Data Recovery Glossary (Letter F)

FAT (File Allocation Table)
A data table stored at the beginning of each partition on the disk that is used by the operating system to determine which sectors are allocated to each file and in what order.

Fdisk
A software utility used to partition a hard drive. This utility is included with DOS and Windows 95 operating systems.

Fetch
The process of retrieving data.

Fibre Channel (FC)
The general name given to an integrated set of standards being developed by an ANSI-approved X3 group. This set of standards defines new protocols for flexible information transfer. Fibre channel supports three topologies: point-to-point, arbitrated loop, and fabric.

Fibre Channel Arbitrated Loop (FC-AL)
A subset of fibre channel network systems interconnection. A serial storage interface designed to meet the needs of high-end applications.

Firmware
Permanent instructions and data programmed directly into the circuitry of read-onlymemory for controlling the operation of the computer.

Firewire
FireWire (also referred to as IEEE1394 High Performance Serial Bus) is a very fast external bus that supports data transfer rates of up to 800 Mbps. It is similar to USB. It preceded the development of USB when it was originally created in 1995 by Apple. FireWire devices can be connected and disconnected any time, even with the power on. When a new FireWire device is connected to a computer, the operating system automatically detects it and prompts for the driver disk.

FIT (Functional Integrity Testing)
A suite of tests on hard drive products to ensure compatibility with different hosts, operating systems, adapters, application programs, and peripherals. This testing must be performed before the product can be released to manufacturing.

Flow Control
In PIO transfers, the ability of an EIDE drive to control the speed at which the host transfers data to or from the drive by using the IORDY signal. The host temporarily stops transferring data whenever the drive deasserts the IORDY signal. When the drive reasserts the IORDY signal, the host continues the data transfer.

Format
A process that prepares a hard drive to store data. Low-level formatting sets up the locations of sectors so user data can be stored in them. Most hard drives are low-level formatted at the factory and therefore do not need to be low-level formatted by the end user. You need to perform a high-level format (with EZ-Drive or the Format command) on your new hard drive before you can use it. Formatting erases all the information on a hard drive and it sets up the file system needed for storing and retrieving files.

Formatted Capacity
The actual capacity available to store data in a mass storage device. The formatted capacity is the gross capacity minus the capacity taken up by the overhead data required for formatting the media.

Form Factor
The industry standard that defines the physical and external dimensions of a particular device.

Full-Duplex
A communication protocol that permits simultaneous transmission in both directions.

Read More

Data Recovery Glossary (Letter E)

EIDE (Enhanced Integrated Drive Electronics)
The primary interface used by desktop PCs to handle communication between hard drives and the central processing unit. The equivalent interface system in most enterprise systems is SCSI.

Embedded Servo Control
The embedded servo control design generates accurate feedback information to the head position servo system without requiring a full data surface (which is required with a “dedicated” servo control method) because servo control data is stored on every surface.

Encoding
The process of modifying data patterns prior to writing them on the disk surface.

Enterprise
The series of computers employed largely in high-volume and multi-user environments such as servers or networking applications; may include single-user workstations required in demanding design, engineering and audio/visual applications.

Error Correction Code (ECC)
A mathematical algorithm that detects and corrects errors in a data field.

Error Log
A record that contains error information.

Error Rate
The number of errors of a given type that occur when reading a specified number of bits.

Extended Partition
You can create multiple partitions on a hard disk, one primary partition and one or more extended partition(s). Operating system files must reside on the primary partition. An extended partition is a partition where non-system files (files other than DOS or operating system files) can be stored on a disk. You can also create logical drives on the extended partition.

Read More

Acronis True Image Home 2010

Acronis True Image Home 2010 A perfect computer backup and hard disk recovery program that allows you to create hard disk drive images and file backups. Acronis® True Image Home 2010 helps you back up computer data and clone hard disk drives (HDD).

Acronis has stepped up its interface not only with an improved, Vista-like look, but with more-logical placement of options, a much better workflow, and much clearer language. Even the help file is friendlier. Combine the program’s nascent sociability with new features–such as One-Click backup, nonstop backup, and online backup–that are actually of use to the average customer, and 2010 is easily the best update to the program in years.

