Monday, February 25, 2013

One Method of Data Recovery from a Dead Hard Drive

Here is the situation. A laptop comes to us with a dead hard drive. Unfortunately, the user needs some files off the dead drive. After much research on the internet and a couple of data recovery quotes we decide to try and recover the information ourselves.

Luckily for us the drive won't spin up at all. I say luckily because the usual problem is that the circuit board on the bottom of the drive went bad. That doesn't mean that something else isn't the problem, but replacing the circuit board is the simplest thing to try.

The first thing needed is another hard drive. That may sound easy but it isn't. You need an identical hard drive, and by identical I mean the same model number, part number, firmware, everything. In our case we had a Hitachi Travelstar hard drive that had three numbers to match. The important numbers were the model number, part number, and MLC number. I believe the MLC number has something to do with the firmware revision but don't quote me on that. After speaking with Hitachi I was referred to a company called CueTech. They specialize in finding "hard to find" or obsolete computer parts. The wanted to charge between 0 and 0 for the drive, which I thought was reasonable for the work required to find one. Instead of using them I decided to search on my own and after two days, still had not found another drive for sale that met my needs. We then started looking in house for similar laptops and found one that had an identical drive. Now we were in business.

One Method of Data Recovery from a Dead Hard Drive

Now that we had our drive, we needed to protect ourselves because the user wanted their machine back in working order. So before we started any kind of surgery we made a ghost image of their hard drive. After waiting the 20 minutes or so for the backup to finish we began the surgery. First we removed the hard drive from the working system and laid it on a static pad with the circuit board up. We then used a T-5 Torx drive to remove the screws securing the circuit board to the hard drive. Your drive may need a different size or style of screwdriver. We then repeated the process on the bad drive. We put the circuit board from the good drive onto the dead hard drive and placed it back in the laptop. It booted! As soon as we new it worked we then setup the system to make a quick drive image. After waiting another 20 minutes we had a drive image of the bad hard drive and our data was recovered.

To finish the process we had to put the circuit board back on the original good hard drive and verify that it was working correctly. Once that was completed and the laptop returned to its owner, we installed a brand new hard drive in the system that had the original issue. The last step was to restore the drive image to the new hard drive, verify that it worked, and give the laptop back to the owner.

One Method of Data Recovery from a Dead Hard Drive
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Gary Higbee

[http://www.greatnorthcomputing.com] - A community for SysAdmins and Programmers.

mobile phone watches Best Buy Oe Replacement Cadillac Srx Driver Side Special Price Gingham Cradle Sheets Set

Saturday, February 9, 2013

Disaster Recovery Plan Template - Avoid This Mistake When Using a Disaster Recovery Plan Template

What is the mistake? Focusing your disaster recovery plan template on technology first and business process priorities second.

This might sound like a strange statement coming from network infrastructure experts. But focusing on appliances and software solutions can lead to the development of incomplete or inadequate solutions and this can be an expensive and humbling mistake! IT Business Continuity and Disaster Recovery (BCDR) is not about appliances, power supplies, routers, switches and servers, it's about supporting business processes.

Business Continuity and Disaster Recovery (BCDR) are two separate and related concepts that are often lumped together when developing recovery plans. Let's start with some quick definitions.

Disaster Recovery Plan Template - Avoid This Mistake When Using a Disaster Recovery Plan Template

IT Business Continuity

Business Continuity refers to an organization's ability to keep vital business operations running at or near normal capacities in the event of infrastructure failure. These failures can be caused by human errors, power failures, application errors and a host of others that impact the ability of the infrastructure to properly support the organization. When speaking of Business Continuity the majority of the infrastructure remains in place and functional which is in contrast to Disaster Recovery.

IT Disaster Recovery

Disaster Recovery refers to incidents that significantly impact or make unavailable critical infrastructure. The most common examples are natural disasters and other "acts of God." Planning for data protection and recovery are fundamental to disaster recovery principles.

So the idea of BCDR really is to ensure that your company or organization continues to function at or near normal capacity levels under even the most challenging conditions.

Sounds pretty straightforward, right? Well, wrapped up in that deceptively simple concept are dozens, hundreds, perhaps even thousands of business processes, most, if not all of which are dependent upon your IT infrastructure for successful execution.

So the place to begin defining your disaster recovery plan is not in the server room but rather out among the business units.

For example, maybe you work for a financial institution that has to comply with Sarbanes-Oxley, HIPAA or PATRIOT Act regulations. Information availability is required under all conditions, including routine back-up. Fines for non-compliance and damage to reputation for failure to comply are huge.

