All the Reasons to Use a Pen Drive

Pen drives or USB flash players are one of the latest storage devices which are both removable and insert able. All USB flash players are portable and very smaller in their size and it is available in the market with different styles and models. Why are they known as USB flash players? The answer is that it has flash memory capacity that is used in it. Normally it connects to the computer motherboard through the pen drive slot. The original name of this gadget is USB flash memory, but to catch the customer’s attention the manufacturers have given this particular name as pen drive.

A pen drive is a sleek and a compact computer gadget which is used as a memory flash for transferring data from one to other. It is a plug and play device. It as simply plugging into any USB port and the computer automatically detects it as another removable drive. It is possible to read, write, copy, delete and move data from hard disk to it and vice versa. It is also possible to play MP3 files, run any applications view videos or even take high quality digital photos directly from it.

There is variety of pen drives in the market. Professional models which has a high performance flash memory and performs up to read and write 20 MB- the fastest in the world. This flash memory stick comes with an LED indicator, boot function, and write and delete protection. It has got maximum weight of 22 grams. Mini USB pen-drive is another variety of it which has got same technical specifications of professional models but it comes with key ring. Because of how small it is, one can easily fit it into their pockets and are designed to imitate a small pen or pencil, hence being named “pen” drive.

Why pen drives are used more now days? What is the advantage of using this jump drive? The advantage is easily accessible and common for all. The main benefit of using it is that its scratch and dust proof. It can be easily carried from one place to another manages every day carrying and abuse. It helps to take some important data from one place to another easily, it is very much portable. The working of it is also very simple and easy. You should only connect it the USB plot. Professional models are costly comparing to the normal mini pen drives. The types of pen drives are pen drive professional, USB micro, USB mini, USNB compact, USB HDD-2GO, USB business drive. The last two of them are ultra fast data transfer and compact.

USB pen-drives are the best when it comes to removable storage device because of its portability and features that are easy to use. It is highly durable sleek and compact to the consumers. They are quiet suitable for casual users and are resistant to damage or other problems. They are versatile because of its ability to be used for many different things and can be easily used by students, employees, and network administrators.

What Is the Difference Between Hot, Warm and Cold Disaster Recovery?

When it comes to implementing your business continuity plan what strategy do you adopt for the disaster recovery element? (for a description on the difference between Disaster Recovery and Business Continuity please see my article on Disaster Recovery or Business Continuity?).

You may have heard the terms hot, cold and warm recovery, but what do they mean, and what are the advantages and disadvantages of each service?

Hot Standby

Hot standby is normally available to the users within minutes of a disaster situation. This level of service is achieved by total duplication of the computer systems covered (hardware, software and data). There will also be a requirement for a resilient network connection into the Hot Site.

Benefits – Available immediately; dedicated to (customer).

Disadvantages – Cost; Complexity, management.

Warm Standby

Warm standby is normally available to the users within hours of a disaster situation. This is by far the most common type of service utilised by for I.T. disaster recovery, and typical recovery times range from 8 hours to 24 hours (dependent on complexity, location and data volumes).

The service can be delivered from a remote recovery centre, or alternatively, delivered to site in the event of a disaster. Depending on the equipment involved the configuration may be installed within an existing facility or a mobile recovery unit.

It should be noted that whilst the Hot standby option is normally dedicated to one customer, Warm standby is delivered on a subscription basis. Industry standards are between ten and twenty five subscribers per configuration. Availability is therefore not guaranteed in the event of a disaster. Testing is also normally to a predefined number of days P.A.

Benefits – Lower cost; reasonable availability.

Disadvantages – Availability; recovery timescales are longer; limited testing available; only available for a limited period following a disaster.

Cold Standby

Cold standby is the provision of computer and people facilities that are made available to the client within a few hours of the incident. Unless the service is backed up by a contract to supply the necessary computer equipment, the recovery period is likely to be several days. It is not unusual for Warm and Cold standby services to be combined, giving a very flexible approach to recovery.

Fully serviced office space is also available on a subscription basis. These are usually equipped with PCs, servers, printing facility and a network infrastructure. These would be described as Business Recovery Centres, and could also incorporate Cold space for central systems.

Benefits – Lower cost; large amount of available space (can accommodate large systems). Business recovery Centres can accommodate several hundred people.