One-click backup is designed to allow less-experienced users to back up as quickly as possible. After you double-click the One-Click icon (the installation places it on your desktop), the program searches for the best location for an initial full backup and performs it. Its location choices were intelligent. With a nonpartitioned drive attached to the system, True Image created a Recovery Zone partition (Acronis’s hidden partition for disaster recovery without a boot disc). When I prepartitioned the same drive as E:, the program saved the image to E:\MyBackup. When no hard drive had enough room attached, the program detected that and started a backup using my DVD burner.

Acronis® True Image Version Comparison:

Features and technologies2010200911 Home10 Home
Acronis Online Backup (New)Yes
Acronis Nonstop Backup (New)Yes
Supports Windows 7 (New)Yes
Archive EncryptionYesYes
Zip FormatYesYes
Backup by File TypeYesYes
Contents SearchYesYes
Dual Destination BackupYesYes
File ShredderYesYesYes
Try&DecideYesYesYes
Drive CleanserYesYesYes
Backup/RestoreYesYesYesYes
Disk ImagingYesYesYesYes
Email Backup/RestoreYesYesYesYes
Acronis Secure ZoneYesYesYesYes
Store to Network Share/FTPYesYesYesYes
Read More

Data Recovery Glossary (Letter D)

Database
A collection of data stored on a computer system medium, such as a hard drive, CD-ROM, etc., that can be used for more than one purpose.

Data Recovery
Data recovery is the procedure used to recover data from a variety of media and operating systems that has been lost by either hardware failure, human error, software bugs, a virus or a natural disaster.

Data Synchronizer
An electronic circuit that uses a clock signal to synchronize data to facilitate interpretation.

Data Transfer Rate
The rate that digital data transfers from one point to another, expressed in bits per second or bytes per second. Data Transfer Rate to Disk: The internal disk transfer rate in Mbits per second.Data Transfer Rate from the Buffer to the Host: Based on the transfer of buffered data in MB per second.

Dedicated Landing Zone
The designated radial zone of the disk, usually at the inner portion of the disk, where the heads are stored to avoid contact with the data cylinders when power to the drive is off.

Defect Free
A term used to describe recording surfaces that have no detectable defects.

Defect Management
A general methodology of eliminating data errors on a recording surface by mapping out known defects on the media. The defective areas are rendered inaccessible, so that when information is written to the disk, it is stored to non-defective locations on the disk.

Differential SCSI
An electrical signal configuration which uses pairs of lines for data transfer. Used primarily in applications requiring long cable lengths of up to 82 feet (25 meters).

Direct Memory Access (DMA)
A process for transferring data directly to and from main memory, without passing through the CPU. DMA improves speed and efficiency by allowing the system to continue CPU processing even while it is transferring data to/from the hard drive.

Directory
A list of file names and locations of files on a disk.

Disk
A rigid platter, usually constructed of aluminum or mylar, with a magnetic surface that allows the recording of data, that is stored inside the drive.

Disk
A portion of a computer’s RAM set aside for temporarily holding information that has been read from a disk. The disk cache does not hold entire files as does a RAM disk, but information that has either been recently requested from a disk or has previously been written to a disk.

Disk Controller
The chip or circuit that controls the transfer of data between the disk and buffer. (See also disk drive controller and interface controller).

Disk Drive
The motor that actually rotates the disk, plus the read/write heads and mechanisms.

Disk Drive Controller
The hard disk drive controller electronics which include the disk controller and the interface controller. (See also disk controller and interface controller.)

Disk Operating System (DOS)
The computer program that controls the organization of data, files and processes on the computer.

Disk Transfer Rate
Speed at which data transfers to and from the disk media (actual disk platter); a function of the recording frequency. Typical units are bits per second (BPS), or bytes per second. Hard drives have an increasing range of disk transfer rates from the inner diameter to the outer diameter of the disk.

Distribution Channel
Electronics distributors and certain retail chains that deliver electronic goods to end users through value-added resellers and some retail stores.

Read More

Windows Forensic Analysis DVD Toolkit, Second Edition

Windows Forensic Analysis DVD Toolkit, Second Edition Windows Forensic Analysis DVD Toolkit, Second Edition by Harlan Carvey.

