Profile cover photo
Profile photo
QUBEX Data Recovery Denver
83 followers
83 followers
About
QUBEX Data Recovery Denver's posts

Post has attachment

Post has attachment

Any company or personal data storage may fail and will fail at certain point. But it is imperative to sustain data integrity throughout data life span without compromising it. That's where QUBEX comes in. Anybody or any company that needs data recovered, migrated or converted, are our potential customer. Variety of Servers, complex RAID systems, Laptop, Desktop, NVR or DVR security systems, Flash arrays, Flash drives, Encrypted volumes, Cellphone, Voice recorders, Backup Tape, Retro media like Floppy disk, Virtual Server/Client Machines, Windows, Linux, Unix, Novell, OSX, Android, IOS and many other data storage containers are our expertise. 

Post has attachment

Seagate Readies 12TB HDDs, Plans for 14TB, 16TB Models Next Year

During its Q2 2017 earning call, Seagate disclosed that it already has 12TB HDDs in the field and #14TBHDD and #16TBHDD models in the design phase. The developments appear to provide a path toward its goal of producing #20TB HDDs by 2020. Seagate's well-publicized difficulties have been growing as more customers transition from its bread-and-butter consumer HDDs, which account for 24% of its revenue, to speedier SSDs. The enterprise is also moving en masse to speedy SSDs for high-performance workloads, which recently led the company to halt further development of #15KHDD. Many analysts opine that 10K HDDs are next on the chopping block.

In response, Seagate shifted its production might to more lucrative high-capacity enterprise HDDs, which now account for 37% of its revenue, to leverage the shrinking HDD price-per-GB advantage over SSDs. Seagate recently closed its Suzhou, China manufacturing plant to reduce manufacturing costs, but it simultaneously increased its investments in other facilities to address the challenges of moving from six platters per drive to eight. The net effects of its maneuverings total $300 million in savings per year. Seagate is essentially retreating into the high-capacity segment, and the company announced that its new 12TB HDDs have already been shipping to key customers for several quarters. Seagate CEO Steve Luczo also noted that the company would offer 16TB drives within the next 12 to 18 months. Seagate's new high-capacity offerings are destined for data centers, NAS, DVRs, and a booming surveillance market.

Seagate adopted helium technology several years after WD/HGST led the charge, and as a result, it continues to lose share in its target high-capacity market. To make matters worse, Seagate has also failed to capitalize on the SSD revolution--its strategic alliance with Micron failed to nudge Seagate's share above a paltry 0.1% of the SSD market. Sk hynix has confirmed that it is considering a joint venture with Seagate, which might help the struggling giant penetrate the SSD market. Seagate certainly has the money to invest in the Sk hynix venture, as it has over $1.7 billion in cash or equivalents. However, a joint venture pales in comparison to WD's instant success when it gobbled up a large portion of the SSD market overnight with its SanDisk acquisition.

From a financial perspective, Seagate's earnings are encouraging with revenue of $2.9 billion and $297 million of profit during the second quarter, but its slow transition to flash-based solutions may prove to be the long-term fly in the ointment. More here: https://www.facebook.com/permalink.php?story_fbid=1415609298480619&id=473541326020759



#QUBEX #DATA #RECOVERY #SERVICE DENVER, #NAS, #Server, #RAID, #Laptop, #Desktop, #FLASHdrive, USB #Portable drives, #SAN, #memoryCard, #Phone

Post has attachment
NIST is a National Institute of Standards and Technology

According to NIST there are multiple levels of complexity for data recovery and data acquisition from mobile devices, below are descriptions taken from official NIST.SP.800-101r1 paper:

Level 1
Manual Extraction methods involve recording information brought up on a mobile device screen when employing the user interface.

Level 2
Logical Extraction methods are used most frequently at this time and are mildly technical, requiring beginner-level training.
Methods for levels 3 to 5 entail extracting and recording a copy or image of a physical store (e.g., a memory chip), compared to the logical acquisitions used at level 2 involve capturing a copy of logical storage objects (e.g., directories and files) that reside on a logical store (e.g., a Guidelines on Mobile Device Forensics
16 file system partition)

Level 3
Hex Dumping/JTAG Extraction methods, entail performing a
“physical acquisition” of mobile device memory in situ and require advanced training.

Level 4
Chip-Off methods involve the physical removal of memory from a mobile device to extract data, requiring extensive training in electronic engineering and file system forensics.

Level 5,
Micro Read methods involve the use of a high-powered microscope to view the physical state of gates. Level 5 methods are the most invasive, sophisticated, technical, expensive, and time consuming of all the methodologies.
The following discussion provides a more detailed description of each level and the methods used for data extraction.

 Manual Extraction
– A #manualextraction method involves viewing the data content
stored on a mobile device. The content displayed on the LCD screen requires the manual manipulation of the buttons, keyboard or touchscreen to view the contents of the mobile device. Information discovered may be recorded using an external digital
camera. At this level, it is impossible to recover deleted information. Some tools have been developed to provide the forensic examiner with the ability to document and categorize the information recorded more quickly. Nevertheless, if there is a large amount of data to be captured, a manual extraction can be very time consuming and the data on the device may be inadvertently modified, deleted or overwritten as a result of the examination. Manual extractions become increasingly difficult and perhaps unachievable when encountering a broken/missing LCD screen or a damaged/missing keyboard interface. Additional challenges occur when the device is configured to display a language unknown to the investigator; this may cause difficulty in successful menu navigation.

