PC-3000 for HDD. The password removing procedure for old Seagate drives

Dear Friends,

I this article we would like to describe the procedure of password removing for old Seagate drive. We have tested this method for Night Hawk Plus family of Seagate Barracuda 7200.10 series. However, this approach works for other families of Classical Seagate Architecture as well.

Please keep in mind that this procedure works for the drives protected by the user password and is inapplicable for master password protected drives.

Continue reading

Posted in Articles, PC-3000 HDD | Tagged , , , , , | Leave a comment

How to shift the SA on Hitachi IBM HDDs.

Hi there,

In this article, we are going to address the very common and troublesome issue of the damaged Service Area (SA) on Hitachi drives. We will show you a method of Hitachi IBM repair (for NOT ARMED drives).

ATTENTION! This solution requires patience and good PC-3000 knowledge. If you are not sure in your skills, please contact our TS! Also, please note, that all the actions would be useless in case of radial scratches.

Continue reading

Posted in Data Extractor, PC-3000 HDD | Tagged , , , , , | 1 Comment

PC-3000 for HDD. Seagate F3. Unlocking the Rosewood Drives.

Hello, Friends! Today we are proud to present you the long-awaited solution to the very disturbing issue of recovering data from locked Seagate F3 Rosewood HDDs. The latest PC-3000 v.6.3.12 update brings you the ability to repair damaged Rosewood hard drives and extract data from them. In this article, we will show you how to access the Service and User Areas of your locked patient device in a few clicks.

Attention! Special Restrictions! Due to the fact that the FW has particular features, we strongly recommend that you do not apply Recount translator commands (both, ATA or terminal), Clear G-list, Reset S.M.A.R.T and spare heads in ROM commands. This will clear Media Cache and you might lose user data forever.

Continue reading

Posted in Articles, PC-3000 HDD | 12 Comments

PC-3000 Data Extractor. A practical example for FileVault decryption

In this article, we will demonstrate using Data Extractor to identify encryption key location in the Macintosh system encrypted with FileVault. We will also share some tips and techniques for using Data Extractor for maximum effectiveness. For a basic introduction to the FileVault option, please refer to the Introducing.

Continue reading

Posted in Articles, Data Extractor | Tagged , , , | 1 Comment

PC-3000 for HDD. Western Digital. Module 31 (translator) restoration if SA is full of BADs.

Hello Friends! All of us facing the problem during the work with Western Digital drives, when some of the important modules are damaged, and system heads can write, but the Service Area is full of bad sectors and it’s impossible to change the location of bad module because of that.

In this short article we will see how to fix module 31 using the Dir Editor in PC-3000 Marvell utility even if we can’t move the translator to another place in SA.

Continue reading

Posted in Articles, PC-3000 HDD | 1 Comment

PC-3000 for HDD. Hitachi ELSIL HCC drives unlocking

Hello friends,

Many of you have encountered Hitachi HCCxxxx locked drives which were previously used in DVR. Those HDDs have different label with Elsil logo which is pasted above original Hitachi. If you connect such drive to PC it won’t be recognised via standart device manager…

Now we want to consider one of such examples and explain how to return it to normal conditions.

Continue reading

Posted in Articles, PC-3000 HDD | Tagged , , | 2 Comments

PC-3000 SSD. Phison Utility

Starting from PC-3000 6.3x and PC-3000 SSD 2.4.4, it’s become possible to work with Phison-based drives.

Right now the list of supported models includes the following cpu modifications:

  • Phison PS3105 (all modifications and all models);
  • Phison PS3108 (all modifications and all models);
  • Phison PS3109 (all modifications and all models);

Continue reading

Posted in PC-3000 SSD, Video | Tagged , , , , , , , , , , , | Leave a comment

PC-3000 HDD. Seagate F3 arch. Manually Translator recovery procedure

A lot of times PC-3000 owners asked us about sharing step-by-step guide.

One of the often problems on Seagate F3 architecture drives is a Translator problem.
Usually we try to regenerate Translator automatically (by Translator regeneration and Recovery translator procedures).
Basically case can be solved successfully and get an access to whole user area, but sometimes utility can’t hide a defects in to NRG-list properly as result we have a particualar access to the user area (from LBA0 till someone in the middle).

In this article we would like to describe how to hide defects manually, regenerate a translator and get an access to whole user area.

Continue reading

Posted in Data Extractor | Tagged , , , | 5 Comments

PC-3000 Flash Spider Board adapter. How to use it?

During the Prague monolith meetup in March 2017 ACELab announced a new Spider Board adapter for convenient monolith reading. In this article we are going to describe the main features of this adapter, show example of MicroSD reading and describe a few things about pitfalls that could be appeared during monolith reading.

PC-3000 Flash Spider Board is an adapter designed for connection to internal contacts of NAND-based Flash drives manufactured as single-package chips (monoliths). The adapter consists of 25 universal contacts, which support software configuration of their association with NAND interface signals in a corresponding task. The adapter is supported only by PC-3000 Flash Reader 4.0.

Complete overview of Spider Board adapter and example of MicroSD reading process you can watch in the video below:


Continue reading

Posted in Articles, Data Extractor, PC-3000 Flash, Video | Tagged , , , , , , | 1 Comment

PC-3000 Data Extractor. Rebuilding NFTS partition with lost boot

Hello friends,

You know that we are living in the world where PCs can be infected with malware. The best-known example is WannaCry which infected many computers in different countries of the world. However, there are many other malware worms which execute on a system and target computer running.

Usually, malware exploits a vulnerability in Microsoft Windows operation system where the NTFS file system is used in most cases. So we would like to give couple examples how Data Extractor can recover NTFS partition which was a target of malware attack.

Continue reading

Posted in Articles, Data Extractor | Tagged , , , , , , | 2 Comments