanning of OE mail folders
  • Make sure that your mail server is working ok
  • Use 'telnet name_of_mail_server 25 (for SMTP) /110 (for POP3)' to check the availability of services. If it is working correctly, you will get a message with code 220 in case of SMTP server and a prompt asking you to enter username and password in case of POP3 server
  • If applying the above steps doesn't solve the issue, your OE DBX file(s) might be damaged. Try these steps to solve:
    1. From Windows Start menu, click Search and then 'All Files or Folder'
    2. Type Inbox.dbx in the Named box and choose your primary hard disk partition in the Look In box
    3. Click Find Now
    4. After the folder is found, right-click it and choose to delete it or rename it
    5. Repeat the above steps for Sent Items.dbx
    6. Restart Outlook Express, it will automatically recreate the renamed or deleted folders but with no data

The above step starts the application to work but doesn't repair the damaged DBX files. To repair them, you need a powerful DBX Repair utility to effectively scan and restore the files' data. DBX Repair Tools prove to be a highly-competent utility to OE file corruption while providing interactive user interface.

Stellar Phoenix Outlook Express Recovery is an advanced tool to repair damaged DBX files created with Outlook Express 5 and 6. It is a powerful DBX Repair utility that preserves the original formatting and content of the recovered contents. The tool is also capable to restore *.eml messages that can be directly viewed in Outlook Express.

Recover Deleted Hard Drive Files Quickly and Safely

Have you lost a critical file that was stored on your computer? Maybe a favorite picture or a term paper you were working or a presentation that is due in the morning. If so, do not worry because you can recover deleted hard drive files.

There are any number of things that could have caused the file to be lost. It could be simply that you deleted it, or it could possibly be from a virus, hard drive errors, or even a power surge. No matter what the reason, you just want to get the file back.

Luckily when you delete a file in Windows, it is not permanently deleted, it is just moved into the recycle bin as a temporary holding place. If you have not emptied your recycle bin, you will probably find your lost file there. However, if you have emptied your recycle bin, now you will need to use a software program to recover deleted hard drive files.

Unfortunately Windows does not come with a utility to recover deleted files. So you will need to download a program for this purpose. There are many available that can restore deleted files from different types of storage media such as floppy drives, hard drives, and memory cards. You can instantly download the programs, so you will be able to get the deleted file back quickly.

One thing that is very important is that you recover your deleted files as soon as possible. The longer you wait the less likely the chance of you being able to recover the file.

If you have just deleted a very important file and needed to get it back quickly, our favorite programs to recover deleted files can be found on our website.

Correct Procedure to Download and Use Recovery Software

If you are trying to recover erased or deleted files it is important not to download any more data, that includes opening more websites.

Every time your computer opens a web page it could be writing over your lost or deleted file.

We will show you how to recover your deleted or lost files the safest way.

Your deleted file is most likely retrievable if you are very careful.

To retrieve your files in minutes follow the procedure below to ensure the best possible outcome.

1) Stop any program that's downloading, defragmentation or formatting.

2) Check if you have more than one Hard Drive or Partition and what Partition your deleted file was on.

3) If you don't know or not sure go to step 5.

4) If you have Multiple Partitions and know which Partition your deleted file was on then install a Recovery Software program on any of the other partitions.

5) If you not sure or want the safest option, download recovery software directly to a USB thumb-drive, any thumb drive over 10 MEG will do the trick. when you are about to download software from the software providers site you want to right click on the download link and "save link as" option to select the USB or a safe drive to save the file to.

6) Install the recovery software on to the thumb-drive and run the program from it.

7) Find your file then Restore your deleted files. if you have multiple files to restore and your external or USB has enough available space restore them to that device.

Using this method you reduce writing over deleted files and avoid losing them for ever. The program we use by this method is available at our site.

Backup and Recovery - The 3 Basic Types of Protection

A backup & disaster recovery plan is a blend of protecting both data & hardware. Data & hardware protection falls into three basic categories: fault tolerance, mirroring or duplication and archived backups.

Fault tolerance

Though Fault tolerance is not a part of backup but it is very much like having a quick-fix or spare parts available at all times, and is often coupled with mirroring or duplication, as well. The goal of fault tolerance is either continuous operation or quick recovery. Fault tolerance for hardware can be as simple as having two Ethernet cards, so that if one dies, the other continues working - or as complex as building a clustered server with duplicates of everything. Fault tolerance can be applied to some degree to individual documents so that if they're trashed or deleted, they can be quickly recovered. Fault tolerance should be applied to group work and group communications systems to provide continuous operations in the event of hardware failure.

Duplication & mirroring

Both of these processes aim at the same goal: creating an exact replica of the primary source and maintaining that replica on its destination. Mirroring pertains to hardware. The process of attaching a second drive so that the data written to the first is automatically written to the second. Duplication (aka replicaiton) - the copying of files from a source computer to a protected destination computer - is an integral part of the backup process that pertains to all data types, whether the data is a document, a database, or an email system. Pointing your backup software at your computer's hard drive and telling it to back up everything (create a full backup) to a tape is a form of duplication because the contents of both the computer and the tape contain the same thing.

The goal of duplicating & mirroring is quick recovery during a disaster.

The mirrored duplicate of a primary data source or an entire groupwork server exists solely to be put into play when the primary fails. Restoring data from a full backup is the fastest restoration from a tape backup. Both data & hardware can be mirrored or duplicated. Whether the protection plan is to duplicate the data, mirror the hardware, or mirror the hardware and duplicate the data the goal is the same - quick recovery in case of failure or loss.

