Spiga

Backup and Recovery for Smaller Organisations--How to Build an Effective Data Backup Strategy

There are many factors which will potentially determine your best data backup strategy. Regardless of your companies size the thought process should be the same. The main factors to take into account are the amount of data being backed up, how quickly you need to backup and more importantly, how quickly you need to restore and the final factor will be the best data medium for you.

Put yourself in the shoes of Mr Unlucky, arriving at work to find, for what ever reason, all your data has been lost. All your customer database, accounts, stock levels and emails have been lost! How could you possibly recover from this and how long could your company stay in business? It is an agreed fact; if you do not backup your data and your data is lost a high percentage of businesses will cease to trade thereafter. Facts also show that those companies who do somehow initially continue to stay alive, 90% fail within two years. Believe me; you do not need to have a major catastrophe to wipe critical information. A disk failure, equipment failure or sudden loss of electricity can do it. Human error is a big factor and can potentially lead to lost servers or accidental deletion of data or major disasters such as, fires to floods and explosions (Bunsfield Oil Refinery), please do not forget malicious actions from crackers, viruses and loss of service attacks.

Another point we all agree on is not if you could lose data, it's when you will lose data. Although hardware infrastructure, software and peripheral network equipment easily can be replaced, the most valued asset, your data, cannot.

We have seen a growing number of government legislations, laws and regulations regarding data storage and privacy. All of which you are now accountable for. Much of this new law has been created because of identity theft as well as the unintentional or intentional posting of such sensitive data on the Internet. Like it or not, it's your responsibility to keep pace with all such laws, I cannot do into the legal aspect as it is a mine field and there are different laws for different types of Developing an Effective.

Data Backup Strategy

Now is the time to create a secure and manageable backup strategy. There is no point doing this after a disaster has struck, it is very minimize data loss and business losses whilst increasing business continuity. Your backup plan should be simple as possible, very specific whilst easy as possible to follow and must include all steps, starting with your initial requirements. You should include what data is critical and prioritize accordingly. How often you backup should not depend on the size or the nature of your company but you should base your solution around the following questions:-

1) Are you backing up a single server or many?

2) Are all your computers and servers located in a single office or do you have remote sites spread around the county?

3) Does your data change by only a few MB per week or by GBรขโ�ฌโ�ขs per day?

4) Is all of your data stored in a single server, or is your data spread around many servers?

5) Is your data simple file data which can be restored easily, or is it spread over various databases running on different operating systems?

6) Are you a 24 x 7 or 9 x 5 operation?

When you have answered the above, you are in a position to prepare a data backup and data recovery assessment which will addresses the following details:

1) What data needs protection? How much is active? How much is old and should be archived or how much data is duplicated or useless?

2) Most important question, what is your recovery window. In other words, how long can you survive without your data?

3) How much money will you lose for each day of downtime?

4) Is your proposed backup media reliable? Please bear in mind that backing up files does not mean you are able to restore your original data. For example, many companies have sought to recover data from backup tapes only to discover the tapes are corrupt or failed to record, and data is lost.

5) How flexible do you need you backup to be, is your data growing rapidly, does your data change a lot day by day?

Time Retention, how long do you need to save your data?
Many industries have to adhere to various laws which regulate or stipulate how long you must archive certain data. Other industries, including medical and legal, have their own data retention regulations mandated. Remember it is your companies responsibility to keep up to and adhere to these regulations and you must understand the legal consequences if you do not comply. As you can imagine consequences can be harsh which may include fines, sanctions or even orders to shut down your business. Such legal requirements are addressed by specific backup solutions.

What Is Your Backup Window?
How much time can you allocate to creating backups? Please take into account your schedule, should your backup take place hourly, daily, weekly or monthly? Remember, the more frequently you back up data, the less data you will lose and you can recover an closer to the exact copy of what you need. The greater the frequency of backup means greater hardware and software and management costs.

Costs
Costs should never be overlooked when creating your backup strategy. Your initial costs include hardware, software and, the backup media itself, donรขโ�ฌโ�ขt expect much change from ร�ยฃ4,000, but don't forget the cost of managing your backup, over a 3 year period management will cost more than the actual data backup hardware and software put together.

Building a Data Protection Strategy
All data protection strategies contain three parts: the backup element, archive element and the recovery element. Let us start looking the backup element of the strategy. When building a backup plan you must view several factors, starting with management. Who will control and manage your backup procedure? Will it be a single administrator, you, or do have an IT team with set roles for managing and maintaining backups on a regular basis? Even if your backup solution is automated someone must be still be responsible for checking and maintaining your system. Without this clear system, your data backup will quickly become unusable.

Everything you have read details how an effective backup plan is carried out, as you can imagine this can be an expensive and time consuming task. To find out how your data backup solution can be achieved easily and affordably, please visit www.perfectbackup.co.uk

Password Recovery

Passwords are used to prevent unauthorized access to a computer system, individual files, and/or folders stored on the hard drive. People normally use different passwords for different purposes and very often forget their passwords. This may restrict them from accessing important data stored in files and folders.

Password recovery tools allow computer users to recover their lost or forgotten passwords with the help of easy to use password recovery software. Password recovery software is designed for legal use and is not meant for unethical use, such as recovering passwords for e-mail accounts, bank accounts, and registered user logins of other people.

Password recovery software can be used to recover passwords of different types of file formats and applications. Possible recoveries include Pocket Excel passwords, PowerPoint passwords, project passwords, schedule passwords, VBA passwords, Word passwords, Windows passwords, and Zip passwords.

Password recovery software uses different types of recovery methods, such as trying all the combinations of alphabets and numbers from zero to nine. This usually takes a lot of time and in many cases does not even recover the password as people often use symbols combined with letters and numbers. Another method used is known as ?dictionary attacks? in which all the words listed in a dictionary are used as passwords. These can also be combined with numbers and symbols to increase the chances of password recovery. Apart from these, other types of recovery software is also available that disables the password protection tool of files and folders and makes them accessible without entering the password.

Password recovery tools have their own drawbacks, as they can be used to gain unauthorized access to another user?s files and folders. Computer users can avoid these risks if they use ten to fifteen character passwords containing letters, digits, and symbols arranged in a sequence that is easy to remember.

Recovery provides detailed information on Data Recovery, Recovery, Data Recovery Services, Hard Drive Data Recoveries and more. Recovery is affiliated with LAN Server Racks.

Disaster Recovery: Failure to Plan is a Plan to Fail

Todayรขโ�ฌโ�ขs organisation is increasingly dependent on its IT infrastructure and communications network. Remote offices, customers and business partners are all reliant on their ability to access your core systems, Intranet or Extranet รขโ�ฌโ�� often 24 hours a day, 7 days a week.

Disaster recovery of your systems is therefore fundamental to your organisational risk strategy. In assessing your risk, you need to consider:

  • How would you recover your key business data in the event of a major equipment failure or outage caused by a service provider failing to deliver?
  • What would be the financial consequences of a temporary shut-down of your data centre location รขโ�ฌโ�� due to site contamination, industrial action or an extended telecommunications or power outage?
  • Worse still, if your computer systems were destroyed in a major disaster such as a fire or flood, would your business even survive?

According to industry analysts, the top three business risks from failure to implement an effective disaster recovery plan are decreased employee productivity, customer dissatisfaction and the loss of current and future revenues. Letรขโ�ฌโ�ขs consider the ramifications of each.

Employee Productivity

If your premises are uninhabitable, where will you relocate your staff? If you operate an inbound contact centre รขโ�ฌโ�� or even a rotary phone system รขโ�ฌโ�� can you afford for it to be down for more than a few hours? Should your central computer systems become unavailable, it affects not just your head office staff, but all users of those systems across your network. For each hour of downtime, you must multiply by the number of employees unable to complete their work.

When รขโ�ฌโ�� if รขโ�ฌโ�� your systems are eventually restored, those same staff will have a backlog of processing to catch up with, which may cost you overtime, and will certainly generate frustration and workplace stress.

As well as costing time to recover, some data may be lost forever, causing ongoing reductions in employee productivity. A single server outage at WorkCover NSW in April 2006 cost the organisation nine working days to recover 98% of the lost data, with the remainder having to be retrieved on an ongoing case-by-case basis. Computerworld Australia reported an IDC analyst as being blunt about the glitch: "It shouldnรขโ�ฌโ�ขt have happened. At least 50% of organisationsรขโ�ฌโ�ข data is not adequately protected [and] in the event of a major disaster you may not get it back. Iรขโ�ฌโ�ขm sorry for them, but every organisation should have systems robust enough to withstand a failure. Itรขโ�ฌโ�ขs a wake-up call for everyone."

Customer Dissatisfaction

If you are unable to maintain customer service levels because your systems are down for an extended period, the best you can hope for is loyal but dissatisfied customers. But most likely, they will seek another, more reliable supplier.

Consumers will seek an alternate supplier whose systems are available. If your customers are other businesses, they will need to have confidence รขโ�ฌโ�� for their own survival รขโ�ฌโ�� that you have an effective disaster recovery plan in place. In fact, depending on their level of dependence on you, they may require to see it before they agree to do business with you.

