Surviving a home data disaster

Wednesday, 6 June 2007, 1:06 PM EST

This is the story of my attempts to recover Shirley's files. It's a story that I followed to its ultimate conclusion -- from the initial inspection of the Windows Recycle Bin to attempted recovery with various utility programs and finally to a stint with a professional data recovery service.

When I began, I was confident that I knew what I was doing. I didn't. My experience should give you a good idea of what you'd face in a similar situation -- as well as a behind-the-scenes look at the tools and techniques a recovery expert used to recover Shirley's files.

At Computerworld.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //