About Technology

update technology ,more fast more smart...

Data Recovery and Disaster Recovery Differ!

Written by oneself on 8:44 PM

by: Ken Roberts


Data Recovery is not Disaster Recovery - contrary to popular belief. Ask somebody what data recovery is, and nine times out of ten the response is, "backup". Thinking the question is too vague, I set out to ask a better one: "What is the difference between disaster recovery and data recovery?"

Technicians, you'll love this one...

When speaking to a group of corporate executives - while attending the world's largest technology conference in Germany - I opened the discussion by asking them to define their data recovery strategy on a piece of paper in thirty seconds. Some of the answers were mind-boggling. The most popular one: "backup server". The most honest: "I don't know, our IT department handles that." And the most ridiculous: "We don't have this problem."

The data recovery dog and pony show...

One man came forward and said, "I've lost some data that I need to present at a talk tomorrow. Do you think you could help me out?". After listening to all the...I can't believe what I am hearing, I thought of an idea: Recover this guy's files right here in front of everybody, and they will get a first-hand experience of what data recovery is. So, I canned my speech on Implementing Effective Data Recovery Strategies.

Everybody raised their hands when asking them if they would like to see a demonstration of data recovery. I stated that, 'This man - Herb from South Africa - has lost some data that he needs for tomorrow, and that I will first attempt to recover some of it.

Smiles, chuckles, and laughter...

Luckily, all of Herbs pictures were recovered. In fact, the data recovery went so well that many more pictures he had lost were recovered too, but I did not know it at that moment. I asked Herb if I could do a slide show of what I recovered. Slide one: A mind-map laying out his presentation for tomorrow. The next few slides: Details of slide one. Then came the pictures that roared down the house. Let's say that Herb was revealed in a way I cannot discuss here.

What is data recovery?

What the executives learned is that data recovery is your last resort to recover lost data after every possible backup method has failed - while disaster recovery is implementing a comprehensive data backup plan, so that when data is lost, you simply access the backup server or a local storage device, like a USB key, to retrieve your lost file.

Herb made his presentation on the airplane on the way to the show, but failed to back it up. He thought saving then to his laptop hard drive was good enough. In this case, he was not able to access his files because his computer would not boot to the desktop. So, data recovery software was used to access the computer, and then to reconstruct the file system, so that the data could be recovered to another storage medium to be used again by Herb.

Data recovery is a multi-billion dollar business...

The data recovery industry would be bankrupt if everybody would have a complete backup plan. But every day without fail, we get calls from people like Herb who are intelligent and run multi-million and billion dollar companies who have lost their data. Our advice: Backup your work - and not to the computer you are using. And then confirm it, because failure is quite common. Finally, make sure you use the Disk Defragmenter function regularly, so that if you do encounter a situation where data recovery becomes inevitable, the success rate will increase substantially.

You can find more written, audio and video information discussing the data recovery industry at ACR Data Recovery. Ken Roberts has been developing data recovery software and performing data recovery services worldwide for over 15 years.

Read More......

Top 5 Tips For Protecting Your Computer

Written by oneself on 7:00 PM

by David Grahams

Top 5 Tips For Protecting Your Computer

Do you ever feel like you know just enough about PC Security to be dangerous? Let's see if we can fill in some of the gaps with the latest info from PC Security experts.

Today, more and more people are using their computers for everything from communication to online banking and investing, to internet shopping.

As we do these things on a more regular basis, we unknowingly open ourselves up to a multitude of online threats to our PC's security. These include but are not limited to potential hackers, attackers and crackers. In addition there are pieces of software, malware, adware and scripts containing Trojans and other such virus like nasties that are all intent on soliciting some form of information about us which may already be contained in personal files on our PC systems.

1. Get a Router. If your broadband connection is through some form of modem (normally USB or cable) supplied to you by your ISP (Internet Service Provider), make sure you attach this to a Router and then attach that Router to your PC. Many people just attach the modem to their PC and then rely on Anti-Virus software to protect them. This is simply not enough nowadays, and they will surely have a problem somewhere down the line.

2. Make regular Backups of your data and important information and keep it in a safe place that is separate from your computer. Nowadays there are a lot of different ways to achieve this, especially with the advent of DVD writers and low cost hard disks which enable a lot of data to be backed up and stored "offline".

3. Keep your operating system, web browser and software updated frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com and locate possible patches for your Office programs. If you have Windows XP service pack2 installed (and it is recommended that you do, because it contains inbuilt security fixes) you can use the Security Center from the Control Panel to turn "Automatic Updates" on. This will keep your system updated with all the latest patches and fixes that Microsoft releases.

4. Make sure you install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs. Of course, if you use a router (which is recommended) this will already have a firewall built into it, and this can work in addition to any software firewall you choose to install on your PC.

5. Check your internet browser and email client settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the "Internet zone" to High, and your "trusted sites zone" to Medium Low.

I hope that reading the above information was both enjoyable and educational for you. Your learning process should be ongoing--the more you understand about any subject, the more you will be able to share with others.

source : www.goarticles.com

About the Author

David Grahams is a successful Internet Marketer. In addition to writing articles and ebooks on Internet Marketing, he is also a qualified Microsoft Certified Systems Engineer, and is the author of the successful ebook "Ultimate Online Security". http://www.theidealebook.com/ultimateonlinesecurity.html


Read More......