VMFS File System Reconstruction (Part 3)

VMFS Inode Scanner Screenshot

Part 1 - Part 2 - Part 3 - Part 4 In the last two sections we covered the coarser portions of the VMFS file system. First we looked at what a volume consists of and the best way to find a volume on a storage device where the file system has been … [Read more...]

VMFS File System Reconstruction (Part 2)


Part 1 - Part 2 - Part 3 - Part 4 In the first installment of our explanation of rebuilding the VMFS file system from a damaged volume we covered some of the attributes of the volume on disk data structure. In addition to that we reviewed some … [Read more...]

VMFS File System Reconstruction (Part 1)

vmfs raid 10 array

Part 1 - Part 2 - Part 3 - Part 4 Recently DTI Data received a challenge in the form of a VMWare ESXi 5.1 server which contained 16 (sixteen) 2 (two) terabyte Seagate ST2000DM001 hard drives. These drives were configured as a RAID 10, 8 (eight) … [Read more...]

Unable to Rebuild a RAID 5 Array

raid 5 rebuild

RAID Configuration: 4 Seagate Barracuda Green 2 TB SATA hard drives (model ST2000DL003) configured as a RAID 5 connected to an on-board Intel RAID controller. Problem with RAID: Because of the nature of Green drives, specifically that they will … [Read more...]

SAN Data Recovery – iSCSI RAID 6 Issue


Serial attached SCSI devices have been a high speed blessing to the SAN, NAS, and Enterprise Storage Array class of systems. These devices offer a clear solution for any storage requirement due to capacity and configuration. Whether it is Fiber … [Read more...]

NTFS Master File Table Fixup


Recently DTI Data received an interesting question about the values stored in the Master File Table. The question referenced the value following the magic value of ‘FILE’ in the record. Some of the time the data is an asterisk ‘*’ and other … [Read more...]

Toshiba Recovery – Crashed Hard Drive

Toshiba hard drive

Common Toshiba Hard Drive Failures All mechanical devices will fail sooner or later. Hard drives fail for various reasons. We will describe what we find to be the most common cause of failure with Toshiba hard drives. In the last decade, the … [Read more...]

Lost File System Recovered

Master File Table Entry

The Mysterious Case of the Missing File System Sometimes there is just no way to ascertain the events leading up to the loss of an entire file system index. The client may have no idea what happened. When looking at the file system as a whole … [Read more...]

iPod Touch 4th Generation Giveaway


It's that time of year again! DTI Data is proud to announce our 2011 iPod Touch Holiday Giveaway! If you or someone you knows could use a free iPod Touch this season, make sure you enter before the drawing. There will be two drawings: the first … [Read more...]

How To Know Your Hard Drive Failed


We have talked about this before, but failing hard drives never go away. Though "prevention is the best medicine" has been an adage that goes back centuries, it can still be ignored even in the digital age. DTI Data Recovery has been in the … [Read more...]

DTI Data’s Many Options For RAID Data Recovery


DTI Data has been in the RAID Data Recovery business for a long time. We focus on RAID 5 data recovery, which is still the prelevant system in storage devices such as DELL PowerEdge Servers. Many RAID systems such  RAID 50 is still built off of the … [Read more...]

Data Mining Of Email And Website History


Computers and other electronic devices that use storage media can be found in nearly every office and even in homes. Whatever type of storage is used, the data itself can not only be recovered, but restored. Businesses regularly and routinely … [Read more...]

PC Defender Removal With Malwarebytes ComboFix And Registry Repair In Safe Mode


This tutorial will help users with infected computers remove malware and adware such as PC Defender, run Malewarebytes, Combofix and simple registry repairs in safe mode, to fix a computer running Windows .  We have mentioned Malewarebytes and … [Read more...]

Disaster Planning Overview Creation


Most businesses these days depend heavily on technology and automation. Continued operations of a business/organization depend on being aware of potential disasters before they strike. Having a strategic disaster recovery plan to minimize disruptions … [Read more...]

Microsoft FAT32 and Integrated Data Recovery

Online Backup

With several years in the data recovery industry there are, like all things, a metamorphosis from one method of recovery to the next. In the beginning there were simple file systems and simple drives and a coarse data recovery method was used in … [Read more...]

Data Recovery and Disaster Recovery Explained

disaster recovery

Every company that uses computers to carry out their business, needs to have a solid disaster recovery plan. One item often left out is data recovery! Data Recovery is one of those services that no one thinks they will ever need until it is too late. … [Read more...]

AdWare and Spyware Removal Tutorial

trojan virus

Adware are dangerous and nasty little viruses. You know the kind of virus where you find that you suddenly have some new program installed that is telling you that you have some type of Trojan virus and you need to go to some Spyware website to buy a … [Read more...]

SAN Data Recovery NAS Repair

san data recovery nas repair

When it comes to computers and networks, NAS devices were mainly used by large businesses.  Now that home users store huge amounts of data from music to videos, more and more people are turning to Network  Attached Storage (NAS) devices to … [Read more...]

Business Continuity Disaster Planning


An organization’s ability to recover from a disaster or disruptive event (natural disaster, human-made disaster) and resume operations as quickly as possible is referred to as disaster recovery or business continuity. Business Continuity … [Read more...]

Disaster Planning – Qualitative and Quantitative Risk Analysis


Risk Assessment or security risk analysis is key to the security of any business or organization. It's crucial for making sure that controls are equal to the risks that the organization is exposed to. To figure out which security controls are … [Read more...]