Archived backups

Archived backups take a "snapshot" of data and then place the snapshot in a safe destination. Every time you backup to tape, you copy the original source data onto that tape. Backing up a second time without erasing the tape (known as a normal backup) creates a second, dated copy of the original files. You now have a historical record - day one's files and day two's files. You can restore either day one's files or day two's files, depending upon your needs. This process is called creating an archived backup and is different than a full backup in that it has a dated history of files instead of an exact replica. Point-in-time restoration is the purpose of an archived backup. You don't back up hardware systems; only the data that lives on them.

NEVER Try to Recover Your Own Data - Data Recovery

The hard drive that holds your personal, professional and intimate information is a very delicate component of your computer. While the hard drive may seem like a sturdy piece of equipment, one false move when attempting to recover data can the entire backup file of information could be lost forever. When data recovery specialists are given a drive that has been tampered with, the data is often too far gone to be restored.

The first line of defense that most people choose after losing data is the disk repair utility. Most computer repair functions will write information on the hard drive, essentially creating a new drive with the old data simply wiped away or covered with a deep layer of data that must be sorted through to find the most important files. Rebooting the computer from scratch by reinstalling the operating system is also a huge mistake. These restart disks will erase the files and upload all base files as if the computer were recently purchased.

Opening up the hard drive is another huge mistake. Once the drives are open, the most sensitive components may come in contact with dust, dirt, debris and human fingerprints which could damage the drive enough to make data recovery impossible. Other common mistakes include hitting the drive, dropping the drive or physically harming the drive in some way.

The only solution for data recovery is to take the computer to a specialist who will properly extract the information that appears "lost". While many data recover specialists understand the fact that anger is often associated with loss, the hard drive will never respond to force or physical abuse by handing over the data you once could not find.

Myloer is a hobby writer who usually updates his blogs every day and writes about all kinds of topics. His latest project is about file recovery tools and you can also read his articles about hdd data recovery by following the links.

Hard Drive Repair Using Free Software

Contrary to popular belief, if a computer does not boot due to hard drive corruption all data is not lost and the hard drive may even be repairable. There are 2 types of hard drive damage. One is fixable by you and the other requires a professional data recovery facility.

Physical Drive Damage - Physical damage is the worst. Data recovery can only be done by professionals and can cost up to $1,500 (sometimes higher). Physical damage usually consists of bad actuator arms, damaged platters or fried controller cards.

Non-Physical Drive Damage - Non-Physical damage (NPD) is what we're going to be discussing in this article. NPD occurs when the operating system's file system (fat or ntfs) gets corrupted due to an improper shutdown (for example). While this damage is may seem really bad (if it's preventing you from booting your PC), it's easily fixable with some software that's already including in any Windows PC and a USB external hard drive enclosure.

Here are a list of items that you'll need to follow the instructions below:

Another working computer with Windows XP, Vista or Windows 7
Find out what kind of hard drive you have. There are 2 types. SATA (small flat connector) and PATA (a.k.a IDE) which has a connector with about 30 pins. An external USB hard drive enclosure with a connector for the type of drive you're going to be connecting to it (you can grab one of these at BestBuy for about $50 USD).

Please follow the steps below to perform a non-physical repair (software repair) on a non-bootable hard drive.

1. Take the drive out of the computer.

2. Connect the hard drive to the connector on the USB enclosure.

3. Connect a USB cable from the enclosure to the computer that's working.

4. Power on the USB enclosure.

5. An external drive will probably load in your list of available hard drives. You can see this list by opening "My Computer" or "Computer". Take note of the drive letter for the external hard drive.

6. Now it's time to load a program called CHKDSK (Check Disk).

7. Click Start (if you're on Windows XP) or click the Windows globe (on the bottom left for Vista and Windows 7).

8. On Windows XP click RUN, then type CMD. On Windows Vista and 7 type CMD where it says "Search Programs and Files". This will open a black command prompt window.

9. In the command prompt type chkdsk "the drive letter you want to check": /r and press enter. So here is an example chkdsk g: /r then press the enter key.

10. This process can take hours. I've had a few that took days.

11. If this command completes successfully your drive should be repaired enough for you to recover the data from it and you might actually be able to boot from it again.

A word of warning. If your drive ever has any errors on it (bad sectors) it's reached the end of it's life and should be replaced ASAP. You'll be able to see this in the report provided to by the chkdsk command at the end of it's scan.

Thursday, October 15, 2009

RAID Recovery

With over 20 years of data recovery experience and nearly 200 data recovery engineers worldwide, Kroll Ontrack® has the capacity and technical expertise required to solve complex RAID recoveries. Chat live now

Hard drive data recovery becomes more complicated when a failed drive is part of a RAID array making RAID data recovery one of the most technically challenging types of data recovery.

Kroll Ontrack, as a division of a large corporation, is able to provide unmatched resources and proprietary technology to offer full RAID recovery services, which many data recovery providers can not offer.

With the Ontrack Data Recovery pre-service data recovery evaluation, you’ll know exactly what data you’ll get back before making decisions to proceed with a RAID recovery service.

