Data Replay Services

Computer Crime / Digital Discovery / CCTV Image Recovery / Computer Forensics

Archive for November, 2013

Twitter Takes Steps to Protect Tweets from Snooping

without comments

Twitter logoTwitter has implemented new security measures that will make it much harder for anybody to eavesdrop on communications between its users and servers, which is calling on other Internet companies to follow its lead.

The firm has applied “perfect forward secrecy” on its Internet and mobile platforms, it said Fri. The technologies should allow it to be impossible for a business to eavesdrop on visitors nowadays and decrypt it at some time in the foreseeable future.

Facebook did not provide a reason behind the switch, however, it did connect to a blog post from the Electronic Frontier Foundation that implied the strategy be used as a means to halt the National Security Agency (NSA) or a different party from spying on Internet communications.

Obviously, much of whatever is sent over Twitter is destined to become public anyway, however, the service does help a direct message system between two clients that is concealed from public view.

In a blog post introducing the new safety, the company said it believes it “should be the newest normal for web service owners.”

At present, the encryption between a user and the server is based around a solution key used on the server. The data exchange is unable to be read, but nevertheless, it could be noted in its encrypted form. On account of the way the encryption works, it is feasible to decrypt the data at some time in the future if the server’s secret key actually be received.

With perfect forward secrecy, the data security is based on two shortlived secrets that can’t be later restored even with the understanding of the server key, so the data remains safe.

Because while security traffic is difficult to break with present computer technology, inventions in processing hardware and methods might make it less difficult to break in the future, it is an important principle.

It’s important to notice that as the technology safeguards against eavesdropping, it will not affect the ability of law enforcement agencies to get info from Twitter through conventional legal channels.

Written by Betty

November 26th, 2013 at 2:22 pm

Posted in Storage News

Tagged with , , ,

File Recovery by Data Clinic Ltd

without comments

File recovery by Data Clinic LtdYou might or might not have heard the word “hard disk drive” before – or perhaps heard it mentioned in a dialog or two a while ago, but just what is a hard disk drive? Let’s take a minute to answer these questions, and once we do, be certain to truly have a pencil and paper handy to acquire all of these important details.

Therefore, as a way to start, let’s reply an age-old question: Just what is a hard drive? The hard-disk drive in your pc is really a data storage system employed to not only save, but recover information held on it. We say disk, as it will it’s capabilities utilizing high-velocity rotating disks that are coated with magnetic materials. I guess you didn’t understand all this is happening in that small machine beneath your desk. Simply, each single time you should find a file, or application, or folder or some information that may be saved digitally, you’re probably using the hard-disk drive of the computer which is generally named the C Drive.

Let’s discuss physics and data for a second with regard to these hard drives. They’re generally the true size of the typical paper back book, but appreciably heavier. Therefore the surfaces on most hard-drives are predrilled. make sure to mount it making the end with all the connections within the computer, if you’re installing your own hard-disk drive.

You’ll find the jumper settings in the rear quite helpful, if you’re setting up drives. It will help the mainboard understand the way to recognise each drive whenever you’ve got more than one accessible. So it looks a hard-disk drive is a fantastic piece of technology with several advantages and several useful elements. But how do such an excellent machine fail? Let’s examine several common problems that result in hard disk failure.

To start, Hard disk failure occurs whenever the hard disk drive involved malfunctions, leaving all the valuable advice saved near to impossible to achieve. Even in ordinary daily work with a hard drive might fail for a range of reasons. Outside variables usually play a leading part in this kind of account, for instance exposure to fire high-heat, or moisture levels were increased by water /. As stated before, the disks operate with magnetic coating therefore exposing it to large magnetic fields may also cause failure. A big effect or an environmental contaminate can result in one of the very typical causes for hard-disk failure: A head-crash.

A head-crash is single-handedly the most infamous source of breakdown. For those of us in the UK, using Data Clinic’s file recovery service is an excellent and highly recommended way that can be used to retrieve data from hard drives that are damaged. These services are performed by Data Clinic’s experts using the right gear, and often get excellent results.

Sadly, since hard drives are all mechanical devices, they’ll all fail at some stage. It might not be instantly, but most just fail due to worn-out components. In regards to using hard drives and so there’s always a danger of data loss.

Written by Betty

November 18th, 2013 at 12:38 pm

Rebuilding Broken RAID 5 Servers

without comments

RAID 5 RebuildWith the increase in volumes of digital data throughout the world the number of servers in existence has risen spectacularly in order to cope with demand. Only a few years ago, server and RAID’s were rather uncommon and only found in larger businesses with hundreds of employees. These days RAIDs are often found in NAS home server systems, frequently as RAID 0, RAID 1 or RAID 5 systems. Similarly, RAID and server data recovery services can no longer be seen as activities that happen on an off chance.

A RAID gives you the ability to combine a number of hard disks into one big hard drive. For example combining 10 2TB hard drives will give you a storage capacity of close to 20TB. That’s enough storage space for a home user to store lots of HD films, photos and music. A system this size will typically support a small company as well but of course it depends on the type of data they are storing. Microsoft Office documents tend to be rather small when compared to other types of digital media such a photographs, music and films.