Or

Your organization manufactures precision electronic components and your ERP and inventory management systems must be operational during the week. Downtime costs you 00/hour. However, routine maintenance can be performed during the week.

Or

Your company processes a high volume of data entry, fulfillment processing and shipping operations around the clock. Downtime has been calculated to be ,700 per hour.

3 different scenarios with 3 entirely different sets of requirements.

Hopefully you see that before you can develop or use a recovery plan template for your organization you must identify, understand, and prioritize the requirements of each of the most critical processes.

Disaster Recovery Plan Template - Avoid This Mistake When Using a Disaster Recovery Plan Template
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

To learn more about developing or using disaster recovery plan templates more effectively I highly recommend you read the white paper titled The Disaster Waiting to Happen: The 4 Biggest BCDR Mistakes People Make And Why They Cost So Much. You can get your copy while supplies last here Disaster Recovery Plan Template and you'll discover why Business Continuity and Disaster Recovery Planning remains such a hot topic in the IT infrastructure world today.

Kurt Buckardt is CTO of Konsultek a leading edge network infrastructure and information security company located in Chicago, IL. Kurt can be reached at 847.426.9355. To learn more about Konsultek and how we can help you with your BCDR, network infrastructure and information security needs visit http://www.konsultek.com

cell phone watches Special Price Luxe Amendoim 4 5 X 48 Best Offer Cooper Tires Discoverer Stt 35X12 50R17Lt

Wednesday, February 6, 2013

Recover RAW Drive - RAW File System Recovery Solution

Raw drive file recovery is possible. File system raw, or sometimes we call raw drive is not a Windows recognized file system. It is an error that your drive encounters. What's worse, files in the drive are gone since you may notice that by right clicking the drive, it shows file system raw and disk space 0 bytes. Then where did your files go? Can you retrieve them?

Raw drive is a special file system error that is along with other possible symptoms like "disk is not formatted, do you want to format it now?", chkdsk is not available for raw drives, sector not fond, file system displayed RAW, invalid media type reading drive...

To restore files from raw drive, you can find your solution at rawfilesystem.com, which provides the solution for you whenever your storage media became RAW or not readable.

Recover RAW Drive - RAW File System Recovery Solution

SD card can become raw and not reading in computer, external hard drive can become RAW if you insert it to your PC and try to open the drive, pen drive, Maxtor hard drive, Seagate hard disk, western digital hard disk can fell into RAW file system problems.

When raw strikes hard drive partition, it may ask you to format the partition to make it recognizable disk for operating system. RAW is a system provided file for a drive, which is a last resort for all Input/Output requests needing system file support. When I/O manager calls the active filesystem to mount the hard drive volume, the RAW system file is always called last as it support all types of disks and tape media.

The truth of raw filesystem or rawdrive is the damaged or missing FAT, fat allocation table or master boot sector damaged. FAT and master boot drive is lost, damaged, corrupted by virus, software error that brings to your system, and your system cannot recognize your drive any longer. The most common file system recognized by Windows operating system or Linux system are NTFS (NTFS5, NTFS), FAT(FAT16, FAT32), EXT2,3... RAW is not the right system type, what you may do is to restore files from the raw drive.

To recover raw partition, just download the program called iCare data recovery, which provides up to date searching technology and get files from raw drive. Download a free trial of icare data recovery from rawfilesystem.com and run it on Windows platform. Connect your raw drive to the system if it was an external storage media like sd card, external hard disk, pen drive, usb drive... Run "Deep Scan Recovery", a powerful recovery module provided to search files that are lost with the in depth searching technology by scanning the data area over the FAT.

iCare data recovery is the most comprehensive data recovery utility to effectively handle the raw drive file recovery scenarios. It recover files from formerly FAT32, NTFS, NTFS5 partitions and it is compatible with Windows 7, Vista, XP and Server 2008, 2003 OS.

Recover RAW Drive - RAW File System Recovery Solution
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Rawfilesystem.com is the computing experts to help you understand what file system is and what is raw file system, how to restore files from raw file system, raw drive, raw partition, disk space is 0 bytes, convert raw to ntfs, covert raw to fat partition solutions by http://www.rawfilesystem.com/

watches cell phone Best Buy Virginia Tech University Car Magnet Large Save Save On La Mer The Powder 03 Beige Special Price Luxe Amendoim 4 5 X 48

Sunday, February 3, 2013

SAS 70 Compliance For Data Centers

Weighing in on the Benefits of a SAS 70 Audit for Third Party Data Centers

With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener eye than we live in today. From insider scandals to outside threats, the protection of corporate and personal information is the corner stone of information security compliance. Obtaining a current SAS 70 audit report can be a significant differentiator within your industry and provide value to new and current customers.