Details:

  • Paperback: 512 pages
  • Publisher: Syngress; 2 edition (June 11, 2009)
  • Language: English
  • ISBN-10: 1597494224
  • ISBN-13: 978-1597494229
  • Product Dimensions: 9.2 x 7.5 x 1.1 inches
  • Shipping Weight: 2.0 pounds
  • Popular: 4.9 out of 5 starsDescription:

    Author Harlan Carvey has brought his best-selling book up-to-date to give you: the responder, examiner, or analyst the must-have tool kit for your job. Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions, malware infections, and cybercrime happen on these systems. Windows Forensic Analysis DVD Toolkit, 2E covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline when an incident occurs, but due to staffing and budget constraints do not have the necessary knowledge to respond effectively. The book’s companion DVD contains significant new and updated materials (movies, spreadsheet, code, etc.) not available any place else, because they are created and maintained by the author.

  • Best-Selling Windows Digital Forensic book completely updated in this 2nd Edition
  • Learn how to Analyze Data During Live and Post-Mortem Investigations
  • DVD Includes Custom Tools, Updated Code, Movies, and Spreadsheets!Reviews:

    “If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis.”

    -Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

    The Registry Analysis chapter alone is worth the price of the book.”

    -Troy Larson, Senior Forensic Investigator of Microsoft’s IT Security Group

    “I also found that the entire book could have been written on just registry forensics. However, in order to create broad appeal, the registry section was probably shortened. You can tell Harlan has a lot more to tell.”

    -Rob Lee, Instructor and Fellow at the SANS Technology Institute, coauthor of Know Your Enemy: Learning About Security Threats, 2E

    Price:

    List Price: $69.95 Price: $47.08 You Save: $22.81

Read More

Computer Forensics and Cyber Crime: An Introduction

Computer Forensics and Cyber Crime Computer Forensics and Cyber Crime: An Introduction (2nd Edition) by Marjie T. Britz

Details:

  • Paperback: 408 pages
  • Publisher: Prentice Hall; 2 edition (October 17, 2008)
  • Language: English
  • ISBN-10: 0132447495
  • ISBN-13: 978-0132447492
  • Product Dimensions: 9.1 x 6.9 x 0.9 inches
  • Shipping Weight: 1.2 pounds
  • Popular: 4.5 out of 5 starsDescription:

    Completely updated in a new edition,  this book fully defines computer-related crime and the legal issues involved in its investigation. Re-organized with different chapter headings for better understanding of the subject, it provides a framework for the development of a computer crime unit. Updated with new information on technology, this book is the only comprehensive examination of computer-related crime and its investigation on the market.  It includes an exhaustive discussion of legal and social issues, fully defines computer crime, and provides specific examples of criminal activities involving computers, while discussing the phenomenon in the context of the criminal justice system. Computer Forensics and Cyber Crime 2e provides a comprehensive analysis of current case law, constitutional challenges, and government legislation. New to this edition is a chapter on Organized Crime & Terrorism and how it relates to computer related crime as well as more comprehensive information on Processing Evidence and Report Preparation. For computer crime investigators, police chiefs, sheriffs, district attorneys, public defenders, and defense attorneys.

    Review:

    “Computer Forensics and Cyber Crime: An Introduction should he a welcomed addition to all parents’ bookshelves.”

    — Dr: Ed Whittle, Florida Metropolitan University, Tampa, F

    “Computer Forensics and Cyber Crime: An Introduction likely constitute(s) the most definitive reference material on the subject of computer-related crime, cyber crime law, and computer crime investigation including the management and custody of evidence. Although the number of books prepared on the subject of computer-related crime and investigations has increased quite a bit in quantity and quality during the last two years, to my knowledge, they are not as thorough, comprehensive, and easy-to-read as this one …this-text is far superior to any of those… This book could very well become the Bible for computer crime across the U.S. and possibly in Britain, Canada, and elsewhere too.”

    — Scott Senja, Weber State University, Ogden, UT

    “This is the most extensive and comprehensive text reviewed in our quest for appropriate material.”

    — Karen Weston, Gannon University; Eric, PA

    Price:

    List Price: $65.20 Price: $49.52 You Save: $15.68

Read More

EnCase Computer Forensics

EnCase Computer Forensics EnCase Computer Forensics(includes DVD): The Official EnCE: EnCase Certified Examiner Study Guide by Steve Bunting.

