When is data recovery impossible?

When is data recovery impossible?

With the advancement in technology, recovering data is a possible thing. However, there are few instances when data cannot be recovered. This, however, is in the extreme situations, otherwise, hard drive data recovery is possible. When is data recovery impossible? We give you some of the instances.

 

  1. When the physical damage in the hard drive is beyond repair– Permanent damage on a hard drive can make it impossible to recover the stored data. Physical damage on a hard drive can be as a result of impairment of the platter which is always on the hard drive. This happens due to scratching of the platter. A damaged platter means that you cannot access that crucial part of your hard drive and hence you cannot access your data. However, you can detect this problem before the damage becomes too serious. Some sound coming from your hard drive or your computer is mostly as a result of the damage.

 

pcb

 

  1. Damage to electronics– Damage to electronics can be as a result of impairment caused by water or even overheating. If your hard drive has been completely burnt, there is very little that can be done to recover your data. Electronics are very sensitive and a slight alteration could render them useless. Care should be taken to ensure that your hard drive is not exposed to excessive heat or water.

 

RAID failure

 

  1. Failure in Raid– Failure of the RAID can lead to permanent loss of data. RAID data is stored in different volumes and it is very hard to put this data back together. The situation is made worse when several drives have been damaged.

 

 

 

What is important to note here is that, although data can be stored, care should be taken to ensure that your hard drive is not permanently damaged. In case your hard drive becomes damaged and you cannot access your data, you should try consulting the experts. There might still be a chance for you and so, don’t just throw the hard drive away.

Why you might not want to trust online backups

Why you might not want to trust online backups

Online backups provide an easy and faster way of storing your data. Many people have welcomed this idea and are storing their loads of data in online systems. Whereas this could be a good idea and a show of advancement in technology, there are some loopholes that people fail to consider before deciding that online data backup is their thing. We give you some reasons to show you why you might not want to trust online backups.

They are prone to hacking– Like anything else in the internet, online backups are subject to hacking. Many hacking cases of data stored in online set ups have been reported all over the world. Your data should be protected and treated with maximum seriousness. You don’t want your sensitive data or information landing in the wrong hands. This can be used to damage you and your organization. When choosing online backups, therefore, it is very important that you ensure that the safety of your data is assured and a working safety measure has been put in place.

They are at a risk of virus attack– No any online platform can be said to be perfect. The online backups are also prone to attack by malicious software and virus. The virus can partly or even completely destroy your data. Before choosing any online backup, it is very crucial that you consider the safety of the system in regard to virus resistivity. Don’t risk with your data, unless you can afford to lose it!

Consider how easily you can access the backed up data– After you have backed up your data, you will need to be accessing it from time to time. This means that you will have to be downloading your data. You, therefore, need to know how frequently and fast you will be requiring your data to download. Data may take time to download depending on your platform and the speed of your internet connectivity. If you have to use an online backup, be sure that you use a way that doesn’t block you from accessing your data when the need arises.

MAC Address: What is it?

Own a mac? Well for many first time Mac users, the questions can be many. Mac does work differently to Windows and it could take a while before you get the drift. However, while the learning curve is around a day in itself, that is only for your normal use. What if you encounter a bug or find something that isn’t working as it should? The one thing thag you would perhaps need to look for at first then is your Mac address.

If you haven’t come across it, the MAC address may be an alien concept to you. It is used in network hardware and provided by manufacturers. It has a great responsibility in running your local network optimally.

 

What is a MAC Address?

The Media Access Control (MAC) address is used for unique identification of computer network adapters. It is a unique binary code also known as the physical address or the hardware address. The manufacturer embeds the number in the network adapter hardware while they are produced in the factory. It can also be ingrained in the firmware and cannot be manipulated.

MAC address is utilized by different networks like Wifi, Ethernet and even Bluetooth.

 

Here below in the picture we can see the Mac address on a PC Screen

mac address pc

 

And here we can see the MAC address as it is displayed on an Apple iMac.

mac address iMac

What is MAC Address Used for?

Identification: MAC addresses are used to identify network adapters uniquely. Your Wifi access points will check the MAC address of a device along with the pass code before granting it permission to join.

Packet Transfer: MAC addresses are responsible for the proper operation of your local Ethernet. It also facilitates transfer of packets in the local network between one MAC address to another. If the MAC addresses of the adapter and destination doesn’t match, the process is terminated.

Network switches also keep records of MAC address encountered at the ports and forwards packets based on them.

TCP/IP: TCP/IP networks also employ both IP address and MAC address to transfer packets. MAC address being on Layer 2 of the OSI model supports Internet Protocol working at Layer 3. Address Resolution Protocol (ARP) is used to facilitate the conversion between IP and MAC address.

But it has to be remembered that there is no routing through MAC addresses.

DHCP: DHCP servers also take help of the MAC addresses to identify a device and render some of them with a static IP address. It is also done with the help of ARP.