Statement of Auditing Standards No. 70 (SAS 70) audits have become the global de facto standard in third party information security assurance. The passage of laws like Sarbanes-Oxley (SOX) has sparked other countries to re-evaluate their own forms of SOX regulations; driving companies to enter a new realm of oversight and regulations related to third party assurance. The Public Company Accounting Oversight Board provided guidance with regards to companies that are required to comply with SOX and how to evaluate the risk of outsourcing services to third party vendors. Within this guidance they indicated that a company could utilize a SAS 70 Type 2 audit to evaluate their vendor's control environments, igniting the SAS 70 era for service organizations.

SAS 70 Compliance For Data Centers

The demand for convenient access to information has driven companies to plug anything and everything into the internet; additionally new technologies have provided organizations a level of comfort to open up their once closed networks to remote employees and third party vendors. Increased flexibility and access to information creates new risks that need to be taken into consideration; standard operating procedures are no longer good enough, organizations need to incorporate regulations and define authorizations to ensure they maintain the level of security that existed in the pre internet world. This change in the way companies' data is accessed and transmitted has propelled the SAS 70 audit to the checklist of business proposals and contract renewal requirements, failure to have a current SAS 70 audit can significantly affect potential or current business relationships.

SAS 70 Compliance | Current and Future Trends

SAS 70 has not been the single solution for service organizations; with foreign countries forming their own compliance standards, service organizations operating internationally were required to adhere to different countries' laws. Due to the varying forms of service organization reports the International Auditing and Assurance Standards Board (IAASB) felt there was a need for a common auditing standard to address the varying differences in each country's audit requirements. As a result the IAASB created and issued the International Standard on Assurance Engagements (ISAE) 3402 'Assurance Report on Controls at a Service Organization' on December 18, 2009. ISAE 3402 is not a means to replace country specific standards (i.e. SAS 70) but provides a reporting option to address current limitations. The American Institute of Certified Public Accountants has recently updated the SAS 70 audit to more closely align the standard with ISAE 3402; the new standard is Statement on Standards for Attestation Engagements No.16 (SSAE 16) 'Reporting on Controls at a Service Organization' and will become effective in June 2011. Visit our Blog for more information SSAE 16.

Even with all of the different changes to compliance standards that companies are facing today, as we move forward and align our clients with the appropriate rules and regulations whether it's called SAS 70, ISAE 3402 or SSAE 16 these auditor reports are a marketable and accepted form of qualification for service organizations that will continue to play a vital role in obtaining and retaining customers today and for years to come.

SAS 70 Audit | What is it?

A SAS 70 audit is performed by an independent certified public accounting firm through examining the controls and processes involved in storing, handling, and transmitting data. The successful completion of an unqualified audit illustrates an organization's ongoing commitment to create and maintain suitable controls for the protection and security of its customers' confidential information. Customers of service organizations can easily incorporate the SAS 70 report in their SOX compliance programs as proof that appropriate controls are in place for outsourced services. The SAS 70 audit can also help organizations to comply with other regulations, including HIPAA (Health Insurance Portability and Accountability Act), GLBA (Gramm-Leach-Bliley Act of 1999), and ISO 27001/2.

SAS 70 Audit Services

SAS 70 Readiness Assessment - is a review designed for organizations preparing for their first SAS 70 audit. Organizations who have not formally evaluated their internal controls often start with a SAS 70 Readiness Assessment.
SAS 70 Type 1 - provides limited assurance and reports on the design of controls as of a point in time. Organizations that have policies and procedures in place but little or no history of the policies and procedures in operation start with a SAS 70 Type 1 audit prior to undergoing the SAS 70 Type 2 audit.
SAS 70 Type 2 - provides the highest level of assurance for SAS 70 audits and reports on the service organization's controls and operating effectiveness over a period of time (generally at least six months).