Disadvantages – Availability; recovery timescales are longer; limited testing available; only available for a limited period following a disaster; additional recovery services needed.

EMA Continuity

Solve the Freeze Problem of Outlook 2007 With OST To PST Converter

It is easy to access Outlook mail objects, such as e-mails, tasks, journals, attachments, appointments, and messages without Internet connection. The overall credit goes to the OST files. These files allow you to use mail objects without Internet connection. Using the OST file is the same as using MS-Office file. Whenever you connect with the Exchange server, all the data of the OST file gets automatically converted to PST. But sometimes, it happens you are unable to use mail objects because you fail to synchronize OST files with exchange server. So, there is a need to convert OST to PST file. For conversion, use a third party OST to PST converter tool.

Discussed below is an error that appears when you use Outlook 2007, Outlook application halts after some time and doesn’t allow you to access Outlook application:

“Event Type: Information

Event Source: Outlook

Event Category: None

Event ID: 30 Date: 5/10/2008

Time: 8:33:44 AM

User: N/A

Computer: SBS-Computer

Description: The store C:Documents and Settingsuser.domainLocal SettingsApplication DataMicrosoftOutlookoutlook.ost is being reconciled with the indexer for the following reason: Non-matching max change numbers.”

Causes:

The cause for the occurrence of the above error message is corruption or destruction of your OST file.

Solution:

Such errors can be resolved easily. First repair the corrupt OST file. For checking the OST file, execute OST Integrity Check tool. For executing this tool, follow the below steps:

– Close Outlook.

– Open Scanost.exe. This program is located at drive:Program FilesCommon FilesSystemMSMAPILocaleID folder.

– From the Name list of profile, select a profile that contains OST for checking.

– A dialog box will appear that asks you to Connect or Work offline, select Connect.

– Check the Repair Errors check box. If you uncheck the Repair Errors checkbox, then the tool does not make any change even if changes are required.

– After performing all the above stated steps, choose Begin Scan.

If you are not satisfied with the results of OST Integrity check tool, then use a third party OST to PST converter tool. OST to PST converter tools are read-only tools built with advance technology to safely convert OST to PST file. Built with simple graphical user interface, these tools are easy to understand.

Stellar Phoenix Convert OST PST tool easily converts OST to PST without changing the original structure of the OST file. The tool restores OST to PST onto any drive that can be found by the host operating system easily. The tool employs advance scan and normal scan – whichever is required – to recover OST content. It supports MS-Outlook 2010, 2007, 2003, 2000, and 2002. You can download a demo version of the software to preview its functionality.

Disaster Recovery and Business Continuity

Disaster recovery planning and preventive measures ensure business continuity. The main question is “What if an attacker succeeds and renders an organization’s functions impossible?” Whether the break in business continuity is a short or long one, this is where an organization’s disaster recovery plans comes into play. The disaster recovery plans define the resources, actions, and data required to reinstate critical business processes that have been damaged or disabled because of a disaster. By focusing on disaster recovery plans and preventions, network managers can minimize the impact that catastrophic events may have in their environment. The recovery plan is the best way to insure that a business survives an IT emergency.

The various potential disasters that security administrators need to be concerned about can be classified as human induced incidents, natural, internal, armed conflict, and external. Human induced incidents can include loss of power, transportation accidents, and chemical contaminations. Natural incidents can include flood, earthquake, and tornado. Internal incidents include sabotage, theft, and employee violence. Armed conflict can include acts of terrorism, like the 911 attacks, civil unrest, and war. External incidents include hacking, unauthorized use, and industrial espionage.

Organizations identify potential threats and analyze what needs to be achieved in order to continue operating as though nothing had happened. After identifying these potential threats, security administrators can be in a better position to protect the mission-critical information systems.

Data backup is an essential part of any disaster recovery plan. Data backup allows personnel to restore files and application software that is vital to continue business. An effective data backup strategy should address how often backups are run, type of backup medium, when the backups are run, are backups automated or manual, backup verification, storage, who is responsible for the backups, and the fallback person responsible for backups. Addressing the need for off-site storage may also be an important guideline for organizations with extensive business-critical data (Boswell…, 2003 p. 433).