Details:

  • Paperback: 648 pages
  • Publisher: Sybex; 2 edition (December 5, 2007)
  • Language: English
  • ISBN-10: 0470181451
  • ISBN-13: 978-0470181454
  • Product Dimensions: 9.2 x 7.4 x 1.6 inches
  • Shipping Weight: 2.2 pounds
  • Popular: imageDescription:

    EnCE certification tells the world that you’ve not only mastered the use of EnCase Forensic Software, but also that you have acquired the in-depth forensics knowledge and techniques you need to conduct complex computer examinations. This official study guide, written by a law enforcement professional who is an expert in EnCE and computer forensics, provides the complete instruction, advanced testing software, and solid techniques you need to prepare for the exam.

    Key topics include:

    • Understanding Computer Hardware. Understanding computer components, boot processes, partitions, and files systems, so you can explain them to a jury
    • First Response. What to do and how to follow procedures when first entering a scene
    • Acquisition of Digital Evidence. Creating EnCase boot disks; booting with EnCase boot disks; and drive-to-drive, network cable, FastBloc, Linen, and Enterprise acquisitions
    • EnCase Forensic Software Overview. Tour of EnCase environment including software, menus, and capabilities
    • Report Writing. Sample reports from real-life cases (names changed)
    • EnCase Legal Journal. Essential information on operating within the law and giving expert testimony

    Price:

    List Price: $69.99 Price: $35.28 You Save: $34.71

Read More

Computer Forensics: Principles and Practices

Computer Forensics: Principles and Practices by Linda Volonino, Reynaldo Anzaldua, Jana Godwin

Details:

  • Paperback: 552 pages
  • Publisher: Prentice Hall; 1 edition (August 31, 2006)
  • Language: English
  • ISBN-10: 0131547275
  • ISBN-13: 978-0131547278
  • Product Dimensions: 8.9 x 7.4 x 0.9 inches
  • Shipping Weight: 1.8 pounds
  • Popular: imageDescription:
    For introductory and intermediate courses in computer forensics, digital investigations, or computer crime investigation By applying information systems, computer security, and criminal justice principles and practices to crime investigations and other legal actions, this text teaches students how to use forensically-sound methodologies and software to acquire admissible electronic evidence (e-evidence) with coverage of computer and email forensics, cell phone and IM forensics, and PDA and Blackberry forensics.

    Review:

    “I highly recommend this book for beginners and experienced forensics experts. It talks about all possible situations you could encounter from a technological and legal stand point. This book really prepares you for how to be ready for the field and explains everything in a really friendly way. The book is a very easy read but is specific and isn’t vague like other books I have read. You can literally keep reading and not have to take a break.”

    Computer Forensics: Principles and Practices is a great teaching tool for forensic investigators of all skill levels. For a beginner, the book takes you through the investigative process from A to Z and doesn’t leave out the more advanced and complicated processes of data carving, email reconstruction and mobile device analysis.

    For the advanced user, there is plenty of information that is both relevant and useful, some of which you may not have seen before. I appreciated this most because of the specific processes outlined and the tools that were described. I am a big fan of books that can help you apply examples to your own processes, something this book does very well.

    Everything from A to Z, this book provides excellent material focusing on process and step-by-step analysis using the latest tools available.

    Price:

    List Price: $105.33 Price: $84.53 You Save: $20.80

Read More

Data Recovery Glossary (Letter C)

CMOS Setup
A program supplied in most systems that allows you to configure internal and external devices.

Cable Select (CSEL)
An alternative option which can be used in place of setting Master/Slave jumpers in the designation of drives in a dual drive configuration. Master/Slave designation is based on the position of the drives relative to the cable. Special cabling is required by the system manufacturer to selectively ground the CSEL signal on one of the IDE cable connectors. For example, when one of the drives is connected to the grounded CSEL conductor, it configures itself as the Master. When the second drive is connected to the other connector, on which CSEL is not grounded, it becomes the slave. This eliminates the need for unique jumpering configurations between the Master and Slave drives.

Cache
High-speed RAM used as a buffer between the CPU and a hard drive. The cache retains recently accessed information to speed up subsequent accesses to the same data. When data is read from or written to disk, a copy is saved in the cache, along with the associated disk address. The cache monitors the addresses of subsequent read operations to see if the required data is already in the cache. If it is, the drive returns the data immediately. If it is not in the cache, then it is fetched from the disk and saved in the cache.

