Sunday, September 13, 2009

Laptop data recovery Possible or not?

Laptop data recovery Possible or not?

Hey guys How are you? I have heard from one of my friend who bought a new laptop and he was very happy and he put his all data on it ,,, but after some days he was very upset and said to me my all data was lost in laptop so I told him some advises how to recover the data.

In Laptop Full disk encryption has more than a few benefits compared to normal file or folder encryption, or encrypted vaults. The following are some benefits of full disk encryption:
Practically speaking the whole thing including the swap space and the temporary files are encrypted.

If you encrypt these files is imperative, as they can reveal important secret data. With a software implementation, the bootstrapping code cannot be encrypted however. (For example, there is much software available in the market such as Bit locker leaves an unencrypted volume to boot from, while the volume containing the operating system is fully encrypted.)

With full disk encryption, the decision of which individual files to encrypt is not left up to users' discretion. This is important for situations in which users might not want or might forget to encrypt sensitive files.

Support for pre-boot authentication.

Immediate data destruction, as simply destroying the cryptography keys renders the contained data useless. However, if security towards future attacks is a concern, purging or physical destruction is advised.

Options of data recovery Full disk encryption vs. file system-level encryption.

one of the method of recovering the data is Full disk encryption does not replace file or directory encryption in all conditions. Disk encryption is from time to time used in conjunction with file system-level encryption with the meaning of providing a more secure implementation


Another method is Full disk encryption and trusted Platform Module

Another method is Trusted Platform Module (TPM) it is a secure crypto processor embedded in the motherboard that can be used to authenticate a hardware device. Since each TPM chip is only one of its kinds to an exacting device, it is competent of performing platform substantiation. It can be used to authenticate that the system in search of the access is the predictable system.

How to Implement?
In this main article is talking about comparison of disk encryption software.
There are numerous tackle obtainable in the market that allow for full disk encryption.

However, they vary greatly in features and security. They are basically divided into two main categories: one is called hardware-based and second is called software-based.


The Hardware-based Full Disk Encryption solutions are by a long way more rapidly than the software-based solutions, and more often than not produce no in the clouds for the CPU or the hard disk drive. Hardware-based Full Disk Encryption, without some form of user authentication, provides extremely no protection of data.

Now a days, there are two solutions providing Pre-Boot Authentication for Hardware-based Full Disk Encryption and a BIOS or ATA password can provide basic access control.

2 comments:

adsense said...

"THERE IS NO "GENIUS" IN THESE RULES. THEY ARE COMMON SENSE AND NOTHING ELSE, BUT AS VOLTAIRE SAID, "COMMON SENSE IS UNCOMMON." TRADING IS A COMMON-SENSE BUSINESS. WHEN WE TRADE CONTRARY TO COMMON SENSE, WE WILL LOSE. PERHAPS NOT ALWAYS, BUT ENORMOUSLY AND EVENTUALLY....
http://indiannstockmarket.blogspot.com

Admin said...

There are actually data recovery specialists who can recover your lost data from your personal computer PC and laptop. These specialists are well trained technicians in data recovery. They have well built labs that contain all the necessary technology, machinery and equipment used to recover your data.


http://blogplus101.blogspot.com/2010/01/data-recovery-service-for-hitachi.html

share

LinkWithin

Related Posts Plugin for WordPress, Blogger...

Pages