RAID Recovery Capabilities

Ontrack Data Recovery services utilize advanced data recovery tools and techniques to repair, recover and rebuild inaccessible data from all types of RAID systems and situations:

  • Any RAID level, RAID controller or RAID architecture
  • Any hard drive type, make or model
  • All causes of data loss - recover data from simple, to the most complex and catastrophic, data loss situations - including viruses, natural disasters, accidental deletion, system crashes, corruption, hardware failure and more

RAID Data Recovery Service Options

  • Remote Data Recovery Services - If a RAID or SAN has only one drive failed, our remote data recovery service is the fastest, most convenient and cost effective solution for recovering data.
  • In-Lab Data Recovery Services - For situations in which a RAID has multiple failed drives, our In-Lab data recovery services will utilize our cleanrooms to recover your critical data.
  • On-Site Data Recovery Services - In cases where severe, large-scale data loss occurs or moving storage media would require too much downtime - performing data recovery procedures right at your facility may be the best option.

Server Recovery

Through Ontrack® Data Recovery services, Kroll Ontrack® has saved many businesses from failure due to server crashes and data loss. Chat live now

Losing large amounts of valuable data and experiencing extended downtime can cost organizations thousands or even millions of dollars.

Ontrack Data Recovery engineers recover lost data from file servers, application servers, web servers, direct-attached RAID, network attached storage, and very large SAN storage area network systems.

Server recovery services offered by Ontrack Data Recovery are a step above other data recovery providers because of the extensive amount of experience and proprietary technology accumulated by a team of nearly 200 data recovery engineers worldwide.

With the Ontrack Data Recovery pre-service data recovery evaluation, you’ll know exactly what data you’ll get back before making decisions to proceed with a recovery service.

Server Recovery Solutions

Ontrack Data Recovery offers multiple data recovery service options for recovering lost or inaccessible data from servers. Server data recovery is available for virtually any type of storage system, configuration, and situation.
  • Any server make, model or brand
  • All types of RAID configurations
  • Any operating system (Windows, Linux, UNIX, etc.)
  • All causes of data loss- from simple to the most complex and catastrophic data loss situations - including data loss resulting from natural disasters, power loss or surge, logical or mechanical failures, and viruses

Clients who face data loss disasters on proprietary or very complex systems can take advantage of an in-house team of developers and engineers who are specially trained to provide Custom Solutions for data recovery.

Desktop Recovery

Lost data from desktop computers can be recovered in no time. Ontrack® Data Recovery services are performed by hardware, software and system engineers coupled with dedicated customer service and data recovery specialists to offer world leading service for desktop recovery customers.

Ontrack Data Recovery services for desktop recovery are already trusted by thousands of IT professionals and technology users whose data have become inaccesible.

With the Ontrack Data Recovery pre-service evaluation, you’ll know exactly what data you’ll get back before making decisions to proceed with a recovery service. Chat live now

Desktop Recovery Capabilities

Ontrack Data Recovery services offer multiple data recovery service options for desktop recovery and are available for:
  • Any operating systems - (Windows, Linux, Mac, etc.)
  • Any make, model or brand - in fact, Ontrack Data Recovery services are recommended by major manufacturers
  • Any generation of drives - from oldest to the very newest
  • All causes of data loss - from simple to the most complex and catastrophic data loss situations - including viruses, natural disasters, accidental deletion, system crashes, corruption, hardware failure and more

Signs That a Desktop is Likely to Experience Data Loss

  • Strange noises or grinding sound
  • Blue screen of death
  • Unresponsiveness

What to Do When Your Desktop is Failing

  • Turn off computer immediately - further operation may damage data beyond repair
  • Do not restart computer
  • Do not install or re-install any software
  • Do not shake, disassemble, remove or attempt to clean a suspected damaged hard drive - improper handling may cause more damage
  • Do not use file recovery or other utility software to attempt repair for a damaged or failed drive
  • Do not attempt to dry a wet computer
  • Never attempt to operate any visibly damaged devices
  • Contact data recovery specialists providing Ontrack Data Recovery services immediately

Having long-term relationships with all major computer manufacturers, Kroll Ontrack’s R&D teams gain leading-edge knowledge allowing them to develop new tools to perform successful and quality desktop recoveries.

Laptop Recovery

Laptops are susceptible to physical damage and other problems that affect data integrity resulting in data loss – especially because of their portability.

Through Ontrack® Data Recovery services, Kroll Ontrack® has extensive experience with laptop data recovery from all around the world.

With the Ontrack Data Recovery service evaluation, you’ll know exactly what data you’ll get back before making decisions to proceed with a recovery service. Chat live now

Laptop Recovery Capabilities

Ontrack Data Recovery services offer multiple data recovery service options for laptop recovery and are available for:

  • Any operating systems (Windows, Linux, Mac, etc.)
  • Any make, model or brand: In fact, Ontrack Data Recovery services are recommended by major manufacturers
  • Any generation of drives – from oldest to the very newest
  • All causes of data loss - from simple to the most complex and catastrophic data loss situations - including viruses, natural disasters, accidental deletion, system crashes, corruption, hardware failure and more

Signs That a Laptop is Likely to Experience Data Loss

  • Strange noises or grinding sound
  • Blue screen of death
  • Unresponsiveness

What to Do When Your Laptop is Failing

  • Turn off laptop immediately – further operation may damage data beyond repair
  • Do not restart laptop
  • Do not install or re-install any software
  • Do not shake, disassemble, remove or attempt to clean a suspected damaged hard drive – improper handling may cause more damage
  • Do not use file recovery or other utility software to attempt repair for a damaged or failed drive
  • Do not attempt to dry a wet laptop
  • Never attempt to operate any visibly damaged devices
  • Contact data recovery specialists providing Ontrack Data Recovery services immediately

Having long-term relationships with all major laptop manufacturers, Kroll Ontrack’s R&D teams gain leading-edge knowledge allowing them to develop new tools to perform successful and quality laptop recoveries.

