Tuesday, April 5, 2011

He strongly

"Head, the machine is found, is a network company's server, and I asked them to bring back all of that server, but before that I checked and found the man of important documents have been removed, the simple data Recovery does not work. "Martin depressing road. Hsin Tao really careful guy, evidently also thought of this crop of, those documents have been destroyed with a special way, the average recovery is not enough.

"Ah, I know." Kevin had expected phase and the other not so good, this is Martin, he moved back to the entire machine because, "You left something to Kane, see if you can find out what . "

Kevin Kane has a population of Germanic descent, his grandfather in World War II when the evacuation to the United States, then joined the American nationality in this settlement. Kane and most of the Germans, the Germanic peoples inherited serious, rigorous, and never giving up. Kane Zhuangzhuang high disk data recovery is good at, known as "can not not restored data", and this has also been recognized by his colleagues in the implementation of tasks, Kane often play a key role in the ability of .

He grew up on the disk to save the data of particular interest, spent almost all my time to study this, through research, he found that many operating systems (like windows) and can not really delete files. For example, if we are in the Windows Explorer, delete a file, Windows will file into the recycle bin, even if we emptied the Recycle Bin (or another method: hold down the shift key to delete files), the operating system will not real clear the file data.

Remove Windows actually just called the first letter of the file name into a special character (the special characters is a sign of the existence of the file), then the file occupies clusters marked as free state, but the file contains the data are still on the disk, next to the new file to the disk, these clusters may be using the new file to overwrite the original data. Therefore, they do not save the new file, deleted file data is actually still intact on the disk.

Therefore, it can bypass the operating system with software tools, direct manipulation disk, restore deleted files. If you do not accidentally delete an important document and want to restore, then do not cover it. Immediately stop using the computer, the disk can no longer save any files, including the recovery tools do not install the hard disk where the deleted file, because any write to disk the contents of the deleted files are likely to cover the release of the disk clusters. If you must install the recovery tool, you can install to a hard disk partition, floppy disk, or simply remove the hard drive to another machine up recovery.

So, when Martin found the exact location of this server, when he punched a phone to that company's name to FBI and ordered them to stop using that server, that server will be promptly sent back to the move . Of course, in fact, hard to be specific as long as the piece, but their approach has been to move the whole machine, this is no exception.

"Hey, Kane, you're in the privacy of peeping Who?" Martin carelessly walked in front of Kane and then his right hand to catch his broad shoulders, and then commanded that followed a number of "coolies" "This is the line to put things, hard to you, next time you drink."

Dressed in black trousers of the "coolies" who bowed and then left.

Although Kane body than anyone here should be high and strong, but it is a very good temper, and deal with each of my colleagues in the relations are very properly, he does not think that Martin intended to act, growled, said: "Martin, you really cunning, the surface looks like a gentleman, the original hard drive hidden in several G Japanese AV. "

"Well ... uh ..." Martin a face became pale and quickly whispered, "Brother, I'm wrong, forgive brother. Please do not be so loud, let the leader know that on the whole did not, but I managed to collect The. "They know there is a strange team leader Kevin temper, very disgusted with these yellow things, once discovered, never let Kane have a little bit of scum do not delete the rest.

Kane does not speak, just moved ahead and assemble the machines, Martin will help in the side of hospitality, and soon to get.

"Let me try." Martin Kane boot time to seize a chair, he was there from the exploitation of Kane, a data recovery software, very practical, several times, his AV is accidentally deleted, he is using the software to recovery back.

"Honestly, I really admire this guy, this time with the boss did not catch him. I do not know why the movement first started, that did not allow us to break several Taiwan chicken." Martin said side edge of operation.

Kane nodded and said: "The goal is very strong, I guess, the beginning of something else he must busy." For Martin's attempt to take, he did not mind, because he knows that if the opponent is really strong case, their Martin, certainly to no effect on that software.

The facts as he expected, Martin data recovery software to scan a pass, recovered only a few ordinary file, there are some garbage file fragmentation.

"Kane, he was really strong, it seems that he is also the principle of data storage disk has a deep study." Martin obediently to the chair.

Kane "ah" sound, not to say, this machine is connected to the network, from their own machines downloaded another software, scanning a pass, more documents can be restored, but still did not find useful information He noted that there are several hard drive clean and get some space is not normal. Kane suggested that several space where deleted files is the other side, because if it is normal to use to delete files, there will be some more or less space, file fragmentation, deleting itself was so clean is not normal.

Martin was surprised and said: "Not yet?"

"He very strong."

Kane finished the piece of hard drive removed, the same strange machines connected. Martin Kane know that this is a killer. He rarely used the machine Kane, which is used for data recovery dedicated hardware device, the specific principles of Martin is also unclear.

Kane seems to know Martin's mind, explained: "I tell you about one of the principle. You know, the signal strength of the magnetic disk used to represent data bits 0 and 1 of them. When the read / write head to write to the disk into the data, it will adjust the magnetic data bits to an appropriate signal strength, but the signal is not as strong as possible, should not exceed certain limits, so as not to affect the adjacent data bits. not enough to store the signal strength saturated magnetization state of the media, so the actual signal recorded in the media by the previously saved in the same position signals, for example, if the original recorded data bit is 0, and now covered by a 1, then the actual records on the disk media certainly not as good as the original signal strength data bit is 1 of the intensity. "

Some understanding of Martin: "The original is also based on the electrical characteristics of the disk for data recovery."

"Yes. Dedicated hardware device to accurately detect the signal strength of the actual value, this value minus the standard intensity of the current data bit, to get a copy of the data is overwritten. In theory, this process can move forward recursive seven times, so if you want to completely remove files, you must repeatedly overwrite the data more than seven times, each time with a randomly generated data coverage. "

"Seven?" Martin said with surprise, and then he thought of their destruction of documentation usually, "Why do we usually only three on the line?"

Kane patient said: "Usually, when we destroy the file is in accordance with the Defense Department's" disk clean norms "carried out, it requires data to be covered three times: first time covering an 8-bit characters, and the second meeting with the characters code (0 and 1 full reversal of the characters) coverage, and finally covered with a random character. But this cleaning method does not apply to the media that contains sensitive information, such media must be degaussing, or destruction of its physical carrier. Of course, For most occasions, the simple treatment is adequate coverage. usually we deal with those files are not highly confidential, it need only cover a few simple on the line. "

"God, ah, the original simple document destruction usually there are so many pay attention, today I'm long exposure. Kane, really thank you so much! Ha ha, it seems that guy can not hide it!" Martin finished scrape together up, "how have found it?"

Kane shook his head helplessly.

"You mean he ... ..."

"Ah, he very strong."

No comments:

Post a Comment