Capacity
The amount of information, measured in bytes, that can be stored on a hard drive. Also known as storage capacity.

Central Processing Unit (CPU)
The main processing chip of a computer. The CPU interprets and executes the actual computing tasks, and has the ability to transfer information to and from other resources over the computer’s main data-transfer path, the bus.

Channel
A connection or socket on the motherboard or controller card. A motherboard may have one or two channels (primary and secondary). If your motherboard has only one channel, you may need to add a controller card to create a secondary channel.

Channel Assembly
In the computer industry, the final assembly of a system by a distributor or reseller from kits provided by the manufacturer and from components shipped directly to the assembler by subsystem makers.

Clean Room
An environmentally controlled, dust-free, assembly or repair facility in which hard drives are assembled or opened for internal servicing.

Cluster
A hard disk term that refers to a group of sectors. A cluster is considered an allocation unit. At least one cluster is allocated to each file, regardless of the file’s size, that is stored in the DOS environment. The cluster size increases with the partition size determined during formatting. With a 1024 MB partition, the cluster size is 32 KB. Each file stored consumes 32 KB of storage space, no matter how small the file. Create multiple, smaller partitions to avoid wasting space on small files. (This definition applies to FAT16).

Command Aging
A SCSI feature that prevents the command reordering algorithm from keeping I/O processes waiting in the command queue for extended periods of time.

Command Queuing
A feature that enables the drive to receive I/O processes from one or more initiators and execute them in an optimum sequence.

Command Reordering
A feature that allows the drive to reorder I/O processes in the command queue, which results in minimizing the seek time and rotational latency and thus increases throughput.

Controller
A device that transfers information between the computer and peripheral devices. The controller (or “control unit”) acts as a traffic manager. See also disk controller, interface controller, and disk drive controller.

Controller Card
An adapter with the control electronics for one or more hard drives. Usually installed in a bus slot in the computer.

Correctable Error
An error that the drive can correct by using Error Detection and Correction schemes.

Customer Configuration Code (CCC)
A firmware revision tracking code that defines a major product change. This number increments as form, fit or function changes are implemented. The CCC code guarantees that the correct revision of drive product is provided to the customer.

Cyclic Redundancy Check (CRC)
Data stored or transmitted with data to detect corruption. By calculating the CRC data and comparing it to the original data sent, the receiver can detect some types of transmission errors.

Cylinder
The cylindrical surface formed by identical track numbers on vertically stacked disks.

Cylinder, Head, Sector (CHS) Addressing
A method of referencing the sectors on a drive as a collection of unique cylinder, head and sector addresses. Each block on the drive will have a unique cylinder, head and sector address.

Read More

What Are You Lack To Be The Top Data Recovery Company?

There are lots of data recovery companies in the world. They have the best data recovery softwares, excellent engineers, first-class cleanroom, etc. However, these companies are difficult to become the top data recovery companies like Ontrack, CBL, SalvageData, etc.

Most data recovery companies can exactly diagnose problems of the Hard Disk Drives. And definitely know how to get the data back. Sometimes the problems can be easily resolved by replacing the damaged parts, like exchange the damaged heads, exchange the damaged PCB, repair the firmware, etc. Sometimes the companies can’t finish the easy operations. Because they don’t have the matching HDD accessories in hand.

If you also encountered these problems, please don’t worry now. We can offer all of the matching HDD accessories which you want. You just need to contact us and issue your detailed requirements. We can send your required HDD accessories with best price to you in short time.

Excellent working condition PCB Logic Boards:
Maxtor, Western Digital, Seagate, IBM, Samsung, Fujitsu, Hitachi, Quantum and many more Manufacturers.

  • Usual sizes start from 10GB and up to 500GB.
  • Prices start from $8.00 for 20GB, 40GB Drives and up to $50.00 for Top of the line drives.
  • We cannot guarantee your drive to be repaired by replacing the board, but we do guarantee our boards in good working condition.
  • With your request, send us a details of your hard drive. Every info that you will provide about your drive will help us serve your needs better.
  • Min Order: 200 pieces

Please do not hesitate to contact us by Email: info@hddzone.com

Read More