Organizations must include thorough planning and testing and include provisions for business continuity. Anticipating disasters is the first in the process. There is a lot to be learned and corrected from the testing phase and it needs to be taken very seriously. The testing exercise helps minimize losses during an actual attack. An effective disaster recovery plan should include the following documents: a list of covered disasters, a list of the disaster recovery team members, a business impact assessment, a business resumption and continuity plan, backup documentation, and restoration documentation.

It has been said that the most important step in managing potential disasters is to have in place a well-trained and ready to respond team including a member from senior management, members of the IT department, representatives from facilities management, and representatives from the user community affected by the crisis. In a real crisis, the disaster recovery team meets to evaluate and determine the sources of the disaster and identify the critical components that are affected. The team than assesses the business impact of the disaster, estimating how long the disaster may disrupt business continuity. In this process the cost of the disaster is also ascertained. Exhaustively documenting changes that are implemented during the rush to solve the problem is also crucial.

It is also important that organizations show their commitment to these plans that come from the IS department by adopting well-defined security policies and human resource policies that reflects their support to information security. A useful and well-written security policy should include sections on acceptable use, privacy, due care, separation of duties, “need-to-know” issues, password management, service-level agreements, and the destruction or disposal of information and storage media (Boswell…, 2003 p. 437). Human resources policy deals with personnel management. There should be thorough hiring practices including background, reference, and educational checks. To minimize a security risk, employees should have periodic reviews and rotate job functions and duties, which is beneficial in an emergency due to the more even distribution of information. Employee termination practices are also important in the protection and prevention of threats. Exit interviews should be conducted, individuals should be escorted off the property, and the terminated employee’s computer accounts and passwords should be deactivated and changed. A code of ethics should also be included in an organization’s human resources policy. This would help define and clarify the company’s stance on information security and provide a foundation built on ethics (Boswell…, 2003 p. 441).

An incident response policy can also play a critical role. This policy covers how to deal with a security incident after it has occurred. Following a sound incident response methodology lessens the likelihood that incompetent and inefficient actions will occur and contributes to the practice of due care. An incident response policy should follow the steps of preparation (being ready before an incident occurs), detection (recognizing the presents of malicious code or whether files have been altered), containment (preventing further loss or disruption of services), eradication (removing viruses or malicious code along with cleaning and reformatting hard drives that were affected), recovery (restoring the system), and follow up (develop set of lessons learned) (Boswell…, 2003 p. 442).

In conclusion, in is important to combine a disaster recovery plan with a well-defined and documented security policy, human resources policy, and incident response policy, which can minimize the effects of a catastrophic event and help assure business continuity. It is said, “Failure to prepare is preparing to fail.”

Works Cited

Boswell, S., Calvert, B., Campbell, P. (2003). Security + Guide to Network Security

Fundamentals. Boston, Massachusetts: Thomson Course Technology.

Automated Remote FTP Backup Shell Script

Saving the data from the server may be a problem, especially if you forget about it. Unfortunately the solution provided by PLESK is not always the best one, thus we have tried to come up with a backup alternative.

The steps we recommend are :

  • Setting/Saving the database daily, with upload on a weekly FTP server
  • Setting/Saving the data on a weekly basis and uploading on a FTP server

When you take a dedicated server, usually the company providing it, allocates a FTP space as well for backup for an extra cost or even included in the cost of the server. This space may be accessed only from their internal network, offering more security for protecting the data. Let’s see what we need to do in this direction.

Features:

  • Will dump daily the databases (based on AutoMySQLBackup shell script)
  • Will archive directories what you define (we use usually /etc/ and /var/www/vhosts/*/).
  • Have GPG encryption. (switch ON/OFF)
  • Will upload to remote FTP, weekly (or can daily)
  • Will send mail to ADMIN about job.
  • Will report from remote FTP all files for disk space usage and will also delete files from there.
  • Can restore file from Remote FTP.
  • Split large files into 1GB.
  • More smaller settings.

Setting/Saving the database on a daily basis (locally)
Download the automysqlbackup script from our server, modified in such a way that it creates separate folders for each saving. Thus you may search for a certain database very easily. Copy it on the dedicated server, in the /etc/cron.daily/, execute

  • wget -O /etc/cron.daily/automysqlbackup.sh http://www.grafxsoftware.com/download/backup-plesk/automysqlbackup.sh
  • chmod 700 /etc/cron.daily/automysqlbackup.sh

folder and change the execution rights.