Lost Revenue

If your computer systems are unavailable for a considerable period of time รขโ�ฌโ�� or your disaster recovery plan doesnรขโ�ฌโ�ขt cover every base รขโ�ฌโ�� loss of revenue is bound to occur. Current revenue will be lost while you are unable to take and fulfil orders, or complete production schedules. Future revenues will be lost as your staff struggle to make up the backlog, and your customers desert you for a supplier with more dependable operations.

Failure to ensure disaster recovery of your computer systems has such serious ramifications that, according to Gartner, "two out of five enterprises that experience a disaster go out of business within five years" (Disaster Recovery Plans and Systems are Essential, September 2001).

Disaster Recovery: Planning for the Worst

Just as there are many types of organisations, there is รขโ�ฌโ�� unfortunately รขโ�ฌโ�� a Pandoraรขโ�ฌโ�ขs Box of potential disasters. Like your business, your disaster recovery plan will be unique, and will be based on a balance of cost and risk. Gartner again: "There is no รขโ�ฌห�one size fits allรขโ�ฌโ�ข when it comes to developing business continuity management strategies and plans. Using someone else's requirements, which might turn out to be based on limitations or regulations that your company doesn't have, could spell disaster of another type." (Gartner, March 2005)

You may choose to completely replicate your data centre at an independent location, or opt for a cost-effective multi-subscriber disaster recovery service รขโ�ฌโ�� or even choose a hybrid solution such as live data/shared equipment.

Whatever your decision, your business recovery plan must be up-to-date, regularly tested and comply with your corporate risk strategy, corporate governance and regulatory requirements. Most important, you need the assistance of an expert รขโ�ฌโ�� a specialist disaster recovery services provider who mitigates risk on your behalf, and offers the economies of scale, responsiveness and high level of services and facilities your organisation will need should disaster strike.

In future articles in this series, weรขโ�ฌโ�ขll review the attributes of the ideal disaster recovery services provider, and consider how youรขโ�ฌโ�ขd fare in a disaster scenario affecting your entire street, city block or suburb.

Clint Seagrave is Engineering Director of www.interactive.com.au/Interactive Pty Ltd, one of Australiaรขโ�ฌโ�ขs leading providers of IT services. Established in 1988, and with a team of over 150 service staff รขโ�ฌโ�� supported by a network of thousands of highly trained support staff รขโ�ฌโ�� Interactive is the chosen supplier for critical hardware maintenance and disaster recovery services by 900+ corporations. Entirely focussed on systems availability, Interactive is 100% Australian-owned. www.interactive.com.au/ www.interactive.com.au

Why Bother With Data Backups?

Computers have become a daily need for most people. We use computers for all types of things including entertainment, work, and corresponding with others. Most of the files on our computers are important and we don't want to risk losing them since that would be a loss of money and time. The best way that you can prevent file loss is by doing backups.

Don't believe that backups are just for large companies, computer experts, or a job that you'll do when you have time for it. Backups are necessary for anyone who has a computer. One day your computer will fail, even if it has been running fine for many years. You'll eventually get a virus or your computer will fail from age.

There are two things that will occur on the day your computer fails: (1) you'll lose great amounts of music, passwords, financial and personal information, pictures, and software, or (2) you'll be able to replace or repair your computer and restore all your information from the backups that you've make on a regular basis. The first option will be a disaster while the second choice is just mildly annoying.

There are many ways that you can lose data on your computer. This includes the failure of computer hardware or damage from floods or fires. Your computer hard drive can potentially be damaged by surges of power that come from lightning. Or you may lose data if your child hits keys randomly on the keyboard. As well, a virus can erase your hard drive or infect your computer system.

The only way that you can get your data back is to have it available to be restored.

What to Backup?

For most users it won't be necessary that every file on their computer is backed up since this would require a lot of storage space. At the very least PC users should do a backup of their personal files and software that they can't replace. This includes such information as legal documents, financial records in spread sheets, and any work that they have in progress.

Backup don't need to be complicated.

The easiest and fastest way to do a backup is to use software that is included with the operating system. Windows has a backup program that is free to use. At the same time you can get similar backup programs for Linux, Mac, and other operating systems. This type of software is very simple to use and all you have to do is choose which files you want to back up. Some programs even have a scheduler so that your computer will do backups at certain times.

For a small cost you can buy backup software that will back up only those files which have been changed after a last backup or a particular date. As well, you can copy new files every day to a backup folder where they will then be backed up by the program. You can use your computer's "Search" option to identify which files are newer than a certain date. When the list has been completed they are copied to the backup folder. This allows you to run the software program for that folder only.

Data, such as your email, can be a bit more difficult to backup. You can configure some email clients so that they keep a copy of the email that you have sent and received onto the mail server. If this isn't an option you might be able to export your email messages to a folder which can be backed up later.

You can do backups for any type of media that is removable, such as removable hard drives, keychain devices (which plug into a USB port on your computer), or writable DVDs/CDs. In some cases you can even still use a floppy disc because some documents will take up very little space. All you have to do is use about seven discs and rotate them every week.

Doing a daily backup is just one more thing that you'll need to do in your already busy schedule. However, the day that you lose that one file you really need and can't get back you'll find that you're a lot busier.

Paul Wilcox writes about virus protection, internet security and other related topics for the Internet Security Squad website. Sign up for my free newsletter and receive my special report "How To Lock Your Computer Down - Internet Security in 2006" at http://www.internetsecuritysquad.com/freereport

Local Vs Remote Data Backup - The Pros And Cons

Backing up your data should be an essential part of your daily routine. Unfortunately for many businesses this simply isn't the case. The only time data backup crosses their mind is when they have a hard disk crash or a serious spyware or virus infection. Unfortunately by this stage it's already too late to do anything about it - the data is gone and you're then looking at several hundred, if not several thousand, dollars to have the data rescued and restored.

The concept is simple - choose a data backup plan and stick to it.

The burning question on most IT managers minds is should the data be stored locally or remotely? To be fair this is the pivot point of all data backup plans. There are pros and cons to each method.

Local Data Backup

Most companies rely on either DVD, external hard disk or tape drive data backup solutions locally. These provide fast, cost effective storage for most small companies and are also very easy for even the IT novice to operate. In the case of any data being lost it's simply a matter of restoring the data from a previous backup point and the user can then continue working.

The data, however, is only as safe as the building it's in. What happens in the case of fire, burglary, flooding or storm damage? That's right you just lost all your data backups in the blink of an eye.

Remote Data Backup

As an emerging industry remote data backup has really taken off. Most commonly remote file backup services allow you to log into a remote drive and via a web based interface upload all your critical files. 5GB of storage space is the entry point for most of the remote data backup services and this is provided at a low cost. Knowing that your data is being stored in a secure facility that's deliberately protected against harm allows you much greater peace of mind.

The weak point here however is the data transfer speed. Unless you're operating a high speed LAN in your company then remote backup can be a complete waste of time as you're tied to the maximum upstream speed of your network - which can be surprisingly slow depending on your IT infrastructure. Add in the issue of firewalls blocking uploads on certain ports and it can quickly become a real IT headache.

So how do achieve a Win-Win scenario? Blended backup! Look at utilizing both of these forms of backup. In an ideal world you'd store a local copy of your data and then upload an exact copy of that data to the remote file backup server. If money is an issue then store your bulk data locally but copy your mission critical data to the remote backup service. That way in the worst of disasters you'll still have the data you need to actually function as a business. That's not to say that bulk data such as archived email is not important but that old data could be recovered in time by a data recovery specialist whereas you mission critical data needs to be available at a moments notice.

This article was written by Niall Roche and provided courtesy of BackupAdvice.com If you want to know more about computer backups this site is full of useful information.

Computer Back Up And The Cyber 911 Threats Considered

Authorities are worried about International Terrorists and the prospect of another type of attack; a Cyber Attack. In fact many government agencies are working very hard to protect their computer systems from the Sum of All Computer Fears; a Cyber 911 style attack and if not from the hands of sneaky bad guys then perhaps from an Act of Mother Nature or a; Cyber Katrina scenario, which could be just as bad indeed.

Many government CIOs say that they are prepared and backed up, but still worry about the day when something catastrophic happens and they say it is not so much as if, but when. Yes I see your point on the Back-up systems; I have been studying that too, mostly on the Hurricane FEMA side of things.

But what happens when the government is shut down or an entire City, County, State or Federal Government Center is rendered useless for two-hours, half a day, a week or even a month until things are back to normal? Well, not good and indeed in studying the "Cyber 9-11" GAO reports and the government operations stuff one cannot really blame everyone for being concerned. Luckily our government is being much more methodical than during the Y2K practice drill and that is smart thinking for sure. Please consider all this in 2006.

By Lance Winslow

Document Data Entry Scanning

Managing records or documents is a key task in every business. It involves identifying, classifying, storing, circulating and disposing of documents among others. Each of these activities involves multifarious, minor tasks that are often time consuming and costly. This is not such a problem these days though because computers and other technologies are available to make managing of documents easier, less expensive and more convenient.

