How does does data recovery on flash memory work?

Q. I understand generally the technology involved in data recovery on magnetic media, but would like to know how data recovery is possible on flash memory? How is there any trace of deleted data? How does the software do this?

A. There are two forms of data recovery for flash memory, one in response to physical hardware failure, in which case it is usually an interface issue, and specialized hardware is required to do this as the interface is physically replaced.

The scenario it appears you are asking about is the second, in which the data has become inaccessible but still resides on the flash memory. This would be due to issues such as a virus infection, failure of interface programming in the USB Flash Device, etc.

In this case, essentially what the software attempts to do is instruct the USB device to pour out a copy of everything it contains so that the software can attempt to make sense of it instead of the USB device translating into an operating system friendly form.

What are some good companies to recover data from hard disk?
Q. I need a data recovery from my SATA hard drive that failed. Can't get data back. Had a recovery, but some important (sentimental) video files were not on recovery. I think it's still there on the failed disk that I removed but kept.

Question is, are there any reputable companies that I can send my disk and have them recover all the data on that disk? Especially pictures and videos. I figure it'll cost a lot, but I want the data if it's still there.

Thanks for any advice.

A. DNSSOFT Technology Inc is advanced data recovery company commited to develop data recovery software,supply data recovery services.
http://www.diskgetor.com/hard-disk-data-recovery.htm

Is information technology a viable major for a career?
Q. I am considering a degree in information technology. What types of jobs could I get. Could I be like a bank computer security person or work for IBM or something? The degree is information technology not computer science.

A. There are security positions available but usually it would be a few years of experience before you are eligible. Other positions you could get are:

Computer Technician - Works on computer hardware at user location or in service center. (entry level IT Job)
Service Center Coordinator - Schedules the repair of user community computers, orders spare parts, schedules staff, establishes priorities, maintains loaner laptops and non-US laptops for travel outside of US.
Help Desk Staff - answer questions and resolve problems for the user community. (entry level IT Job - Tier 1 support)
Storage Administrator - in charge of mass storage servers and devices.
Network Administrator - Works on routers, switches, hubs, cables, load balancers and all the other hardware that handles LAN and WAN network traffic. Also, may be responsible for IP phone service.
Systems Administrator or Systems Engineer- Works with servers, laptops and desktop computers to keep them free of problems and secure the data they contain. Responsible for Security group creation and memberships, server patching, anti-virus protection updates, password changes and any automated mechanisms that make these changes. These positions may be divided into server and desktop teams. Tier 2 support.
Enterprise Administrator - Handles Enterprise support and design issues. Tier 3 support.
Active Directory Administrator - Designs and administers Active Directory infrastructure, AD policies, access permissions, roles, group policies, separation of duties.
Exchange and Messaging Administrator - maintains mail systems servers, other mail related devices and the company messaging infrastructure.
Backup Administrator - Maintains backup devices and determines backup strategies so data that was deleted accidentally or intentionally can be recovered. Design and control how and when data is backed up, where the backups are stored and how long the backups are retained. They will test to be sure backups are valid and usable.
Disaster Recovery Specialist - Plans for disaster events so the company data and infrastructure can be brought back online as quickly as possible after a fire, flood, earthquake, terrorism or other disaster event. Plans for failover of services to alternate locations, if the primary location is not available.
Database Administrator - Maintains the company databases which may include customer and sales records, billing information, inventory and other data.
Computing Security Specialist - A company's biggest asset is its data and the Computing Security Specialist will work to try to keep that data protected from loss. They may be dealing with and defending against viruses, hoaxes, malware, keyloggers, phishing attacks, internal attacks and domestic and foreign intrusion. Develops monitoring and interception systems, filters and strategies and works with appropriate government agencies.
Corporate IT Acquisition Specialist - Works with acquired outside companies to establish migration into the corporate computing infrastructure.
Data Center Administrator - Maintains the data center facilities where the company's servers and other devices reside. They are responsible for physical security and may review badge reader and camera information to be sure that only individuals with proper access are getting close to the company's servers and other critical devices. Also, maintain backup power devices (UPS or generators), climate control equipment, fire suppression equipment, establish access policies, etc.

In a small business the list above might be one or two people doing all these jobs. In a large Enterprise environment this could be hundreds of people.

Best wishes!




Powered by Yahoo! Answers