[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



If you are interested, please let me know.

Michael

On Friday 23 April 2004 05:40 pm, Greg Freemyer wrote:
> On Fri, 2004-04-23 at 11:04, Preston Boyington wrote:
> > where does one acquire training in data recovery.  i was looking for
> > something more along the lines of a seminar or such.  i've been fortunate
> > in doing small things (recovering from single drives/deleted files), but
> > i've yet to try anything RAID related or jobs of really any scale.
> >
> > basically backup and data recovery is something that has always
> > interested me, and i would like to add another feature to my resume.
> >
> > anyone offer training like this?  could someone recommend a good resource
> > for related information?
> >
> > thanks,
> > preston
> > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
&gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt;
&gt; It is not a simple topic and I don't know of any comprehensive training.
&gt;
&gt; My company does computer forensics (CF), and as a sideline we end up
&gt; having data recovery capabilities.
&gt;
&gt; If we are trying to recover deleted files, or even file fragments, we
&gt; normally use FTK.  It is CF software and training is available.  (Maybe
&gt; even at Kennesaw, they have CF classes I think.)  Neither FTK nor the
&gt; company training are low-cost.  I don't know what Kennesaw charges, but
&gt; they host a national CF seminar in March.
&gt;
&gt; FTK does not do well if the logical filesystem structure is corrupted,
&gt; but even then it can get back individual disk clusters based on keyword
&gt; searches.  I have used it to recover files from drives with a
&gt; significant number of badblocks.  [Often in those cases, you cannot just
&gt; use windows to copy of the files.]
&gt;
&gt; There are some Linux based computer forensic tools you could look into.
&gt; I think most of the good tools are on the Penguin-slueth CD.
&gt;
&gt; <a  rel="nofollow" href="http://www.linux-forensics.com/";>http://www.linux-forensics.com/</a>
&gt;
&gt; So far we have only used that CD as a boot CD to make dd images of
&gt; suspect drives, but supposidely there are some good recovery tools on
&gt; there.
&gt;
&gt; Raid system recovery can be much more difficult.
&gt;
&gt; Greg


</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="01158" href="msg01158.html">[ale] (OT) data recovery - show and tell?</a></strong>
<ul><li><em>From:</em> freemyer-ml at NorcrossGroup.com (Greg Freemyer)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="01004" href="msg01004.html">[ale] (OT) data recovery - show and tell?</a></strong>
<ul><li><em>From:</em> PBoyington at polyengineering.com (Preston Boyington)</li></ul></li>
<li><strong><a name="01038" href="msg01038.html">[ale] (OT) data recovery - show and tell?</a></strong>
<ul><li><em>From:</em> freemyer-ml at NorcrossGroup.com (Greg Freemyer)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg01145.html">[ale] non-DSN mailer</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg01147.html">[ale] Mirrors</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg01038.html">[ale] (OT) data recovery - show and tell?</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg01158.html">[ale] (OT) data recovery - show and tell?</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#01146"><strong>Date</strong></a></li>
<li><a href="threads.html#01146"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>