Generally, transferring of data into a machine-readable form (so that they can be stored electronically) is referred to as data entry. The most familiar way of doing it is by typing. Today, data entry includes other methods such as scanning documents and speech recognition.

The first computer program used to track stored documents and other records is the Document Management System (DMS). Today however, document Management is being used to differentiate imaging from records management focused on capturing images and managing of records, respectively.

Document imaging is the latest technologies used today in order to capture, store and manage documents that are scanned. Scanning documents prove to be more beneficial, as it reduces time spent for the collection of data, and it reduces the size of data files as well. Compared to the scanned images, the electronic documents stored using earlier technology or computer program are prone to changes that require tracking and security authorization.

Transforming the data into document imaging is called data conversion. For an average-sized company, it can be done simply with the use of a scanning machine. A typical scanner can manage to scan twenty-page document in a minute, but a high-speed scanner can do the job faster.

For larger companies with a considerably high volume of documents that need to be stored, document imaging company can be the best solution. These companies provide fast and affordable data conversion services.

Document Scanning provides detailed information on Document Scanning, Document Scanning Software, Document Scanning Services, Document Data Entry Scanning and more. Document Scanning is affiliated with Document Management System Software.

Best Practices for Computer Forensics in the Field

Introduction

Computer forensic examiners are responsible for technical acuity, knowledge of the law, and objectivity in the course of investigations. Success is principled upon verifiable and repeatable reported results that represent direct evidence of suspected wrong-doing or potential exoneration. This article establishes a series of best practices for the computer forensics practitioner, representing the best evidence for defensible solutions in the field. Best practices themselves are intended to capture those processes that have repeatedly shown to be successful in their use. This is not a cookbook. Best practices are meant to be reviewed and applied based on the specific needs of the organization, the case and the case setting.

Job Knowledge

An examiner can only be so informed when they walk into a field setting. In many cases, the client or the clientรขโ�ฌโ�ขs representative will provide some information about how many systems are in question, their specifications, and their current state. And just as often, they are critically wrong. This is especially true when it comes to hard drive sizes, cracking laptop computers, password hacking and device interfaces. A seizure that brings the equipment back to the lab should always be the first line of defense, providing maximum flexibility. If you must perform onsite, create a comprehensive working list of information to be collected before you hit the field. The list should be comprised of small steps with a checkbox for each step. The examiner should be completely informed of their next step and not have to "think on their feet."

Overestimate

Overestimate effort by at least a factor of two the amount of time you will require to complete the job. This includes accessing the device, initiating the forensic acquisition with the proper write-blocking strategy, filling out the appropriate paperwork and chain of custody documentation, copying the acquired files to another device and restoring the hardware to its initial state. Keep in mind that you may require shop manuals to direct you in taking apart small devices to access the drive, creating more difficulty in accomplishing the acquisition and hardware restoration. Live by Murphyรขโ�ฌโ�ขs Law. Something will always challenge you and take more time than anticipated -- even if you have done it many times.

Inventory Equipment
Most examiners have enough of a variety of equipment that they can perform forensically sound acquisitions in several ways. Decide ahead of time how you would like to ideally carry out your site acquisition. All of us will see equipment go bad or some other incompatibility become a show-stopper at the most critical time. Consider carrying two write blockers and an extra mass storage drive, wiped and ready. Between jobs, make sure to verify your equipment with a hashing exercise. Double-Check and inventory all of your kit using a checklist before taking off.

Flexible Acquisition

Instead of trying to make "best guesses" about the exact size of the client hard drive, use mass storage devices and if space is an issue, an acquisition format that will compress your data. After collecting the data, copy the data to another location. Many examiners limit themselves to traditional acquisitions where the machine is cracked, the drive removed, placed behind a write-blocker and acquired. There are also other methods for acquisition made available by the Linux operating system. Linux, booted from a CD drive, allows the examiner to make a raw copy without compromising the hard drive. Be familiar enough with the process to understand how to collect hash values and other logs. Live Acquisition is also discussed in this document. Leave the imaged drive with the attorney or the client and take the copy back to your lab for analysis.

Pull the Plug

Heated discussion occurs about what one should do when they encounter a running machine. Two clear choices exist; pulling the plug or performing a clean shutdown (assuming you can log in). Most examiners pull the plug, and this is the best way to avoid allowing any sort of malevolent process from running that may delete and wipe data or some other similar pitfall. It also allows the examiner access to create a snapshot of the swap files and other system information as it was last running. It should be noted that pulling the plug can also damage some of the files running on the system, making them unavailable to examination or user access. Businesses sometimes prefer a clean shutdown and should be given the choice after being explained the impact. It is critical to document how the machine was brought down because it will be absolutely essential knowledge for analysis.

Live Acquisitions

Another option is to perform a live acquisition. Some define "live" as a running machine as it is found, or for this purpose, the machine itself will be running during the acquisition through some means. One method is to boot into a customized Linux environment that includes enough support to grab an image of the hard drive (often among other forensic capabilities), but the kernel is modified to never touch the host computer. Special versions also exist that allow the examiner to leverage the Windowรขโ�ฌโ�ขs autorun feature to perform Incident Response. These require an advanced knowledge of both Linux and experience with computer forensics. This kind of acquisition is ideal when for time or complexity reasons, disassembling the machine is not a reasonable option.

The Fundamentals

An amazingly brazen oversight that examinerรขโ�ฌโ�ขs often make is neglecting to boot the device once the hard disk is out of it. Checking the BIOS is absolutely critical to the ability to perform a fully-validated analysis. The time and date reported in the BIOS must be reported, especially when time zones are an issue. A rich variety of other information is available depending on what manufacturer wrote the BIOS software. Remember that drive manufacturers may also hide certain areas of the disk (Hardware Protected Areas) and your acquisition tool must be able to make a full bitstream copy that takes that into account. Another key for the examiner to understand is how the hashing mechanism works: Some hash algorithms may be preferable to others not necessarily for their technological soundness, but for how they may be perceived in a courtroom situation.

Store Securely

Acquired images should be stored in a protected, non-static environment. Examiners should have access to a locked safe in a locked office. Drives should be stored in antistatic bags and protected by the use of non-static packing materials or the original shipping material. Each drive should be tagged with the client name, attorneyรขโ�ฌโ�ขs office and evidence number. Some examiners copy drive labels on the copy machine, if they have access to one during the acquisition and this should be stored with the case paperwork. At the end of the day, each drive should link up with a chain of custody document, a job, and an evidence number.

Establish a Policy

Many clients and attorneys will push for an immediate acquisition of the computer and then sit on the evidence for months. Make clear with the attorney how long you are willing to maintain the evidence at your lab and charge a storage fee for critical or largescale jobs. You may be storing critical evidence to a crime or civil action and while from a marketing perspective it may seem like a good idea to keep a copy of the drive, it may be better from the perspective of the case to return all copies to the attorney or client with the appropriate chain of custody documentation.

Conclusion

Computer examiners have many choices about how they will carry out an onsite acquisition. At the same time, the onsite acquisition is the most volatile environment for the examiner. Tools may fail, time constraints can be severe, observers may add pressure, and suspects may be present. Examiners need to take seriously the maintenance of their tools and development of ongoing knowledge to learn the best techniques for every situation. Utilizing the best practices herein, the examiner should be prepared for almost any situation they may face and have the ability to set reasonable goals and expectations for the effort in question.

Carol L. Stimmel is a Certified Computer Examiner (CCE), co-author of The Manager Pool, and former Vice-President, Consulting of Gartner. She has worked in technology for over 15 years and has been involved in engineering, security, knowledge management, and the establishment of successful entrepreneurial ventures.

CITSF provides certified consulting services to the attorney marketplace in the area of computer forensics and e-discovery.

Visit CITSF on the web at http://www.citsf.com She may be reached at 303-819-2068 or carol.stimmel@gmail.com.

Tips for Data Recovery of RAID 5 Drives

RAID technology is the use of multiple disks to emulate the performance of one disk. This is usually done to increase the safety and redundancy of data, the speed of read/write performance, or a mixture of both. It has great use in the management of corporate data.

Data is integral to todayรขโ�ฌโ�ขs businesses. Information is said to be power and right fully so, especially when you consider the nature of the economy of the modern world in this age we call the Information Age.

This has led to the explosion of the integration of Information Technology into most businesses. Most businesses employ some sort of Information System which stores sensitive information vital to a broad spectrum of operations.

These systems may be reliable, especially as technology increases the amount and accuracy of information stored in various media and systems. However, the probability that these systems will crash or that data will be lost cannot be ignored.

Most data crashes occur when some physical or logical error is introduced into a system. Hard disks, CD-ROMs, Tape Drives and other storage media can and will fail eventually. This could be caused by a host reasons รขโ�ฌโ�� power outages, physical damage to media, head crashes, motor problems and the like.