Hard Drive Recovery

Ontrack® Data Recovery services offer world-leading solutions and multiple data recovery service options for all types of hard drive recovery:

  • Any interface: (IDE, EIDE), Serial ATA (SATA), SCSI, SAS, and Fibre Channel
  • Any combination of drives: single hard drive or multiple RAID drives
  • Any brand

Thousands of IT professionals and technology users trust Ontrack Data Recovery services with seemingly unrecoverable data.

Lost data can be recovered in no time whether the hard drive has crashed, has been damaged or has been the victim of a natural disaster. Chat live now

Why Do Hard Drives Lose Data?

Ontrack Data Recovery engineers classify hard drive data loss in two categories:

  • Logical failure - the hard drive is in working order but some files or data cannot be accessed for logical reasons such as a lost partition or accidental reformatting.
  • Mechanical failure - the hard drive is not functioning. The most common causes are head crashes and motor failures.

What Causes Hard Drive Failure?

The list of incidents causing hard drives to fail and lose data is not limited, but some of the main causes that Ontrack Data Recovery services recover from everyday include power surges, overwriting, physical damages, natural disasters, and viruses.

How Ontrack Data Recovery Services Helps to Recover From Hard Drive Data Loss

Data recovery involves more than just replacing parts. Ontrack Data Recovery services use cutting-edge hard drive recovery tools and processes that come from heavy investment in R&D and 20 years experience. A sample of the expert techniques used include:

  • In case of mechanical failure, hard disk recoveries are performed in dust-free cleanroom environments where they are carefully dismounted, examined and processed.
  • Hard drives are imaged. A copy of the disk is made and transferred to a new system.
  • Ontrack Data Recovery tools can “force” the drive to read around the bad area.

Data Recovery Services

Take the expertise of 200 data recovery engineers worldwide. Add twenty years of data recovery experience, the most extensive set of proprietary data recovery tools and processes, and an unmatched commitment to exceptional customer service and you have the perfect equation for solving data loss problems. Chat live now

Through its Ontrack Data Recovery® services, Kroll Ontrack® has the expertise to recover data from all situations:

  • All causes of data loss - from simple to the most complex and catastrophic data loss situations - including viruses, natural disasters, accidental deletion, system crashes, corruption, hardware failure and more.

  • All types of devices and systems - from hard drive recovery to recovering RAID systems - laptops to MP3 players. Ontrack Data Recovery can even recover data from storage or database systems that are unique to your organization.

  • All types of media - including laptops, desktops, servers, RAID, tapes, digital cameras, PDAs, MP3, and all media.

Following your free phone consultation and comprehensive evaluation including Verifile™ Online Data Reports, which lists all your recoverable files, you select from a variety of service methods, pricing options and service levels ranging from an hour to a few days, depending on how quickly you need your data returned.

Saturday, September 12, 2009

The Hidden Costs of Increasing Data Storage

Large-scale IT environments have the resources to manage all aspects of a network expansion, including the initial analysis, equipment installation and wiring, and proper access management to users. In smaller environments the planning may not go beyond the immediate reaction to the user’s needs—that is, “we’re out of space!” While the size of the environment may determine how storage needs are addressed and managed, such things as proper equipment cooling, storage management software that allows for scalable growth (SRM), disaster recovery (including backup contingencies), and data recovery concerns apply to IT environments of every size.
In one scenario, picture a small business with five desktop machines. Despite following careful data compression procedures and rigorous archiving of old files, their system is running out of space. They have a small file server sitting near the users’ desks. Can the business owner upgrade the file server with a bigger hard drive or should he add a separate rack of inexpensive drives? How much space will they need? Will a terabyte be enough? What if they need to upgrade in the future? How hard will it be? What other hidden costs are they going to run into?
In another scenario, a business that uses 30-40 desktop machines has a file server located in a separate room with adequate cooling, user access management, and a solid network infrastructure. But they too are running out of space. When they plan for an expansion, what hidden costs will they need to consider?
In addition to equipment investment, there are many hidden costs to consider when determining storage needs and subsequent management. Following are some hidden costs identified when it comes to storage.
How can you get the most out of existing storage space, not allowing it to fill up so quickly? In conjunction, how do you prevent your storage space from running out before the full life expectancy is realized? This is where storage management software, such as SRM and ILM, enters the picture. Storage Resource Management (SRM) software provides storage administrators the right tools to manage space effectively. Information Lifecycle Management (ILM) software helps the management of data through its lifecycle.
While a viable solution, SRM and ILM software may not cover all the needs of a business environment. SRM and ILM software are designed to manage files and storage effectively, and with a level of automation. Beyond this is where good old-fashioned space management is required. Remember the days when space was at a premium and there were all sorts of methods to make sure that inactive files were stored somewhere else—like on floppies? Remember when file compression utilities came out and we were squeezing every duplicate byte out of files? Those techniques are not outdated just because the cost per MB has dropped, or tools exist to help us manage data storage. Prudent storage practices never go out of style. Power consumption
Manufacturers are working hard to optimize the performance of their machines, yet server power consumption remains on the increase. What will be the power requirement of your company’s new storage solution? Luiz André Barroso at Google reports that if performance per watt is to remain constant over the next few years, power costs could easily overtake hardware costs, possibly by a large margin.
Power consumption can be a hidden fixed cost that may not have been expected with the expansion of storage space. Especially when consider the fluctuating costs of energy, unanticipated power usage increases can be an expensive budget buster affecting the entire enterprise. Cooling requirements
Closely related to power consumption is the need to keep cool the more powerful processors found in the latest machines. Both the performance and life expectancy of the equipment are related to the component temperature of the equipment. Ever since the Pentium II processor in 1997, proper heat dissipation using heat sinks and cooling fans has become a standard for computer equipment. Today’s high performance processors, main boards, video cards, and hard drives require reliable temperature management in order to effectively and efficiently work day in, day out.
If you or your client’s storage requirements grow, proper ambient server room temperature settings are going to be required. Adding such a room or creating the necessary environment may add build-out costs, not to mention increase those power consumption and energy costs mentioned about earlier. Noise
With proper heat dissipation and cooling comes noise. All those extra fans and cooling compressors can create a noticeable amount of decibels. A large-scale IT environment has the luxury of potentially keeping its noisy machines away from the users. However, in a smaller-scale business or home business, some have found the sound levels generated by their storage equipment to be intolerable or at minimum concentration breaking. Such noise makes surrounding areas non-conducive to work and productivity, hindering employee’s ability to simply think. When increasing your data storage, make sure the resulting noise generated is tolerable. Be sure, too, that noise suppression efforts don’t interfere or defeat heat dissipation or cooling solutions. Administrative cost
The equipment investment for the expansion may be significant, but how does this increased storage relate to administrative needs? Should management hire a network consultant to assess user needs, then install, setup, and test the new equipment? Or can the company’s in-house network administrator do the work? A small company has a risk because although they might not be able to afford to have a professional assessment and installation, they may learn the hard way with an inexpensive solution the old adage of “you get what you pay for.”
A non-professional might misdiagnose storage usage needs, set up the equipment incorrectly, or buy equipment that isn’t a good fit for the environment. Such unintentional blunders are why there are certifications for network professionals. Storage management is not as simple as adding more space when needed, it is a complicated, multi-layered endeavor affecting every aspect and employee of a business.
Although using the skills of a professional greatly increases the success of the storage expansion, it will raise the final cost. When considering the monetary expense, businesses must also remember to consider how much other ‘costs’ - overall risk, loss of data availability, system downtime if the implemented solution fails - they can afford. Backup management
How does your business currently manage backup cycles and corresponding storage needs? Do you store your backups on-site, or do you have a safe alternate location at which to store this precious data? Natural disasters such as fires and floods, and extreme disasters like Hurricane Katrina are wakeup calls to many resistant to the idea of offsite data storage. Offsite data storage may be as simple as storing backup tapes off site or archiving data with data farms for a monthly space rental fee, or as complex as having a mirrored site housing a direct copy of all your data (effective but costly).
Whatever backup management and storage process utilized, backups created should be tested, as well as the backup system with the expanded storage to make sure it’s actually backing everything up. There is nothing worse than relying on a backup that doesn’t work, was improperly created, or doesn’t contain the vital data your business needs. Database storage
Databases created as a result of daily business activities can be staggering (as referenced in the earlier example of one large retail corporation’s generation of a billion rows of sales data daily). This activity can result in large amounts of data being stored. One way to optimize database performance is by separating the database files and storing them in three separate locations. In this process, data files are stored in one location, transaction files or logs in a second location, and backups in a completely different location. This not only makes data processing more efficient but prevents having an “all the eggs in one basket” scenario, beneficial when experiencing a process disruption such as equipment failure.
Undertaking this type of database optimization involves the aforementioned planning and equipment costs. But keep in mind how database information has reached into all areas of the business - customer information, billing information, and inventory management information - and how vital it is that this information be protected. Hidden costs associated with protecting database information can escalate quickly. Installation and cabling
The old trend was a standalone unit where the processor and storage were one system. Now the trend is to build a separate networked storage system that can be accessed by many users and servers. In general, there are two types of separate storage systems, the storage area network (SAN), and the network attached storage (NAS).
The separate storage system offers a number of advantages, including easier expansion. The consideration however, is that you will need the network infrastructure to support a separate storage system. In other words, if your storage system is in a separate building, you will need faster network connectivity to avoid a “bottleneck” in communication between the server and the storage device. Disaster recovery
A disaster recovery plan encompasses everything that could happen if there is a system failure due to destruction, natural disaster, fire, theft or equipment failure. Part of a good disaster recovery plan includes a business continuation plan, that is, how to keep the business going and doing business despite the disaster. When planning for a data storage expansion, the disaster recovery plan should be reviewed to make sure the company’s data is accessible in the event of a contingency, and be closely aligned to business continuity planning and efforts. Data recovery
Data recovery can become a hidden cost if not planned for. Every business continuity plan and disaster plan should include professional data recovery services as part of their overall solution.
Ontrack has successfully recovered data for customers who have lost data due to failures encountered during storage space migration or expansion, mirroring failures, system shutdowns due to environmental abnormalities, natural disaster, backup inconsistencies, and software and database corruption.
As you can see, there is much more to scalable growth than just adding more storage space. Although prudent planning and every precaution in instigating and undertaking an effective storage management solution has been enacted, failures and unforeseen circumstances can and do occur. Simply put, despite the best preparation disasters do happen. Ontrack Data Recovery is your partner for success when you or your users experience data loss scenarios and is here to assist with the recovery and restoration of the original data.

