FileVault is a high-end disk encryption program used in Mac OS X 10.3 and later. Most of the Apple’s products that came out after 2003 use FileVault to provide users with a reliable tool to decrypt home folders and personal data. And FileVault does the job well by preventing unauthorized access to encrypted hard drives content. No data recovery specialist without the right tools and special knowledge will be able to access the data on an Apple computer.
Cases, when the encrypted hard drive is damaged to boot may present a serious challenge even to a skilled professional. In this article, we will describe an algorithm of bypassing FileVault protection and give some tips on recovering data from damaged encrypted Apple hard drives.
Below is a schematic diagram of the FileVault encryption method:
Did you ever face the situation when you need to change the Model name and/or Serial number of Seagate F3 drives?
It’s useful when different DVR systems, game consoles, etc. do not accept the non-native drives because of the verification procedure – e.g. the S/N of the drive doesn’t match the internal one (which is stored in the Firmware of the device).
In today’s article, we will describe how to change these values on the Seagate F3 arch. drives.
This article continues the topic of building a good folder structure for AU6989 and AU6998 in PC-3000 Flash.
As you probably know, there are a lot of cases when we can’t determine the ECC because of the insertions. Usually, even the ordinary insertions caused a lot of problems. So, what to do if they are XORed?
Seagate drives are very popular, but they also have a lot of issues in their FW. In this article we will show you how to resolve one such issue: a strange SenseCode = 87270000 error, and get a full data access.
We all love Virtual machines. They allow us to find the balance between scale and consolidated environment and help us to decrease the resources required for a proper functionality.
VMware vStorage Virtual Machine File System is a high-performance cluster file system that provides storage virtualization that is optimized for virtual machines.
This picture (from https://www.vmware.com) shows how multiple Servers with several virtual machines running on them can use VMFS to share a common clustered pool of storage.
Looks like Virtual Machine File System is an excellent file system. Except for one case: a failure without a backup.
What do you normally do when your Western Digital Marvell drive falls into a Busy state as soon as you start Marvell utility and try to read HDD ID? Most likely you isolate head contacts for a 2.5″ drive, set the jumpers in Kernel mode for 3.5″, or short some special points on PCB. The above procedures are well known: they require working on a drive with a screwdriver or jumpers.
But, what to do if we have no possibility to unscrew the PCB or short the read channel, and the case must be resolved as fast as possible without engineer presenting in working place? In today’s article, we will show you how to get the ROM access and block the SA access to get the SA and data access without any of that.
We are often asked: how to use only one database for multiple computers?
Today we present you our how-to on configuring a shared database.
Alcor Micro AU6989 and AU6998 are becoming increasingly popular. A lot of Flash drives with a typical capacity of 8GB to 128GB are based on this family of controllers. For a correct Image Building, this controller requires a special Translator Algorithm for block sorting, and our developers are working hard to bring it into PC-3000.
For now, we are going to talk about a method of building an image with the universal Block Number Type 1  and the additional settings that have to be applied.
Ext4 (fourth extended filesystem) is a journaling file system for Linux, developed as a successor to ext3. Ext4 is very scalable: the maximum file system would consume one million 1-terabyte (TB) disks.
Ext4 replaces the traditional block mapping scheme used by ext2 and ext3 with so-called extents. An extent is a range of the contiguous physical blocks, improving the large file performance and reducing fragmentation. A single extent in ext4 can map up to 128 MiB of contiguous space with a 4 KiB block size. One inode can store up to four extents. If there are more than four extents to a file, the rest of the extents get indexed in a tree.
These features of the Ext4 file system are very important for OS functionality, but useless for data recovery from RAID arrays.
In this tutorial, we will walk through the building of the RAID configuration using Ext4 metadata (features implemented in this file system). At first, we will apply automatic mode to search for the RAID metadata and build the configuration on-the-fly. After that, we will manually fill the RAID matrix and look into the features of Ext4.
We will use the power of Data Extractor RAID Edition to assemble information from the RAID on 4 disks. Although the functionality of Data Extractor RAID Edition is quite intuitive, in this guide we will do everything from scratch and explain every step we make.
This tutorial is probably not for those who are interested in making quick and high profits. But if you want to gain a deeper understanding of the file systems and how to build one from scratch, then you’re in the right place.
Today we have a rather unusual case to guide you through. It is about Hitachi IBM ARM HTS725050A9A364 without a full User Area access.