Whatever the reason, you will need a means to restore all this data. This is especially true if for some reason the deleted, destroyed or corrupted data contains information that is not backed up or existing in any other location anyway.

A special consideration when planning for backup strategies is the type of storage you choose to employ. If you are using a RAID set up for your data access and recording, you will have to keep in mind a few extra tips on top of your general knowledge data management.

1. Regular Maintenance รขโ�ฌโ�� While RAID components are usually reliable, it is recommended that regular back ups are performed at set intervals. There is always the chance that such systems will have logical and continuity problems. For this, you may want to employ special software to maintain the integrity of your RAID configuration.

2. Know Your Problem รขโ�ฌโ�� It may take a little training to know the difference, but many of the RAID problems can be solved by using readily available RAID data recovery tools. If in the event that such software does not work, then you may consider the services of a professional data recovery expert.

These experts are highly-trained and employ equipment not readily available to most people to recover badly damaged disks, and hopeless media.

3. If Possible, Use Software RAID instead of Hardware RAID รขโ�ฌโ�� while software RAID is a viable alternative to hardware RAID. Software RAID has a few practical setbacks.

Software RAID is not as fault tolerant as hardware RAID. It may not be an error magnet, but it still is a lot less reliable in comparison to hardware RAID

Also software raid takes up valuable system resources and needs to boot up before it can be used. This is not saying that software RAID should be avoided like the flu; it is jus that there are really good reasons to use hardware RAID instead

4. Invest in Maintenance รขโ�ฌโ�� While using precious hours backing up and maintaining your RAID can prove to be taxing, and by all means unnecessary, you only have to look at a professional data recovery bill to realize that it was all worth it.

If you found those tips useful more information on Data Recovery can be found at "Data Recovery without heartach."

Computer Data Recovery Options

Losing files on your computer can be a frightening experience if the files are of importance to you personally or professionally. Computer data recovery techniques include the most simple of operations, like simply retrieving an accidentally deleted file, to very complex file retrieval procedures that only professionals should attempt to do.

If you are trying to proceed with your hard disk recovery solution on your own, first start with the most obvious answer. Look in your recycle bin to see if the file has been placed there. If it is, you can choose the "restore" option, and your system will automatically put the file back on your computer where it was stored originally. Of course, if every retrieval was this simple, there would be no need for computer professionals who specialize in data recovery, so chances are you'll need to try a different technique to find your lost data.

If you've deleted a file on your computer, and you've emptied your recycle bin, don't despair. When a file is deleted on a computer, it's not erased immediately from the system. What actually happens is the computer marks the deleted file as "deleted", and it is no longer in view to users within your computer's files. The file remains on the hard drive until new data is saved over it, similar to recording songs on cassette tapes. So, in order for computer data recovery to happen on files that have been deleted, you'll need to attempt to recover them before new data has been written over the file.

The best thing you can do to increase your chances of success is to immediately stop using the computer until you've retrieved the deleted file. The more you use your computer, the more information will be saved and the more likely the information could be saved over the file you are hoping to get back!

******************************************
Brad Triggs provides more information on
Data Recovery at his website:
Data-Recovery-Central.com - Computer Data Recovery
******************************************

Data Loss and Preventative Measures to Avoid It

Data Loss can be devastating. It could instantly take a small or medium size business from "Open for Business" to "Out of Business" in an instant. On a personal level, it can wipe away weeks, months and even years of critical data where there is no means of accessing or recreating the valuable information.

However, there are preventative measures that can be taken to ensure that you do not fall victim to the unfortunate circumstance of loss of data. As a data recovery lab, we know. We just took a direct hit from hurricane Wilma. Hurricane Wilma was "Not our First Rodeo", and more than likely, will not be our last.

We are also seeing an increase of drives on a local level that have been affected by this natural disaster, just as we did after Hurricanes Katrina and Rita. Hearing stories on a daily basis of data loss, I thought it to be only fair to share some of our preparations of how we (as a Data Recovery Lab) survived as a business, and had basically no loss of business continuity. Fortunately, the only loss we did have was the actual day that the hurricane hit and we all watched the devastating destruction from our homes.

Here are a few of the procedures that we as a data recovery lab, put into place, yet once *again* this year, prior to landfall of Hurricane Wilma.

รขโ�ฌยข We are fanatical about backing up. Keep in mind that our business is based upon hard drive failures. If you can imagine it, e.g. Fires, Floods, Mechanical Failure, User Error, we have heard it. The thought of a category 3 hurricane barreling towards us, was not a pleasant one.

รขโ�ฌยข Ensure that you have "Backups of your Backups." Always keep a current backup offsite for absolute worst case scenarios.

รขโ�ฌยข Prior to vacating the premises, Make Backups of Critical Data, Verify that all electronics are plugged into UPSsรขโ�ฌโ�ข (as they should be) power down and unplug from A.C. if possible. (Including Telephone and Modem Lines.)

รขโ�ฌยข If possible, elevate all electronics and electronics equipment off of the ground. Even with Flood Insurance, Insurance providers will draw the line between "Wind driven Rain", and "Rising Water".

รขโ�ฌยข Last but certainly not least, remain calm and approach any Computer Failure/Data Loss with a rational and sensible approach. A majority of hard drive failures, and data loss resulting from them can be successfully overcome, if proper measures are taken. There are numerous previously published articles that outline what NOT to do when faced with this type of potential crisis. Consult a professional data recovery lab to see what options are available for you, before it is too late.

With a Natural Disaster such as a category 3 hurricane approaching, there are exterior preparations as well. (Hurricane Shutters, Non-Perishable Foods, Water, for at least 3-4 days, Ice, Flashlights, Batteries, and Battery operated Radio or TV for News Alerts.) Anyone who lives in a hurricane prone area should already know these basics.

Hopefully, by taking these tips to heart (and mind), your business and/or place of business will not be "Gone with Wind!"

Brian Cain Eco Data Recovery 4115 Burns Rd. Palm Beach Gardens, FL 33410 1-800-339-3412 561-691-0019 http://www.EcoDataRecovery.com

brian@EcoDataRecovery.com

Insure Your Information

There are so many ways to lose precious data stored on your hard disk - power loss or power surge, overheating, electrostatic discharge, virus attack, software failure, etc. Are you still thinking your data is safe? Don't! Backup! Backup early, backup frequently.

WinBackup 2.0 Standard
Awarded Best Backup Software by Computer Shopper and termed "exceptionally simple to use" by PC World, WinBackup 2.0 Standard is now the obvious choice for home and small office users. Being one of the most efficient and reliable backup solutions available WinBackup 2.0 Standard will help you save both time and money.

WinBackup 2.0 Standard, the fastest backup and recovery software on the market, allows you to secure all your valuable data within minutes. Featuring a Windows-familiar and intuitive graphical user interface, WinBackup 2.0 Standard makes it extremely easy to set up and run regular backups in your existing environment. With shortcuts to over a 100 of the most popular applications, WinBackup 2.0 Standard makes it possible to easily and quickly backup emails, address books, bookmarks, digital images, financial documents and other records at the click of a button. Home and small office users can rely completely on WinBackup 2.0 Standard for full data consistency and integrity without compromising superior performance.



CompuApps Renaissance 2006 SE
Renaissance is a simple yet powerful Backup application that provides user the peace of mind by its ease of use, comfort and security, with optional verification. Renaissance enables selection of data with a quick and easy to use wizards. Comprehensive scheduling options allow the user to do backups at idle time, thus making the backup a painless and interference free process.

Protects servers, business-critical applications, desktops, and notebooks
Easy to set up and manage
Fast, reliable, secure backups
Smart restores with unparalleled accuracy
Backup to hard disks and removable disks
Simplifies media management

Major Functions
Dual Backup & Protection
Zero-Touch Backup
Value Pick
Find Files





Acronis True Image
The complete disk imaging, system disk backup, and bare metal restore for workstations and home PCs

Acronis True Image allows to create an exact disk backup image for complete system backup and disk cloning providing the most comprehensive data protection.

The disk backup file contains the exact copy of a hard disk, including all the computer data, operating system, and programs.

After a system crash you can restore the entire system or simply replace lost files and folders from your disk backup.

Based on the exclusive Acronis Drive Snapshot disk imaging technology, Acronis True Image allows to create an online system disk backup without reboot to keep the system productive. The product provides the fastest bare metal restore dramatically reducing a downtime and your IT costs.

For the complete server disk imaging, system disk backup, and bare metal restore see Acronis True Image Server

Key features:

  • Online system disk backup and instant bare metal system restore
  • Restore individual files and folders
  • Integrated compression and password protection
  • Disk imaging and disk cloning
  • Incremental disk backup and disk backup image verification
  • Acronis Secure Zone and Acronis Startup Recovery Manager


For More Information:

WinBackup 2.0 Standard: http://www.lightsparkle.com/product_page.php?product_id=12

CompuApps Renaissance 2006 SE: http://www.lightsparkle.com/product_page.php?product_id=593

Acronis True Image: http://www.lightsparkle.com/product_page.php?product_id=87

Joe Light values his data and backups frequently, because he knows the cost for recovering lost data. He shares his experience with backup software at http://www.lightsparkle.com.