Determining the Need to Recover Lost Data

To Recover or Not To Recover, That Is the Question
A data loss has occurred - now what? Determining the need to recover lost data can be a difficult one. There are several things to take into consideration when determining if data recovery is required.
Backup, Backup, BackupEveryone knows the importance of a good backup system, so your first step should be to determine if the data is actually backed up. Many times lost data is stored on a backup tape, backup hard drive, on the network or other various locations throughout an organization.
Unfortunately, locating and reloading the lost information can be time consuming and deplete resources. If a backup is located, it is important to check that the most recent copy of the data is available. Many times backups occur on a set schedule and if modifications to the data were saved after the backup occurred that information will not be accessible.
Re-Creation
Another important option to consider is if the data can or should be re-created. Two items to take into account when considering this option include the type of data lost and the amount lost:
Type of Data - Different data may have different perceived value. Recovering a customer database is (probably) more important than recovering a file containing possible names for a pet goldfish. Is the missing data a high-volume transaction database such as a banking record? This would be nearly impossible to recreate the thousands of transactions that were happening in real time. Other types of data may not be able to be re-created such as digital photos. Understanding the type of data that was lost is imperative to determining your next steps.
Amount of Data - Understanding how much data was lost can help you understand how much time and resources would be required to re-create the data. The more data lost, the more time and resources required to re-create it – if re-creation is even possible.
An additional point to consider is that with strict regulatory and legal requirements, many companies need access to their lost data in order to comply with these requirements. Accessibility to data and the legal requirements surrounding that data are essential to understand when considering if data recovery is necessary or not.
Putting the Power Back In Your Hands
Ontrack® VeriFile™ data reports can help determine if a recovery is necessary. Part of our complete evaluation service, VeriFile puts the power of the recovery in your hands by showing you which files are recoverable and which are not -- allowing you to make an informed business decision on moving forward with the full data recovery.
Perspective
Data recovery costs can be difficult to plan for because they are unexpected. No one wants to lose data just like no one wants their car to break down or to have to call a plumber for a broken pipe. However, to help put it into perspective with other business related costs – vending services and that morning cup of coffee can run between $500 and $1000 every month for a small business office. An average recovery fee for a typical desktop, Windows-based system is around $1,000. Comparing those figures – the true value of data recovery becomes clear.

No Summer Vacation for Data Loss

Tips to protect against data loss during severe weather, heat, electrical storms and major disasters
According to Ontrack Data Recovery, extreme summer weather and the hurricane season cause a significant increase in data loss incidents during the summer months meaning computers users need to pay special attention to protecting their valuable data starting immediately. From intense heat to electrical storms to major disasters like hurricanes, there are a variety of potential problems that can lead to data disasters. The National Oceanic and Atmospheric Administration recently predicted a “very active” Atlantic Hurricane season for 2006 with up to 10 hurricanes, of which four to six could become “major” hurricanes of Category 3 strength or higher. After witnessing the devastation caused by Hurricane Katrina and several other storms that affected the US last year, it is imperative that proactive steps are taken to ensure proper data protection.“As Katrina proved last year, summer storms can cause major data loss problems – but people shouldn’t forget about other weather-related issues like overheating,” said Jim Reinert, senior director of Software and Services for Ontrack Data Recovery. “A few simple steps can help computer users prepare for the upcoming season and avoid the headaches caused by weather-related data loss.”
Ontrack offers these tips to help protect against damage from severe summer weather and lessen the chances of data loss if damage does occur:
Summer heat can be a significant problem as drive failures can result from overheating. Keep your computer in a cool, dry area to prevent overheating;
If you are dealing with large servers, make sure they have adequate air conditioning. Increases in computer processor speed have resulted in more power requirements, which in turn require better cooling – especially important during the summer months;
Electrical storms can be a major problem during summer. Make sure to install a surge protector between the power source and the computer’s power cable to handle any power spikes or surges.
Invest in some form of Uninterruptible Power Supply (UPS), which uses batteries to keep computers running during power outages. UPS systems also help manage an orderly shutdown of the computer – unexpected shutdowns from power surge problems can cause data loss;
Check protection devices regularly: At least once a year you should inspect your power protection devices to make sure that they are functioning properly. Most good ones will have a signaling light to tell you when they are protecting your equipment properly;
Do not shake, disassemble or attempt to clean any hard drive or server that has been damaged – improper handling can make recovery operations more difficult which can lead to valuable information being lost;
Never attempt to dry water-damaged media by opening it or exposing it to heat – such as that from a hairdryer;
Do not attempt to operate visibly damaged devices;
For mission critical situations, contact a data recovery professional before any attempts are made to reconfigure, reinstall or reformat.