There’s a huge increase in the demand for storage space and files are also very large – any typical HD movie you may download is often several GB in size and home movies you make yourself are also large. It’s the same with music files – a respectable iTunes library can get many gigabytes in size. With music and movies a lot of people choose the stream the content from a local ISP. This saves on using up your valuable hard disk space but is reliant on a decent and quick broadband connection, else you will see the spinning wheel so often noticed when streaming content over the BBC iPlayer service that is telling you that your internet connection just can’t keep up the necessary download speed so that you can watch your programme uninterrupted.

Servers are used to combine several hard disks into a large storage volume or array. Many servers use a configuration that is known as RAID and there are many types of RAID available. Each type has advantages and drawbacks over others. For example the fastest type of RAID is a RAID 0. Data transfer speeds on RAID 0 are extremely quick so it’s often used by video producers and TV producers because their files are large and a fast data throughput is needed when recording, editing and during playback. The downside of RAID 0 is that is has no data redundancy. Data redundancy is a posh way of saying that it only takes a failure of one of the hard disks that make up the RAID 0 and all your data becomes inaccessible. If this happens to you then you will need to contact a RAID data recovery service who should be able to repair the fault on the hard drive and RAID and be able to restore your files to good health.

Another common type of RAID is a RAID 5. This provides good data transfer speeds and has some built in data redundancy too. The data held on a RAID 5 is stored across the hard disks that make up the RAID volume, if one of those hard drives fail the RAID will continue to work without any loss of data at all. If the RAID 5 does loose one of the hard drives due to a fault it’s important that the broken hard drive is swapped out and a working one installed in its place. This is a process known as rebuilding and many RAIDs are clever enough to allow this to happen without having to take the server offline or even power it down. The faulty hard disk is just swapped out and a new one put in – the rebuild is automatic and completed often in a matter of minutes, although the time it takes to rebuild a server does depend on the amount of data it holds. The more data there is stored on it, usually the greater number of hard drives that constitute the RAID set and the longer it takes to rebuild the server.

Rebuilding is usually the method of choice for getting a RAID 5 with a failed drive back up to optimum working levels, but RAID rebuilding can cause a lot of problems. Sometimes the integrity of the data on the RAID server is not rebuilt as it should be ie. it original data contains several corruptions. When a server attempts to rebuild a system using corrupted data the problem is compounded and becomes significantly worse. Basically a problem that existed in one place will now exist in many others, and this happens for every problem that is found on the server during the rebuild process. A server rebuild that has gone wrong is often a worse case scenario for data recovery companies because the rebuild makes restoring the data very difficult and sometimes impossible. Many professional data recovery specialists will advise that server rebuilds are not performed without first checking the integrity of the hard drives in the RAID array and also the integrity of the hard drives themselves.

Written by Betty

November 14th, 2013 at 9:25 am

CCTV Image Recovery from DVR systems

without comments

DVR CCTV system

Recovering crime scene evidence from DVR CCTV systems is a skilled job.

Well, tonight is November 5th, which in the UK is a very auspicious day as it’s Guy Fawkes Night, commonly know as Fireworks Night.

It’s a celebration of an event that happened over 400 years ago in 1605 when a group of disgruntled Catholics tried to blow up King James I. The plot failed, and the perpetrators were all killed, in several nasty ways that we won’t go into. The plot was very nearly successful but was undone by an anonymous tip off sent several days before. Any my point to all this? Well I was just thinking that today the plot wouldn’t get that far as there is CCTV and DVR recording equipment everywhere.

You’d be surprised how often CCTV equipment is deliberately sabotaged by people who have committed criminal acts but fear they may have left traces of their wrong doing on CCTV recorders and been captured by the the surveillance cameras installed.

CCTV and DVR systems are often sent to CCTV and DVR image recovery companies as these firms are often specialists at recovering the data from damaged systems. Video evidence and photographic evidence can often be lost from a DVR for a number or reasons:

  • The data is overwritten – Most DVR recorders use a looping recording – ie. they only record the last 14 days or so and all new data overwrites the old data. This happens a lot and most of the time the image data is not recoverable as it’s been overwritten with more recent footage.
  • The DVR hard disk develops a problem – Hard disks are mechanical devices and as such their moving parts fail. When this happens the data is often recoverable but it’s frequently a specialist job.

Another thing to be aware of is if your CCTV cameras and DVR equipment has captured a criminal act taking place that you want to prosecute, it important to observe particular rules and a chain of custody. These ensure that if your case goes to court the evidence from the DVR CCTV system is admissible.

 

Written by Betty

November 5th, 2013 at 3:21 pm

XKeyScore – More Revelations That Concern Us All

without comments

Edward Snowden really has opened a can of worms.. Hang on – don’t stop reading… This concerns YOU and your privacy.

Bascially, you don’t have any.

Imagine a tool that goes unnoticed but collects everything you do when you’re online… Private browsing? Ha! Wake up…

http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

This tool then sends the data it gathers back America’s NSA where it can be interrogated.

Written by Betty

November 1st, 2013 at 11:27 am