Edit the file and modify (or not) BACKUPDIR=”/home/backups” (if you maintain this setting, you have to create the folder), MAILADDR=”YOUR-EMAIL-HERE”, and you may leave the rest of the information unmodified.

Setting/Saving the data on a weekly basis and uploading on a FTP server
Download the gfx_backup.sh script and upload it to your server.

Execute the following commands.

  • mkdir /home/backups
  • mkdir /root/backup_script
  • cd /root/backup_script
  • wget -O /root/backup_script/gfx_backup.sh http://www.grafxsoftware.com/download/backup-plesk/gfx_backup.sh
  • wget -O /etc/cron.weekly/execute_weekly_backup.sh http://www.grafxsoftware.com/download/backup-plesk/execute_weekly_backup.sh
  • chmod 700 /etc/cron.weekly/execute_weekly_backup.sh
  • chmod 700 /root/backup_script/gfx_backup.sh

Edit /root/backup_script/gfx_backup.sh and set (compulsory)

ROOTDIR=”/root/backup_script/”

DIRS=”/etc /home/backups/ /var/www/httpd/vhosts”

FTPD=”/”

FTPU=”USERNAME”

FTPP=”PASSWORD”

FTPS=”IP-OF-YOUR-SERVER”

EMAILID=”YOUR-EMAIL-HERE”

After saving these settings, call the script as follows.

  • sh /root/backup_script/gfx_backup.sh –backup
  • sh /root/backup_script/gfx_backup.sh –restore
  • sh /root/backup_script/gfx_backup.sh –report
  • sh /root/backup_script/gfx_backup.sh –help

Any bug/idea should be sent via our website

How to Resolve Outlook OST File Error "File.ost Can Not Be Accessed"

At a work place MS Exchange server and MS Outlook collaboratively provides an efficient e-communication environment. All the mails and other mailbox data gets stored on the MS Exchange server. A unique profile is created on Exchange Server for every user which can be accessed with MS Outlook client. For each profile an ost file is automatically created on the user’s local system which is exact replica of the users mailbox on the Exchange Server. The OST file facilitates the user to work in offline mode, and gets synchronized with the Exchange Server when the internet connection is restored, to reflect the changes in one another.

Here it is to be considered that.ost file can not be accessed with the MS Outlook. When it get synchronizes with the exchange server it automatically gets converted in.pst file that is directly accessible with outlook. But what happen if in any case you can not connect with the Exchange server.

Consider a practical scenario, where you had left your job but have some of your important personal mails and data in the company’s mailbox. But now you do not have permission to access the MS Exchange Server. In such a case when you open MS Outlook and try to access the.ost file it results into the error message

Unable to open your default e-mail folder.

The file C:Documents and Settings/User Name/Local Settings Application

DataMicrosoftOutlookoutlook.ost cannot be accessed. You must connect to your MS Exchange

Server at least once before you can use your offlline folder file.

In this situation you only have the OST file that contains all your mails and data. The only way to access your desired mails and data is to convert the ost file into pst file using a third party ost pst converter, that converts the Otlook ost file into pst file that is accessible with outlook and can be stored on any disk visible to host system.

Convert OST to PST tools are fabricated to convert the damaged or inaccessible Outlook OST to PST file to make then accessible with Outlook. Such tools are very efficient, easy to use and are able to convert all the contents of the ost file (mails, tasks, notes, attachments, calendar entries, journals etc.) into pst file. Using ost to pst conversion tool individual mails can be stored in EML or MSG format. Convert OST to PST software can convert the password protected or encrypted OST file to PST file. Software supports Windows 7, VISTA, XP, 2003 and outlook 2010, 2007, 2003, 2002, 2000.

The 5 Core Issues Facing Database Administrators

Every data centre manager, be it at a Fortune 500 or a small startup, must face five core issues during his or her database management. Two fundamental keys of databases themselves are exacerbated by three other forces that require attention in order to have a robust, functional, and powerful database system.

The nature of DBA is simple: ‘If you’re doing your job well, nobody will notice. If you screw it up, everyone will notice.’