SAS 70 audits cover the "information system" used by service organizations. The information systems are not limited to just computers and software, but any form of handling user organization's information that could affect their financial reporting. The scope of a SAS 70 audit includes procedures that cover the IT General Computing Controls (GCC) supporting your primary information systems. These controls are used in delivering services and sustaining business procedures for organizations processing financial transactions like payroll companies or electronic payment processing organizations. Details of the IT GCCs and business process procedures are as follows:

1. An examination of IT GCCs is used to evaluate the integrity of data within information systems utilized in delivering services. This portion of the SAS 70 scope is relevant to all service providers and is the core of your SAS 70 audit. The IT GCCs review will cover the physical security, environmental security, computer operations, problem and change management, logical security and data communications.

2. An assessment of business process procedures is used to evaluate how organizations ensure the accuracy, timeliness and completeness for processing financial transactions. This assessment is relevant for organizations like payroll providers, receivable management companies, payment processors and third party administration services. This portion of the SAS 70 scope is not relevant for organizations like software as a service, application service providers or data centers. However business process controls may be integrated in the application software such as a payroll system, retail banking system, inventory system or billing system and require some manual processes like account reconciliations.

SAS 70 Compliance for Data Center Facilities

Data Center growth has definitely been a bull market the past few years and with increased regulations like Sarbanes Oxley, a need for better disaster recovery plans and new technologies like cloud computing data centers are a focal point for SAS 70 audits. Generally, Colocation and Managed Data Center services are the two major service offerings that are evaluated for Data Center facilities.

Colocation audits are designed to provide third party assurance on the company's organizational controls, physical security over customer's equipment, protection of computer systems from environmental threats, continuous power supplies and incident support handling.

Managed Data Center services normally includes the items in a Colocation audit but also requires a more in-depth look at how the service organization manages the security and infrastructure of their client's environment. This would include the management and monitoring of information systems for system reliability, handling of logical security, infrastructure change management and security around protecting customers from network traffic.

The scope of the SAS 70 audit is determined by the service organization; however a well scoped audit can ensure sufficient information is provided to your user organization and communicates your stringent controls over physical security, environmental security, authorized access and continuous availability of services, which clearly demonstrates your organization's quality of services.

Key Benefits

Obtaining SAS 70 compliance has enabled service organizations to instill confidence and integrity directly into the hands of their customers, ensuring the reliability of sound internal controls for increased third party assurance. Key benefits from SAS 70 audits are:
• Instant credibility with current and potential customers
• Third party perception
• Independent assessment of controls
• Potential to grow market share
• Reduction of third party self assessment questionnaires
• One audit report can satisfy multiple customers
• Confirmation that controls, procedures, and processes are in place as management intends

Key Costs

Key cost areas for SAS 70 audits include your company's internal personnel time, training and your audit firm's professional fees. Depending on level of defined policies and procedures internal personnel time and training can vary significantly. The professional fees cost of a SAS 70 audit varies from client to client because all SAS 70 audits are different. However some of the factors that should be considered in the price of a SAS 70 audit are the size of your organization, the complexity of the information systems under review, the type of services offered and possibly the location of your business.

Lessons Learned

We have found that having a clear plan and efficient execution strategies are the key ingredients to a successful SAS 70 audit. Key success factors for an efficient SAS 70 audit include but are not limited to the following:
• A project plan
• Designation of a SAS 70 project lead
• Scheduling of required resources (members of business units)
• Utilization of experience and educated auditors

Calculating the ROI
A SAS 70 audit provides organizations with tangible and non-tangible results. Let's start with the non-tangibles. As a component of your SAS 70 audit, your audit firm provides a complete analysis on your operations writes up a report and delivers management best practice recommendations that could benefit an organization from increase efficiencies to a reduction of fraud risk. These benefits are difficult to quantify, but still valuable information. Tangible costs can be found by the number of new customers that selected your organizations because you were SAS 70 audited. Also operating on a higher level of compliance will provide your organization with more leverage with regards to pricing when renewing existing customers' contracts.

SAS 70 - is an internationally recognized third party assurance audit designed for service organizations. It has become the most widely accepted compliance initiative that provides service organizations a benchmark to compare their internal controls and processes against industry best practices. Statement on Auditing Standards No. 70 was originally created in 1992 and over the past five to ten years become globally recognized as one of the highest forms of third party assurance. Organizations can benefit from obtaining a SAS 70 audit, from increasing third party confidence to growing market share.

SAS 70 Compliance For Data Centers
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Authored by Ben Osbrach, CISSP, CISA
Contact info: Direct 813.924.5404 | Toll free 866.669.6561
osbrach@assuranceconcepts.com
http://www.assuranceconcepts.com

watch mobile phone Best Buy Pac Strapping 5830116B36 5 8 X Best Buy Virginia Tech University Car Magnet Large