 Logical Extraction
– Connectivity between a mobile device and the forensics
workstation is achieved with a connection using either a wired (e.g., USB or RS-232) or wireless (e.g., IrDA, WiFi, or Bluetooth) connection. The examiner should be aware of the issues associated when selecting a specific connectivity method, as
different connection types and associated protocols may result in data being modified (e.g., unread SMS) or different amounts or types of #data being extracted. #Logical extraction tools begin by sending a series of commands over the established interface
from the computer to the mobile device. The mobile device responds based upon the command request. The response (mobile device data) is sent back to the workstation and presented to the forensics examiner for reporting purposes.
Hex Dumping and JTAG – Hex Dumping and Joint Test Action Group (JTAG) extraction methods afford the forensic examiner more direct access to the raw data.

 Hex Dumping and JTAG
#HexDumping and Joint Test Action Group (JTAG) extraction methods afford the forensic examiner more direct access to the raw
information stored in flash memory. One challenge with these extraction methods is the ability of a given tool to parse and decode the captured data. Providing the forensic examiner with a logical view of the file system, and reporting on other data remnants outside the file system that may be present are challenging. For example, all data contained within a given flash memory chip may not be acquired, as many tools, such as flasher boxes, may only be able to extract specific sections of memory
Methods used at this level require connectivity (e.g., cable or WiFi) between the mobile device and the forensic workstation.
Hex Dumping – this technique is the more commonly used method by tools at this level. This involves uploading a modified boot loader (or other software) into a protected area of memory (e.g., RAM) on the device. This upload process is accomplished by connecting the mobile device’s data port to a flasher box and the flasher box is in turn connected to the forensic workstation. A series of commands is sent from the flasher box to the mobile device to place it in a diagnostic mode. Once in diagnostic mode, the flasher box captures all (or sections) of flash memory and sends it to the forensic workstation over the same communications link used for the upload. Some flasher boxes work this way or they may use a proprietary interface for memory extractions. Rare cases exist where extractions can be accomplished using WiFi (i.e., early Jonathan Zdziarski (JZ) Methods).

 JTAG – Many manufacturers support the #JTAG standard, which defines a common test interface for processor, memory, and other semiconductor chips. Forensic examiners can communicate with a JTAG-compliant component by utilizing special purpose standalone programmer devices to probe defined test points. The JTAG testing unit can be used to request memory addresses from the JTAG compliant component and accept the response for storage and rendition. JTAG gives #specialists another avenue for imaging devices that are locked or devices that may have minor damage and cannot be properly interfaced otherwise. This method involves attaching a cable (or wiring harness) from a workstation to the mobile device’s JTAG interface and access memory via the device’s microprocessor to produce an image. JTAG extractions differ mainly from Hex Dumping in that it is invasive as access to the connections frequently require that the examiner dismantle some (or most) of a mobile device to obtain access to establish the wiring connections. A wide range of technical expertise and proper training is required for extracting and analyzing binary images with these methods, including locating and connecting to JTAG ports, creating customized boot loaders and recreating file systems.

 Chip-Off
#ChipOff methods refer to the acquisition of data directly from a mobile device’s flash memory. This extraction requires the physical removal of flash memory. Chip-Off provides #examiners with the ability to create a binary image of the removed chip. In order to provide the examiner with data in a contiguous binary format file, the wear-leveling algorithm must be reverse engineered. Once complete, the binary image may then be analyzed. This type of acquisition is most closely related to physical imaging a hard disk drive as in traditional digital forensics. Extensive #training is required in order to successfully perform extractions at this level. Chip-Off extractions are challenging based on a wide variety of chip types, a myriad of raw data formats, and the risk of causing physical damage to the chip during the extraction process. Due to the complexities related to Chip-Off, JTAG extraction is more common.

 Micro Read
– A #MicroRead involves recording the physical observation of the gates on a NAND or NOR chip with the use of an electron microscope. Due to the extreme technicalities involved when performing a Micro Read, this level of acquisition would only be attempted for high profile cases equivalent to a national security crisis after all other acquisition techniques have been exhausted. Successful acquisition at this level would require a team of experts, proper equipment, time and in-depth knowledge of proprietary information. There are no known U.S. Law Enforcement agencies performing acquisitions at this level. Currently, there are no commercially available Micro Read tools.

You may ask, what methods QUBEX DATA RECOVERY is capable of working with? The answer is 1,2,3,4 LEVELS are our expertise. The 5th level we do not perform at our facility, but instead we refer to one of our partners who is capable of LEVEL 5 acquisitions.
Bear in mind, that along with complexity level increase, the price also increases. While we understand you may need to get your puppy pics from your broken phone, you need to understand all above mentioned levels of complexity. We will offer you BEST solution, that will be reasonable priced along with FREE initial consultations. CALL QUBEX @ +1-720-319-7239 OR VISIT OUR WEBSITE www.qubexdatarecovery.com www.qubexdatarecovery.info more here: https://www.facebook.com/permalink.php?story_fbid=1409398479101701&id=473541326020759


#QUBEX #DATA #RECOVERY #SERVICE DENVER, #NAS, #Server, #RAID, #Laptop, #Desktop, #FLASHdrive, USB #Portable drives, #SAN, #memoryCard, #Phone

Post has attachment
Wait while more posts are being loaded