The Data Recovery Thread
DriveImageXML is a FULL drive LOGICAL backup. You back up a logical partition (or more than one) and have to have a partition to restore to of equal or greater size as the source, but then it just drops ALL the backed up LOGICAL partition data to the new partition. it does NOT set a partition as bootable though. You have to manually do that.
Define what you mean by "clone".
Define what you mean by "clone".
I mean exactly what norton ghost does, if we have a drive failing we use ghost to copy all the data from the bad drive to the new one. It doesn't copy free space though.
if ghost works, use it.
DIXML is a backup solution and is really good at making an "image" for re-installing, etc. lot's of tools out there to do the same tasks.
In the world of Ransomware, I use DIXML to make a monthly image of important machines in case something happens to the machine. I backup regularly, but the backups are to USB drives that remain connected and thus can be compromised by the ransomware. You could Ghost the drive monthly, too, or use any one of a hundred other tools to do the same thing.
DIXML is a backup solution and is really good at making an "image" for re-installing, etc. lot's of tools out there to do the same tasks.
In the world of Ransomware, I use DIXML to make a monthly image of important machines in case something happens to the machine. I backup regularly, but the backups are to USB drives that remain connected and thus can be compromised by the ransomware. You could Ghost the drive monthly, too, or use any one of a hundred other tools to do the same thing.
Ok so for the past week I've been at a lawyers office plugging in flash drives decrypting them with truecrypt or veracrypt. All sorts of fun stuff.
Currently I have a CD that looks like data is written to it when you look at the bottom of it. Stick it in the drive and it shows up in Windows and says 393mb free of 702mb, however when I open it no files appear (yes show hidden files is on). What gives? How can I get that back?
Currently I have a CD that looks like data is written to it when you look at the bottom of it. Stick it in the drive and it shows up in Windows and says 393mb free of 702mb, however when I open it no files appear (yes show hidden files is on). What gives? How can I get that back?
How old is the CD?
They don't actually last very long before they become corrupt and unreadable (consumer grade ones). You may be in some stage of that corruption.
Try it in a few machines, if it doesn't work in any of them, it is kaput.
They don't actually last very long before they become corrupt and unreadable (consumer grade ones). You may be in some stage of that corruption.
Try it in a few machines, if it doesn't work in any of them, it is kaput.
I have several consumer grade CDs (that I burned) that are 10-15 years old and they read just fine...
Depends a LOT on:
1. quality of original blank media
2. method used to burn data
3. conditions media stored in/handled
Ok so for the past week I've been at a lawyers office plugging in flash drives decrypting them with truecrypt or veracrypt. All sorts of fun stuff.
Currently I have a CD that looks like data is written to it when you look at the bottom of it. Stick it in the drive and it shows up in Windows and says 393mb free of 702mb, however when I open it no files appear (yes show hidden files is on). What gives? How can I get that back?
Currently I have a CD that looks like data is written to it when you look at the bottom of it. Stick it in the drive and it shows up in Windows and says 393mb free of 702mb, however when I open it no files appear (yes show hidden files is on). What gives? How can I get that back?
OK, makes sense. See if Autopsy can see data on the physical device. If you want to let me look, set up a VPN connection and I can check for you. I need to be able to access the drive locally here though to be able to see it.
I think this should be called "The
Thread". Bunch of nerds in here. 
I have no idea what y'all are talking about really, but I guess I can appreciate it. This is why I will always claim to be a hardware engineer even though I mostly write code for a living.
Thread". Bunch of nerds in here. 
I have no idea what y'all are talking about really, but I guess I can appreciate it. This is why I will always claim to be a hardware engineer even though I mostly write code for a living.
When I've pulled server drives for the retail market that have sensitive info, I had to drill them (usually 4 holes through the case) before shipping them back and then they are mechanically shredded...
Probably, but this makes me feel better...
I wish I had a way to shred them.
I could hit them with a blow torch for a few!
I could hit them with a blow torch for a few!
What do you know about certificates generated after wiping a drive? I downloaded Active@ KillDisk since it supports UEFI secure boot wiping and supposedly has a bunch of drivers for various raid controllers.
Anyways I saw this option about creating a PDF cert after wiping the drive I guess to officially say that the drive has been wiped using X method and here's the serial # and our company logo to show that it's the right drive and from us. Is that required for HIPAA or FINRA?
Anyways I saw this option about creating a PDF cert after wiping the drive I guess to officially say that the drive has been wiped using X method and here's the serial # and our company logo to show that it's the right drive and from us. Is that required for HIPAA or FINRA?
Thread
Thread Starter
Forum
Replies
Last Post
MrHeeltoe
1G TSX Tires, Wheels, & Suspension
20
Feb 23, 2023 01:54 PM
MrHeeltoe
2G TSX Tires, Wheels & Suspension
3
Sep 29, 2015 10:43 PM
MrHeeltoe
3G TL Tires, Wheels & Suspension
0
Sep 28, 2015 05:43 PM