Novell Data Recovery - Recovery of Segmented Volumes

Problem Description

Segmented volumes refer to volumes which have had their size increased by taking disk space from another area. This space is usually taken from another disk, resulting in the Volume existing in รขโ�ฌห�segmentsรขโ�ฌโ�ข across different disks, and hence the name segmented volumes. Segmented volumes add flexibility and are particularly useful in cases of important volumes needing additional disk space.

Segmented volumes, however, have data stretched across more than one disk and data recovery software needs additional capabilities to scan multiple disks at a time. This is where the problem lies and a separate data recovery module has to be incorporated into the software to ensure complete recovery.

Technical Aspect of the Problem

Segmenting refers to manipulating a Volume so as to increase its size. This redistribution of disk space creates a Volume which may occupy space spanned across more than one disk. This Volume is called a Segmented Volume since it exists in รขโ�ฌห�segmentsรขโ�ฌโ�ข across one or more disks. A Volume may be spanned across as many as 32 disks. For Example: Say, a disk consists of 2 volumes, one of which is almost full up and needs additional space. Netware has a feature using which disk space, usually from a separate disk, can be added to an existing volume.

Regular data recovery software usually scans one disk at a time, but segmented volumes may be spanned across multiple disks, which is what creates the difficulty in the recovery of segmented volumes. Phoenix Novellรขโ�ฌโ�ขs advanced software engine can recover data from segmented volumes.

Technical Aspect of the Solution

Phoenix Novell is a Windows based application and can only be installed on a Windows based hard disk. Therefore, the failed Novell based disk needs to be attached as a secondary to a Windows based disk with Phoenix installed in it. After the damaged disk is attached, Phoenix needs to be run from the working disk.

The software scans the selected volume of the damaged secondary disk to search for lost or missing partitions and displays the list. The software has a special algorithm to determine whether the contents of a volume are spanned across multiple disks. If a segmented volume is detected, the entire volume (across multiple disks) is scanned and the result displayed in an easy to understand tree structure. Any number of files may then be recovered.

Working of Phoenix Novell

The damaged server disk needs to be connected as a secondary to a working Windows based disk with Phoenix Novell installed in it. The software is then run to start the recovery process.

Clicking รขโ�ฌห�Select Netware Partitionรขโ�ฌโ�ข will display a list of hard disks with their respective volumes. Select the damaged volume on the server disk to start the scan process. The software then scans the selected volume (traveling across multiple disks if need be) and displays the entire list of found data.

Any number of files can be selected for recovery, and clicking รขโ�ฌห�Recover Selectedรขโ�ฌโ�ข will restore the selected files. Alternatively, clicking รขโ�ฌห�Recover Deletedรขโ�ฌโ�ข will recover all the files listed in the displayed list of files. If the recovery is not satisfactory or if some of the files are recovered improperly, clicking Tools -> Change Linking Mode -> Contiguous Mode will change the linking mode to Contiguous which is a much more comprehensive scan

Buy award winning hard drive data recovery software and utilities or try the demos free.Stellar offers a complete solution of file recovery software and lost data restoration programs for Windows (Windows 95, 98, ME, NT, 2000, 2003, XP),Apple Macintosh, Novell, Linux, Unix operating system and FAT, NTFS,NTFS5,HFS, HFS+, NWFS, EXT2 and EXT3 file systems. Offers data recovery software,data recovery services for hard drive recovery and data safety software services for your computer. Buy award winning data recovery utilities, data eraser and safety software in India, United States, United Kingdom Datenrettung Software |Recupero Dati

European Data Recovery Companies Are Between Their Rich Rhymes And Poor Substance

Often European forensic & data recovery specialists, use cheap sales tricks with claims that they have acquired/developed machines capable of reading the hdd platters inside damaged SATA RAID servers and conventional hard disk platters without changing the heads. Unfortunately this rhetoric is being repeated by few reputed companies. Little did they know, the US Pentagon has had since 9/11 a live advert on their website seeking clarifications on such "machines or technologies".

Only a month ago the US Pentagon have decided to cancel the ad as there was not a single reply for 5 years!!

Meanwhile, true advanced technological advancements are being accomplished by the newly established hardware industry in India and the Far-East, namely China. The technology is extremely intricate with the requirement for molecular technologies in addition to advanced materialogy science.

As an example - magnetic disk/platters is a circular aluminum disk, similar in shape to a normal cd or dvd, with surface coated with chrome oxide based coating with the sole exception of the read/write arm-head parking zone. In fact, high precision of disk surfaces and the heads causes them to "stick" to each other because of molecular attraction forces. To prevent that effect, manufacturers often use special laser serrations in the zone of contact between the heads and the platters.

The disks demonstrate specific magnetic properties owing to their coating of chrome oxide base (magnetically active substance) or cobalt layer applied using vacuum deposition. Such coating is characterized by robust hardness and greater wear resistance.

While, sales myths are circulating among data recovery sales representatives in the USA & Western Europe, advanced data recovery technologies have predominantly been emerging from the Far-East, the former Eastern Block countries & India.

Meanwhile, the new hardware industry developed in mainland China is expected to boom even further. This is due to the announcement that the investment in the hardware manufacturing industry will be tripled.

D Snagov Technician at UniRecovery Laboratory - http://www.unirecovery.co.uk

Backup Your Laptop Data

If I were to quote you the statistics about lost information as it pertains to laptops, you would be amazed. But stop and ask yourself, do you backup your laptop information? For many of us, the answer is no.

What happens if the laptop is stolen, or the hard drive crashes? We are reduced to sniffling piles of incoherent suits and ties for a few hours. Itรขโ�ฌโ�ขs only at this point, that many of us realize just how important our laptops are in our business life.

So, what about backup of laptop data? Do you suppose, as a business person, we should begin to look at another safety measure for protection of our data? I would think itรขโ�ฌโ�ขs about time, and the service is available, if we choose not to perform this task ourselves.

During 2003, over 500,000 laptops were stolen, of those stolen laptops, the vast majority was never recovered, and less than a thousand of those were backed up. Those are unbelievable numbers, yet they are the reality in the use of laptops. We just havenรขโ�ฌโ�ขt noticed how reliant weรขโ�ฌโ�ขre becoming on our laptops.

Today, backup of laptop data through online services, remote data backup, and offsite storage can provide us with the safety and assurance we need in determining that our data has been successfully backed up and is secure and safe on a storage media.

The lag in taking care of backup of laptop data has often been due to the fact that laptops are designed for on the go use. The laptop is not often found with a typical data storage media close at hand, or even available.

That is about to change, thanks to the services of online data backup. Now, even the busiest business person, should be able to schedule a backup time, set the clock for an early wakeup, and be ready to roll, right along with his laptop!

Learn how to keep your important data from getting toasted at Data Backup.

Securing Backups in Microsoft SQL Server


Backing up database without password contains several vulnerability of disclosing the confidential information. The reason that any database can be restored at any location makes this problem more serious. You can check it out by creating a Backup of your database and restoring it in some other machine. The information stored in your backup media also get disclosed by - Restore filelistonly or Restore headeronly options. Backing up a database without supplying password could lead to several anomalies that no company would like to suffer.

Some common problems concerned -

(1) Disclosing of company information, such as customers, policies and future plans.
(2) Disclosing of contact information or accounts information especially in case of Bank or Insurance companies.
(3) Disclosing of structure of the storage pattern of the company.
(4) Utilization of future plans by rival companies.

These are common problems, but there are numerous specific problems that could be faced. Let's have an estimate of some reasons why backup set must be password protected -

(1) Backups in Tapes is not kept in a secure manner.
This is also recommended to store all the backup off-site. In such cases where your company stores Tapes off-site, there could be some physical security problems of there storage. There are cases when disgruntled employees have sold these tapes to rival companies to gain better perk and confidence in rival companies. As you all know, each company wants to know the structure and pattern followed by other company. A employee of company may be unfaithful and he can damage some information. But damaging some data is not a big issue than selling or disclosing information.
(2) Backups can be sent as e-mail or uploaded.
This problem is not hidden to anyone. Your company firewall may be strong, but Thumbnail drives can anytime be applied in USB port and data can be transferred. Thumbnail drives are nowadays in fashion also. Anyone can have a 1GB to 10GB of such thumbnail drives. The important thing to notice about thumbnail drives is that they do not require installation. Just plugging into USB port and computer shows a Removable media and then copy and paste of files. This is so easy to do that a newbie can do this.

How to provide security in Backups ?

This only requires to add an option of password to make your backup set password protected. The advantages of providing password in backup are -

(1) Restore Filelistonly, Restore Headeronly commands does not disclose the backup information.
(2) If you want to restore from media, error is generated by SQL Server.

The following commands can be used to provide a password. I assume that you have a backup media and backup device name 'backup01'.

Statement#1
Backup database Northwind to backup01 with password='secretpass'

Now, let us have a test on this and see what SQL Server says when password is not provided.

Restore database Northwind from backup01

Server: Msg 3279, Level 16, State 2, Line 5
Access is denied due to a password failure
Server: Msg 3013, Level 16, State 1, Line 5
RESTORE DATABASE is terminating abnormally.

This was an error with severity level 16. That means it's working. Now, let us have a look on restore related commands that produce some information.

Restore Filelistonly From backup01

Server: Msg 3279, Level 16, State 2, Line 5
Access is denied due to a password failure
Server: Msg 3013, Level 16, State 1, Line 5
RESTORE DATABASE is terminating abnormally.

Again the same error. In this way, we may conclude that this approach is easier to create this. Some other options can also be provided like media name, media description and media password.

Media Name, Media Description and Media Password

There are some differences in directly applying password while backup and using media name. When you are using following command while backup.

Statement#2
Backup database Northwind to backup01 with medianame='Set-1' , mediapassword='passwd'

This would create password for backup01 and once it was done, you get the same error Msg 3279 while you execute the following command on the same media.

Backup database Northwind to backup01

So, when your provide password for the media, you can not backup any information into media unless you provide password. After the Statement#2 you need to provide password for other backups.

Backup database MSDB to backup01 with medianame='Set-1' , mediapassword='passwd'

The statement executes successfully. This is the actual difference in using 'with password=' and 'with medianame' case. After executing Statement#1, you can use the same for other backups without mentioning password or mentioning different passwords.

Conclusion

This is all about providing protection for passwords. There are many other things to research in the same scenario and I would like to share my ideas when such studies are complete. Overall, my aim was to open your eyes that backups are not only to secure your data, but due to carelessness this may lead to leakage of information. In my opinion, disclosure of important information is more serious matter than loss of information. So, awareness is important and there is a little effort to apply in securing your backups.

Novell Operating System - Recovery of Compressed Data

Problem Description

Data stored in a working Novell server is automatically compressed to save space, and is obviously decompressed before it is displayed to a user. Phoenix Novell recovers lost data exactly as it was stored in the hard disk, and the recovered data may be compressed. This gives rise to the problem of recovered data being unusable (because it is in a compressed format).

Phoenix, however, has a new and advanced uncompression engine that is able to decompress recovered data.

Technical Aspect of the Problem

Data Compression refers to the process of storing data in a format that requires less space than usual. Compressing data is the same as packing data รขโ�ฌโ�� reducing the amount of electronic รขโ�ฌห�spaceรขโ�ฌโ�ข data takes up, and compressed data usually consumes 2 to 4 times fewer bits. Typically, it is infrequently used data which is compressed to save space.

Methods of compressing data include replacing blank spaces with a character count, or replacing redundant data with shorter stand-in รขโ�ฌห�codesรขโ�ฌโ�ข. No matter how data is compressed, it must be decompressed before it can be used. This is precisely where the problem lies รขโ�ฌโ�� recovered data may be in a compressed format and thus unusable. Phoenix uses its own uncompression module to resolve this problem.

Technical Aspect of the Solution

Data recovered from a failed server may not open because it is in a compressed format. The solution to this problem needs to be followed in a systematic way for best results.

First, the hard disk containing the recovered compressed data is to be attached to a working Novell client machine and the compressed data is to be transferred from there to a working Novell server. The hard disk of the server (which now contains the compressed data) is then taken out and attached as a secondary disk to any machine with Phoenix Novell installed in it.

Phoenix then decompresses the required data, after which the hard disk (now containing the decompressed data) is to be reattached to the server. The data can then safely be transferred from the server back to a working Novell client machine.

Working of Phoenix Novell - Data Recovery Software

Compressed data can be decompressed using Phoenix Novellรขโ�ฌโ�ขs uncompression utility. The recovered compressed data is to be transferred from a Novell client machine to a Novell server. The hard disk of the server (which now contains the compressed data) is then to be attached to a machine with Phoenix Novell installed in it. The Phoenix Novell software is then used to decompress this data in a few short steps.

First, select the volume which contains the compressed data. Phoenix Novell analyses the selected volume and displays the result in an easy to understand structure. Select all the files that are in a compressed format.

Finally, click Tools -> Mark Compressed Files to start the decompression. Phoenix then decompresses all the compressed data. The server hard disk now contains decompressed data and can be reattached to the server to transfer all the decompressed data back into the client machine.

A Data Recovery Software & Service Company - Datenrettung Software

Enjoy Your Christmas Thoroughly! Backup Your Data Files!

You may wonder what backup has to deal with Christmas..and yet, there is something you can benefit from here, too.

As the only way to enjoy your Christmas thoroughly is to spend your time as you want without anything interfering with your holidays, a scheduled backup has yet something to offer here.

When to backup?

Just set a scheduled backup to run on Friday evening and also on Saturday and Sunday of the Christmas weekend (if you do work or change your files during the holidays). The best time to run a Christmas backup depends, of course, on your backup schedule, but, generally, a Friday evening is the best time to run a single scheduled backup.

What to backup?

A scheduled backup on Friday evening will make sure you have backed up all your important files (work documents, mail messages, Outlook and Outlook Express files, data files, etc.) so that you do not have to worry if something happens during Christmas. And if something happens to your files, you will have a backup ready.

Where to backup?

Probably the best backup solution is to backup to an external USB hard drive. This method is quick, reliable and cost-effective. If you have little data to backup, you can use a flash USB drive or a DVD, depending on the amount of files to backup, of course.

Backup, and may your Christmas holidays been as pleasant as possible.

The author of this Enjoy your Christmas with http://www.FairBackup.com The owner of a site, devoted to the backup theme. Learn how to backup easily, efficiently and securely with fairbackup.com

Why It Is Essential To Back Up Your Computer Hard Drive On A Regular Basis

No matter who you are, proper data back up is required. Whether you work at home, work for a huge conglomeration, or work for a tiny store, having current data back up files can keep your business from failing during a hard drive crash.

Businesses are not the only things that would suffer. Can you imagine life without your email addresses? What about if you lost your tax files that were stored online? Even personal computers should have back up files.

Think about the items that are stored on computers: bank records, personal journals, tax information, family histories, family photographs, customer accounts, email address books, mailing addresses, and more. Without these items, many people would cease to function. We are an electronic generation. We communicate via the email. We balance our checkbooks online. We chat with family online. In essence, we need our computers. If they fail, we feel panicky and stressed without them. Recovery can come faster if a recent back up exists.

In past history, floppy discs were the main source for backing up our computer files. They still work wonderfully, but some computers have moved on. If you have a floppy disk drive, you will find that back up is a piece of cake. The files were stored on the disk. In times of hard drive failure, all of your important information could be uploaded from the floppy disk in a snap.

CD ROMs are the new format for system back ups. Newer CD RW disks allow you to write and rewrite information to the disk. CD ROM disks are inexpensive and can store ample amounts of information.

If you feel like spending a little more money, purchase a tape back up system. Your information is backed up onto a tape that can then be stored for decades without issue. The information is quick to load back into the player in case troubles do arise.

Backing up your hard drive is a time consuming event. It is also a necessary one, however. Experts recommending backing up your files every week, this is excellent advice. Do so by copying all of your important files straight to a CD in your CD ROM drive. The files then burn to your CD and you are protected in case of a hard drive failure.

Go to your documents folder and then highlight and copy all of your important files to the disk. Your computer does the majority of the work. All you have to do is click a few buttons and wait. It is the waiting that takes tremendous time.

Business or personal, there is no reason you should avoid backing up your computer. In case of a hard drive failure, you will definitely benefit from having a current back up of all your pertinent information.

Gregg Hall is an author living in Navarre Beach, Florida. Find more about this as well as a data recovery at www.datarecoveryfast.com

Zip It Up

Anyone who has seen the movieรขโ�ฌโ�ข Honey I shrunk the kids' can imagine how useful compression can be. Compression, which has become anonymous with Zip files work off the same idea only with a (add your joke here)'slightly' different technology.

You will find a lot of data compression programs in use today and some are easier and have better features than others, so in this article I will talk about compression in general, but may through in a couple of examples for comparison.

The first thing you need to know is that there can be more than one compressed file; you can have an archive (a multiple of files). The main benefit of this is that the user can:

* Save valuable disk space

* Can send and receive files on the internet quicker

* Speeds up your processor

* Depending on the file compression program can reduce files as much as 90%

The user should also be aware that files can only be opened with the original compression program that compressed it. Think of this as a form of protection, if you will since this is like an encrypted file or archive. Adding a password is another way to insure files are safe from prying eyes and some compression programs let you do this at any level of compression or decompression with the associated commands (update,move,feshien,add). Only individual files can be password protected not whole archives.

Ever since the first personal computers (PC's) came about people found how easy it is to load up there drives with programs and downloads that eat up much of there memory. That's why developers created data compression programs in the first place, to free up hard drive space and increase processor speed.

There are a lot of data compression programs and they are not exactly alike because they use different data compression algorithms. One popular program, for example looks for repeating words or phrases and assigns them there own character or number value.

A lot of users don't fully understand the more advanced features of their data compression programs so they are not really getting there full value. Syntax command lines are a good example of this confusion. There are four basic commands in syntax (the shape of a command line);

* Command: The task to be preformed like add, delete or update.

* Archive: the name of the archive.

* Switch or Option: lets user specify a file option like adding file directories for compression.

* File: name of file(s) to be processed.

A user can compress files four basic ways:

Add files to archive - old files with same name are overwritten.

Move files to archive - upon compression old files are deleted.

Update files - makes sure you have the most recent file version.

Freshen files - almost like update, seeks out the last modified file and adds it to archive.

The above commands have there basic functions but can do other things. Ex. the update & add commands can create and compress files and the Freshen command can create a new archive.

There are only a couple of data compression programs out there that give the user more than one compression method - PKZIP AND ARJ.

PKZIP has what they call an imploding method and a shrinking method; without going into great detail imploding uses less memory (90k), and is very through. This is the default setting. Shrinking is fast but uses a bit more memory (128k), works great for smaller files.

ARJ gives the user more options for data compression. It uses multiple settings (m1 to m4),

This is a tradeoff of prosessing speed versus packing dentisy. There are 2 more options available here but test runs show no significant change in time or compression.

Even with experienced compression users, extracting compressed files with a newer version of a data compression program may prove difficult, so programmers created self extracting files (SFX) to enable beginners to easily use compressed files. This small program may be part of the original program or added after as a separate program.

I realize some of this may sound confusing and for that I apologize, and after all, people will compresses data using only the basic functions and be happy and content because it suits there present needs. In conclusion you can tell there are many options available when using any data compression program and it is well worth the time (got time on the week end?) and effort to learn some of the advanced features if you want to save some serious space on your hard drive.

About The Author
Robert Hanania is a student of the internet, learning about home based businesses and computers. Robert is currently promoting his web page. All are welcome to visit him at http://www.fileanddatarecovery.com.

Document and Data Management Considerations for Private Companies

Increasingly, the need for a written, highly structured document and data management policy is becoming vital to any private company. While the recently enacted Sarbanes-Oxley (SOX) rules promulgated by the Securities and Exchange Commission require such a written policy for public companies, there are ample reasons for private companies to also adopt a written document and data management policy.

Various statutes now require most companies, whether public, non-profit or private, to securely maintain written records in regard to certain aspects of their personnel information and business operations. Under the Health Insurance Portability and Accountability Act (HIPAA), for example, companies may be sued if a security breach or other mishap results in the unauthorized disclosure of medical records. The controversial Patriot Act requires disclosure to the federal government of certain customer data and can subject the disclosing company to a lawsuit if the customer was not sufficiently advised of the possibility of such disclosure. A proposed amendment to the federal Rules of Civil Procedure would require lawyers representing parties in litigation to discuss document management systems of their clients prior to any legal proceedings. Another proposed amendment to the federal Rules of Civil Procedure would provide a safe harbor for companies that lose information but have otherwise acted in good faith, precluding any sanctions for such information loss. Certain state laws, such as the California Online Privacy Protection Act of 2003, require website disclosure of privacy policies in regard to personally identifiable information (such as name, address, credit card number, social security number, email address, etc.), which should include a statement about the security procedures in place to protect such information.

Prudence also dictates that written records be maintained in the event of employee claims or litigation involving the company. Companies should also be vigilant in documenting incidents involving any inappropriate or improper behavior by an employee. Emails and instant messages are now often crucial in determining court cases. Employee emails are generally considered to be the property of the employer, and the companyรขโ�ฌโ�ขs HR policy and employee manual must clearly state so. Accordingly, employers should ensure that copies of all employee emails and instant messages are retained in the event of any employee-related litigation. For the same reason, in addition to maintaining copies of executed contracts and written correspondence, companies should retain copies of all emails and electronic document interchange (EDI) transactions with vendors and customers in the event of any litigation with such third parties. Companies should develop disaster recovery plans and test the recovery of all important data and information. Electronic imaging of physical documents should become standard.

In order to ensure that such procedures are in place and followed, company management must create an infrastructure that will be responsible for the implementation and monitoring of such procedures. This must come from the top down in the organization. The Board of Directors or a committee of the Board should review internal controls and written processes designed to ensure the retention and security of all company records and information and avoid misuse or unauthorized disclosure of such records and information. The Board or such committee should consult closely with members of the companyรขโ�ฌโ�ขs information technology (IT) or finance department and others responsible for company files and records in order to ensure compliance with a clearly defined operations policy for the storage, maintenance, protection and destruction of company records and information. There are numerous sources of guidance for company management and IT or finance departments in this regard. These include the Committee of Sponsoring Organizations (COSO), an independent auditing industry group that has received implicit endorsement from the Securities and Exchange Commission. In addition, the Sedona Principles is a set of best practices for e-discovery and the Control Objectives for Information and Related Technology (COBIT) detailing the IT or finance departmentรขโ�ฌโ�ขs role in information and security controls is recommended reading for private companies, even though it is directed at public companies in the post-SOX era.

Company management must also ensure that the IT or finance department has the necessary resources to properly maintain and safeguard electronic records. Extensive storage capabilities and related software are required for document management, data backup, and email and instant message archiving, as such records must be maintained for an extended period of time. Under SOX, for example, records are required to be stored for seven years and must be non-erasable and non-rewritable. Hundreds of outsource storage companies have emerged to assist companies with their e-document management and data storage needs. It is vital that such software and services include fast and reliable document and data search capabilities as well.

Paper records should be organized logically to facilitate their retrieval at a later date. Ideally, the contents of the files should be logged electronically using database software specifically designed for this purpose (the XML standard has gone a long way in standardizing how to identify data). Companies should also ensure that off-site records can be remotely searched.

Access to company records should be closely controlled and restricted to a limited number of individuals. Just as electronic records have audit trails of who has access and when the data was accessed, paper records should not be open and available for anyone to simply walk in and review them, or alter them.

Finally, a document destruction policy should be included as part of the written document and data management policy. Time periods for purges of electronic data and paper records should be established and followed explicitly. As a general rule, it is not recommended that data or records be destroyed until at least seven years has elapsed since the initial archive or storage of such data or records. However, the appropriate time limit depends on many factors, including the nature of the data or records, relevant statutes of limitation and governmental requirements. Company management should therefore consult with legal counsel and a document management professional before establishing a document destruction policy.

Kent Clayton is a partner and co-chair of the Business Practice Group at Berger Kahn, a full service business law firm with offices in Orange County, Los Angeles, San Diego and the San Francisco Bay area. Michael Siersema is Managing Partner and CEO of Phoenix2000 Group LLC, a technology leadership and advisory services company with offices in Huntington Beach, California, West Lake Village, California and Washington, D.C.

Recover Data From Crashed Novell NSS Volume - Novell Netware Data Recovery

Brief Overview

The Novell Storage Services (NSS) File System is the default file system for NetWare 6 and later. Its many features and capabilities include visibility, a trustee access control model, multiple simultaneous namespace support, native Unicode, user and directory quotas, rich file attributes, multiple data stream support, event file lists, and a file salvage sub-system. These features can help you effectively manage your shared file storage for any size of organization, scaling management of the system for even the largest of organizations with hundreds of thousands of employees. NSS is a 64-bit file system that can manage a virtually unlimited number of file objects.

On each physical storage device, NSS abstracts up to four physical NetWare partitions to make them appear as contiguous free space. NSS recognizes physical and logical devices up to 2 TB in size from which you can create any number of virtual storage resources, called pools. You can choose space from at least four devices of up to 2 TB each to create a pool with a maximum pool size of 8 TB. A pool can contain an unlimited number of volumes. If the pool spans devices, the volumes automatically span the devices. A single volume can contain up to 8 trillion files and grow to 8 TB in size, depending on the size of the pool and space consumed by other volumes in the pool.

NSS Volumes

The logical volumes you create on NSS storage pools are called NSS volumes. You can specify a maximum storage quota for the volume, or allow the volume to grow dynamically to the size of its pool. You can add any number of volumes to a storage pool.

Because there is no limit to the number of volumes you can create, it is possible that the combined size of all the volumes taken together is larger than the storage pool itself. NSS refers to this process as "overbooking." If you overbook space in the pool, the individual administrative size of a volume cannot exceed the size of the storage pool.

NSS allocates space from the pools to the volumes only as needed. Typically, user consumption of a volume's available space ebbs and flows; it is quite unlikely that users concurrently consume volumes at 100% of their available capacity. Each volume consumes the space it needs as it needs it. By overbooking space, NSS provides a flexible and cost effective way to accommodate expanding storage needs.

How to recover data from crashed NSS Volumes ?

Kernel for Novell NSS - Novell Netware Data Recovery Software recovers data from corrupt volume(s) of a crashed Novell Server. Kernel for Novell NSS - Novell NSS Data Recovery Software can recover and allows access to the data when the volume(s) cannot be mounted, it recovers and allows you to save your data to another drive after cases of missing volumes, deleted files, corrupt volume(s), allocation errors and novell partition loss. Kernel for Novell NSS Data Recovery Software uses quick algorithm for searching and restoring lost partitions, files and folders and hence is a fast, simple and easy to use Novell NSS data recovery software, which helps you to recover your lost data and files in minutes in case of disk crash or data loss disasters and hence supports your business continuity.

