What data recovery tools to buy if you want to start a data recovery business?
Free video data recovery training on how to recover lost data from different hard drives?
Where to buy head and platter replacement tools at good prices?
Data recover case studies step by step guide
I want to attend professional data recovery training courses
Some people claimed to have a solution for New Dharma Ransomware (arrow, java, cesar, arena, bip, combo, cmb, brrr or gamma extensions), sample files should be PDF, XLS, DOC or Photo file, thanks in advance for your good co-op.
Some people can generate private key for all email addresses and extensions belonging to Dharma (.bip, .arrow, .java, .arena, .cmb, .combo) type within 1 minute. They would like to offer a solution service for the Dharma type solution.
These people certainly do not pay the hackers while generating the private key. If you have any case, Data Recovery Salon can help users to find the right people to help, pc users can send 3-4 sample files to analysis, thanks in advance.
1 Comment
It’s believed that data recovery engineers should be able to work with encrypted disks without having recovery keys. They are in the data recovery business and they have to be able to recover data from encrypted disks, malware affected disks as well as ransomware, without having to battle with recovery keys.
Bitlocker is a really big problem; Many people have had cases where customers give the printed document with keys provided to them, at the time of activating Bitlocker and they never work. People may have been in contact with Microsoft about the problem but they just say that they cannot help us, resulting in these customers being unable to get to their data. This is wrong on so many levels, one cannot put something like Bitlocker on the market and not provide support for people who are locked out of their data.
Please bear in mind as an argument, that we work with sensitive data all the time when we have to recover data. We remove passwords and security from disks and we unlock disks (SED) all the time.
There will be dishonest people who will abuse a tool that can bypass encryption, or passwords or similar. We are not policemen, we are data recovery specialists/engineers and most of us are responsible people. You can lock abusers and dishonest people out of your software if you receive complaints if you have to.
I have worked in IT Security for a very long time and there is education on ‘Ethical Hacking’ – sometimes hacking is necessary and required to do a job. I have seen cases where disgruntled employees encrypt disk and add passwords to servers and then leave the company, saying that they cannot remember the passwords or encryption keys. This has been my experience since 1975 when I have started working in the IT environment – on IBM and ICL mainframes.