Success with Remote Data Recovery™

Data loss can happen to anyone and usually without warning. Remote Data Recovery™ service uses patented technology and trained engineers to allow us to recover data right on your server, desktop or laptop through an Internet connection or a modem. Remote Data Recovery is an excellent option especially for server recoveries because there is no need to dismantle and ship your drive or hardware in for service – which can be very challenging for server recoveries due to security and shipping costs. It also eliminates shipping time which is of the essence when a server is inaccessible.
This article will highlight specifics surrounding instances in which Remote Data Recovery (RDR®) saved the day.
Success Story #1A scheduled data migration to new equipment presented a challenge to IT staff. After the equipment was successfully installed, a migration of user data was started. During the migration, a bug in the destination server's operating system caused the source and destination volumes to become corrupt, making the user data inaccessible. The failed migration happened over the weekend and users had to have their critical files accessible by Monday morning.
Remote Data Recovery was the only option due to time and shipping concerns. While this organization did have a backup, it was weeks old and had limited value. The client had to have the original data recovered.
Success Story #2
A mid-sized enterprise had a rapidly growing storage pool on a SAN system. The user's area was regularly increased on an as needed basis. Using the SAN storage management software, additional storage was added to the user area. While expanding the Logical Unit Number (LUN) the user volume became corrupt and was inaccessible. The storage administrator could not determine what had caused the problem; a full diagnosis of the hard drives inside of the SAN was started. After two days of running the SAN through lengthy tests, it was concluded that the hardware was sound. The volume was still inaccessible and the only options were to reformat the user volume and restore from backup or engage a professional data recovery company. This enterprise chose Ontrack Data Recovery because of the Remote Data Recovery service. Remote Data Recovery engineers discovered that the Logical Volume Management database had become corrupted and that some file system damage had been sustained. Engineers worked around the clock to piece the original volume back together and then copied out the data to another SAN volume.
While ideal for servers, Remote Data Recovery is also ideal for other media ranging from flash drives to floppy drives to desktops and laptops. This next success story outlines how RDR was able to recover multiple laptop users’ data quickly.
Success Story #3 An untested login script was accidentally released to the user groups. This login script started a reinstall of the operating system from core install images. Users logged in Monday morning only to have to wait for an unusually long time to complete the login process. Users quickly discovered that all their data was missing.
This script affected 300 users. The IT department was overwhelmed with angry users. This enterprise engaged Ontrack Data Recovery immediately and chose the Remote Data Recovery™ service because of the logistical nightmare it would be to send all of the laptops in.
The recovery consisted of a three-phased effort for each user's laptop: 1) recover original data from the newly reinstalled operating system, 2) search the entire media for specific files that were not found in phase one, 3) search the entire drive for Microsoft Outlook Personal Store (PST) files.
The IT department was able to get 30 laptops connected at one time and domestic and international engineers worked to complete the recovery within four days.
Remote Data Recovery can truly be an around the clock service. Ontrack Data Recovery can utilize our domestic and International locations to complete remote jobs quickly and efficiently.
We’ve outlined how RDR can help solve data loss situations, but how does Remote Data Recovery really work? Here is a behind the scenes look at how we utilize Remote Data Recovery to recover lost data.
Ontrack Remote Data Recovery consists of three main components:
1) Communications Client – The customer initiates a connection to an Ontrack Data Recovery RDR Server using the specially designed RDR QuickStart™ software. The software is available in a form native to your operating system and also in a self-booting diskette for situations in which the operating system is not bootable. After initiating the application the customer selects the mode of communication, which can include a direct modem or Internet connection.
2) RDR Server – Once the connection is established to the Ontrack Data Recovery Server it is distributed to the next available Remote Data Recovery engineer in any of our worldwide locations.
3) RDR Workstation – A specially designed application allows the RDR engineer to run advanced data recovery tools on the computer system that lost data. Before beginning the recovery process, the engineer enables proprietary technologies that track and backup all changes that will be made to the system. This process provides the engineer with the ability to complete the recovery “virtually” before any changes are made to the system. Any changes made can be reversed or modified in order to provide the most complete recovery possible.
With security identified as a major concern, Remote Data Recovery implements several secure elements to help keep your data safe. Remote Data Recovery uses Port80 TCP/UDP and the client software initiates the connection, not Ontrack Data Recovery. Ontrack Data Recovery also uses proprietary communication protocol and packets in which the packets are encrypted using your IE encryption libraries.
So whether you have a single flash drive with family vacation photos or a server filled with thousands of user’s files (like the success story below), Remote Data Recovery can help you get access to your data again.
Success Story #4During a scheduled firmware update of all servers, storage controllers, and backup tape library machines a large enterprise's Microsoft® Exchange server became corrupted and inaccessible. This organization did have a regular backup schedule, yet the most recent backup was corrupted. This server was one of four servers that handled user's email. The Exchange Information Store contained 3,000 user mailboxes, including many that were of the executive staff, and it was over a hundred gigabytes in sizes.
Onsite technicians started an Information Store repair utility and it had been operating for days with no end in sight. By the end of the 3rd day users were demanding their archived messages. This organization decided to engage Ontrack Data Recovery because they were running out of time.
Initially Remote Data Recovery was started to analyze the Information Store. However due to hardware issues, the IT staff requested onsite staff. One of Ontrack Data Recovery's Remote Data Recovery engineers traveled to the site. During the travel time, the analysis provided by Remote Data Recovery continued on and this was able to give the onsite engineer a jump on the recovery efforts.
Within 15 hours of the engineer arriving, user mailboxes were begun to be copied out. Over the next two days of around the clock service, all of the mailboxes were delivered back to the users. These results show how important it is to engage professional data recovery services early on in the disaster.