Professional Data Recovery Software and File Repair Utilities

Offsite Backup Services are Essential

Although you may not list it in on your IRS form, information is your business' primary asset. From your customer database to your financial records to your proprietary product information, information is the key element to maintaining both the day-to-day operations of your business and its long-term viability.

Unfortunately, as the sophistication of technology increases, so do the risks to your business. Viruses, hackers, and natural catastrophes can all attack your business information. At best, this renders your business inoperable for several hours or days. At worst, the loss of business information can cause you to go out of business.

Lest you think that information loss could never happen to your business, statistics reveal that the problem is pervasive and, oftentimes, devastating. During any given year, over five percent of PCs will have some type of data loss, and almost a third of PC users have experienced the loss of all of their data at some point in their lives. Almost two-thirds of companies that experience catastrophic data loss go out of business within six months. Of those companies that test their back up tapes, more than three-quarters have found problems with the tapes.

In order to minimize your company's exposure to the risk of data loss, you should create an organizational culture of security and implement a security program that helps the company prevent and recover from data loss due to viruses, hackers, and natural catastrophes.

Just as you would store your most precious documents in a bank safety deposit box, you should store your company's most important data with online backup services and use secure offsite backup.

According to SERVARE, the premiere company for online offsite backup services that are secure, affordable, and automated, you should consider backing up the following types of data:

* Databases and information that allow you to serve customers and maintain your market competitiveness. In other words, if you lost this data, you wouldn't be able to fill customer or supply chain orders or provide client services.

* Information that manages your revenue generation, such as accounts receivable, and vehicles for customer ordering and payment acceptance.

* Data that controls your cash flow, such as your accounts payable and supplier payments.

* Data that, if lost, could result in additional expenses, such as employee downtime and late delivery penalties.

* Proprietary information that could be stolen or compromised.

* Data that is affected by governmental regulation, such as the Freedom of Information Act.

SERVARE's online backup services protect your business' information from data loss by utilizing advanced file encryption before transmission; quick, safe, and secure transmission to their online backup servers via a secure high-speed Internet connection; automated backups; flexible recovery capability; and scalable storage that grows as your need for storage grows.

With an offsite backup, you'll rest easier knowing that your information is secure.

Chris Robertson is an author of Majon International, one of the worlds MOST popular internet marketing companies on the web. Visit this Computers Website and Majon's Computers directory.

The Easiest Way To Prevent Loss Of Data Is To Back It Up

Nothing could be more traumatic that losing all the files that you accumulated for years in a computer crash down. For people who work at home and earn money from their personal computer, this could mean losing not just their files but a few clients as well especially if recovery of important data is impossible. In order to avoid such incidents and getting yourself into more troubles than you would care to handle, it would be best to create some back files for the things you are doing on your computer. In fact, it would be wise to create not just one but two back up files just to make sure that if ever you have a hard drive failure, you will still have other files which you can use.

There are many ways to create back up for your files. You can buy one of those USB drives which could store large quantity of data, you can add another hard disk into your computer or you can opt for the simple CD Rom back up.

If you are on a budget, if would be a good idea to go for the CD Rom since it is a lot cheaper than the USB and the extra hard drive. Furthermore, with the CD Rom, you can easily create multiple back up by simply burning more CDs if you want. You need not worry about the cost since CDs nowadays are mass produced and the prices are very cheap.

Compare to the extra hard drive, storing and transporting files in the CD format is more convenient. A single disk could accommodate as much as 700MB of files, which is really quite a lot if you are just using the simple word or excel format. If want to save pictures and other graphic files, the CD can also accommodate a good deal of files too.

When using CD Rom for back up, you may use the writeable disc or the rewriteable disk, depending on your need. If you simply want to back up your files and create something, which you don't want to willfully or accidentally altered, you better use the writeable format. The good thing about this writeable CD format is that you file is relatively safer than in the rewriteable one since once the CD had been burned, the content thereof will in the read only format.

No one can really tamper your files if they are in the read only format so that would be best if you only want to create back ups. On the other hand, if you want to update your files every now and then, you may use the rewriteable format that allows more flexibility in terms of storing data. Unlike the writeable format which will only allow you to burn files at one time, the rewriteable format can be used several times.

Gregg Hall is an author living in Navarre Beach, Florida. Find more about this as well as a data back up at www.how-to-do-it-right.com

Corrupt PowerPoint Presentation Recovery

PowerPoint presentations are used to educate the audience through presentation of words, images, animations, block diagrams in simple steps which can be easily understood by the target listeners and learners.

MS PowerPoint is the best presentation tool till date and is used worldwide by corporates, instructors, educational institutes, marketing firms, PR professionals to communicate with their audience. But there are always high chances of these presentations being getting corrupt due to virus attacks, unexpected system shutdowns, media corruption or power failures.

There are รขโ�ฌห�nรขโ�ฌโ�ข number of reasons due to which a presentation file (.ppt, .pps, .pot) can get corrupted and similarly there are several ways to recover back the corrupted.

Whenever you receive a power point file, first perform a check;

Is the file password protected? รขโ�ฌโ�� The file might be secured by a password. In this case try to know password of the file and open it in its respective version of MS PowerPoint.

Is the file received as an email attachment? - If you have received the presentation file as an email attachment, then chances are that it might have been corrupted as the file traveled through cyberspace. In this case you can ask sender of the file to resend the file as a zipped attachment by WinZip or any other compression utility.

You might be using a new version of power point (2003) to access a presentation file created on older version of power point (2002). In this case you have to install the respective version of MS PowerPoint in which the file was originally created.

Some of the solutions and measures which are inbuilt in MS PowerPoint prove beneficial to recover data from the corrupt power point presentation files, which are:

Use of 'Slide from Files' option from the Insert menu:

1. Open a new blank presentation, select the Slides From Files option from the Insert menu.

2. The Slide Finder dialogue box will appear, browse and add your corrupt .ppt file.

3. Click Insert All

Note: If in case the "Insert All" option does not work then select the individual slide and click "Insert".

Open the presentation file in MS Word:

You can recover and repair the corrupt presentation file by opening it in MS Word:

1. Open the MS Word application

2. Click the File menu and select Open

3. The Open dialogue box will appear, click the File of Types menu and select Recover Text from Any File.

4. Browse the corrupt presentation file and click Open.

The repaired file in word will lose all its formatting, a little extra manual effort will have to be applied on to get the original formatting. Save the repaired file and with the help of Send To option in the File menu open it with MS PowerPoint.

Move the file to different place

If you are opening a .ppt file on any removable storage device (floppy disk, USB drive, CD-ROM etc.) then first copy it to your hard disk and then try to access it.

If the presentation file is not accessible then copy it to another drive of your computer system and then try to open it. For example, if the file is saved in C drive then copy or cut and paste it to D drive.

Try accessing the file on different computer system.

Try a Third Party Recovery Utility

If all of the above-mentioned solutions donรขโ�ฌโ�ขt prove beneficial in your case of file corruption, then you can take help of the third party recovery solution to recover and repair the damaged/corrupt presentation file. There are many recovery solutions which exist in the data recovery market, but not every recovery tool can provide the complete recovery possibilities in case of deleted slides, master slides, images, animations, sound effects and other corruptions of power point damages.

Kernel Recovery for PowerPoint is such a file repair tool which effectively repairs the corrupt presentation (.ppt, .pps, .pot) and recovers the deleted slides, image objects, text, animation effects, sound effects, auto shapes (basic shapes, block arrows, callouts, flow charts, stars-banners, action buttons, lines and connectors), tables, embedded OLE files, wave sound files, excel files, word files and word art images.

The Kernel PowerPoint Recovery tool outwits other power point file repairing tools by even restoring the animated, media player sound effects which were not easy to recover before. The software is equipped with two modes of recovery viz, Standard mode and Integrated mode. Standard Mode recovers major corrupted presentation files with the complete data whereas Integrated Mode is fast and is useful in the case of minor corruptions which retains formatting.

The Demo version of Kernel PowerPoint recovery software is available for FREE download. You can test and evaluate the features and functionalities of the software. After being satisfied with the recovery results in your case you can purchase the Kernel PowerPoint repair software.

About Nucleus Data Recovery (P) Ltd.

Nucleus Data Recovery (P) Limited is the industry leader in data recovery products and hard disk recovery software tools, which includes file repair, file recovery, database recovery, backup recovery and email recovery products. The technologically advanced company provides world-class data recovery products and data recovery services to promote the data safe world.

The Kernel Recovery software range supports recovery from Windows (95, 98, ME, NT, 2000, 2003, XP), Apple Macintosh, Linux, Novell, Unix operating system and FAT, NTFS, NTFS5, HFS, HFS+, NWFS, JFS, EXT2, and EXT3 file systems.