Virtualized Tape Library

Virtualization is becoming more and more topical in the computer trade magazines. In some articles, virtualization has been hailed as the next frontier of computing. What is computer virtualization and how can you or your clients benefit from it?
Virtualization is a method of running other software or hardware applications under a host system. The virtual system and the host system would share the same hardware. Virtualization can allow multiple systems to share one physical computer. For example, an enterprise could invest into a computer system with high processing power and maximum memory, then by using virtualization, an administrator could have three or four operating systems running on that equipment (depending on the processing power of the equipment and the operating system requirements). The benefits of hardware cost savings alone justify you or your client’s attention to this exciting technology.
Recently, Microsoft® and VMware® (companies specializing in software virtualization) announced that consumers could download their virtualization software at no charge. The results of Microsoft and VMware publicly releasing their virtual host server software to users free of charge encourages more individuals to become familiar with virtualized operating systems. This familiarity, combined with cheap access to massive amounts of storage (with individual disk drives at 700GB and single 1TB drives just around the corner, multi-terabyte arrays are common place) and RAID technology becoming more widespread and thereby more accessible, is anticipated to produce a proliferation of virtualization across business types and sizes.
Virtualization doesn’t stop with operating systems; you can also have virtualized applications and SAN storage pools. In line with these resource virtualization concepts, presenting storage components like hard disk drives as tape hardware is known as a virtual tape library, or VTL. The topic of this month’s technical article, VTL technology boasts a high percentage of return on investment, offers ease of installation within an existing archival environment, and affords faster data restores. Additionally, VTL doesn’t mean the end of the investment that has been made into physical tape machines or libraries. The architecture of the backup system can still stream data to a physical tape for offsite storage.
In a nutshell, VTL utilizes hardware and software solutions for redirecting the backup data that would have been sent to the tape library to a large RAID array. The backup software is able to do this (by means of hardware and software) by recognizing the RAID array as a tape drive. Traditional backup options, such as Full, Differential, Incremental, and Snapshot schemas still function in the same way in a VTL. Essentially, the backup schema in place pre-VTL implementation will still be available after migrating to a VTL setup.
Storage Concepts of a Virtual Tape LibraryThe storage concepts of VTL revolve around streaming backup data to a RAID 0, or RAID 5 configuration. There are several advantages to streaming the data to a disk array first; the principle among them being speed. Benchmark tests have shown that the transfer throughput (from server to backup disk array) is noticeably increased. This is because the data transfer to magnetic tape media is eliminated. Additionally, retrieval of archived data is also much faster because there is no bottleneck due to rewind and fast-forward operations, or of cataloging tape archives and sessions.
Storage for a VTL system can start at the half terabyte range and go into the hundreds of terabytes depending on your needs. Storage can be high performance Fibre Channel or iSCSI systems. Alternatively, SATA (Serial ATA) and PATA (Parallel ATA) systems are available and are usually lower in cost. All of these storage systems are a good choice for VTL implementations.
VTL software and hardware also support multiple virtual tape libraries. Historically, in environments using a traditional physical tape machine schema employing a one physical tape machine setup it was noticed there was a lot data moving to that one device. To address this data movement issue, IT administrators added multiple tape machines, large tape libraries that employ many tape machines, to spread the workload out and to keep the data transfer balanced. VTL setups offer the same multiplicity of backups running at once, which means you can distribute the archiving process over a greater number of data areas. Despite the virtualization however, the data will still be physically stored on the RAID storage array.
For IT environments that have specific policies regarding offsite storage of data, nearly all VTL systems now support a physical tape library that is connected to the VTL, allowing a consistent flow of archived data to be “re-archived” onto a physical tape—a backup of a backup. This helps to doubly ensure that user files are being protected. The secondary archive is set to a schedule where tapes can be stored or recycled.
Some organizations have produced a VTL setup on a WAN scale. In theory, this enables organizations to host a remote Disaster Recovery site as little as 50 miles away. By utilizing point in time snapshots in conjunction with such a VTL setup, the data restoration during an outage is reduced considerably.
A large number of tape backup applications already employ some sort of tape virtualization. If you have specific requirements in this regard, you should contact your software vendor. So how does the entire system work?
Operation FlowOperationally, the environment does not change and the scheduled backups still happen as they have already been setup. The hardware and software setup may require some installation depending on the equipment installed, with connectivity details, (IP, SCSI, iSCSI, Fibre Channel) dependent on the topography of the network.
With more setup and configuration a more dynamic, fault-tolerant solution can be installed—all without the overhead, media cost, and tape recycling schedules.
What exactly does virtualization bring to this configuration? Virtualization has the potential to remove tape media from the topography completely. As mentioned previously, products are available that can create multiple virtual libraries or tape machines. The advantage is that multiple backups can be running from different servers all into a storage pool. This storage can perform a less rigorous backup to tape, or another VTL. This second level VTL can be slower disk storage and function as an ongoing backup of the first level backup. Easy availability of products to facilitate creation of VTL environments along with affordable technology has made the dual backup process with different schedules possible.
Data Recovery of VTL storageToday’s compliance and regulatory laws are requiring organizations to ensure ‘data availability.’ You won’t get an understanding nod from an auditor by saying, “The server you wanted to look at has just failed.” What happens when there is a failure on the storage array that is hosting your first level or second level backup data?
All is not lost! A professional data recovery firm can rebuild and extract the data from storage arrays that are used in VTL systems, focusing on the data contained within the tape archive files post-extraction. Today’s complex archiving software will store the target files with a high compression ratio and internal cataloging method. Only a competent and experienced data recovery firm like Ontrack Data Recovery will be able to deliver the archived data in a timely fashion.
Regardless of the method or media used to store the data, Ontrack Data Recovery will be able to assist you and your organization should the worst happen. By partnering with Ontrack, you are adding a third level of recovery. Having Ontrack Data Recovery as part of you or your client’s disaster recovery plan, you or your client can weather any data disaster.
Ontrack Data Recovery is the largest, most experienced and technologically advanced provider of data recovery products and services worldwide. Ontrack is able to recover lost or corrupted data from virtually all operating systems and types of storage devices through its do-it-yourself, remote and in-lab capabilities, using its hundreds of proprietary tools and techniques. Ontrack invests in technology and techniques to speed recovery times and enhance recovery capabilities.