=== DB Fundamental: Accessibility

To be useful, a database must be accessible. Otherwise it is just a store of information that no one can retrieve. In database management terms, the value of data is measured by how much it costs (in dollars and/or machine function/processor time) to store and retrieve it. The less it requires to get to the data, the cheaper the data is by these metrics.

This means that the easier it is to find data, the cheaper that data is to the overall scheme. For example, in 2005, Cisco estimates that it spent $25.2 million on data retrieval just for regulatory compliance purposes. After upgrading and improving their processes, they cut that cost by 97% to $1.8 million the next year. Not insignificant.

So accessibility is perhaps the top priority for nearly every DBA and her team.

=== DB Fundamental: Change Management

Two types of change management occur in a database. The first is management of the data’s changes themselves – how they are accessed, changed by users, and stored. The second is how the business around the database changes, affecting the database itself.

The first DBA concern is user management and this ties in closely with security (below). Most DBAs realize the importance of keeping date-stamped backups of original data so that if something is changed and the changes must be reversed, they can be. That’s the basics of change management in data.

In business, changes are constant and for the DBA, this means new hardware, changes in software, upgrades to client machines, and more. All of these can affect the DB, so the administrator must keep a fluid system capable of growth or alteration. Managing the lifecycle of your hardware, for instance, can mean 30% in savings over a year thanks to lowered replacement and disposal costs.

=== DB Forces: Compliance

Likely the most important (and hated) aspect of database management is compliance. There are whole volumes of legal books dedicated to document and data storage requirements as well as retrieval needs for those legal documents the company stores. Literally every department of a business will have compliance requirements for the DB. Often these must be preserved for long periods of time as well.

Balancing the data storage needs of the company with its retrieval requirements is often the most demanding thing a DBA does.

=== DB Forces: Security

If the news is any measure, data theft and losses are on the rise. While this has been a core issue for DBAs since the days of DBA 101 classes in school, it’s becoming a forefront subject as well as the impetus for many changes happening in the business today.

=== DB Forces: Disaster Recovery

‘Backup once, then backup regularly’ is the mantra of all IT workers. In DBA it’s said twice. Nothing is more disastrous for a company than having its database lost and irrecoverable. The ability to quickly restore lost data, change access accounts and passwords, etc. are paramount to both security and asset safety.

These five issues can be considered the core of what all DBAs face and should be what they focus on the most.

Fixing "Memory Card Error" Message in Pentax Optio S40

Pentax Optio S40 is a four mega pixel digital camera that comes with various features including thoughtful design, high portability, user-friendly operation, and function customization. The camera uses SD (Secure Digital) or MMC (Multi Media Card) to store all the multimedia files taken by this camera. Corruption or damage in these digital media cards is a common problem encountered by most of the photographers. The main consequence of memory card corruption is inaccessibility of data stored in the memory card. To prevent the hazards created after memory card damage, most of photographers maintain an adequate backup of there data (preferably in other storage media). However, the probabilities of photographers forgetting to create a valid backup or the other storage media getting corrupted always exist. In such cases, the data from a corrupt media card can be recovered by using advanced Photo Recovery Software.

Consider a practical scenario, where you were taking pictures from your Pentax Optio S40 digital camera. The camera turns off unexpectedly due to empty battery and you receive the below error message, the next time you switch on the camera and attempt to view all the pictures:

“Memory Card Error”

After the above error message pops up, the data saved in the memory card becomes inaccessible. The same error message pops up every time you attempt to view the records stored in the database.

Cause:

The root cause for the above error message is corruption of memory card due to improper shutdown of the camera.

Resolution:

To resolve the above error message, you will need to format the card in the camera using below steps:

1. On the Set-up menu, select Format.

2. Press the four way controller to select Format.

3. Press OK to begin the formatting process.

Once the formatting process is finished, the error message does not pops up. But, formatting process also deletes all the previously stored data on the memory card. To recover that formatted data, you will need to use powerful Photo Recovery Software. These applications can comprehensively Recover Deleted Photos by employing powerful scanning methods.

Stellar Phoenix Photo Recovery is a powerful third-party tool that recovers maximum data after any data loss scenario. The highly interactive user documentation that comes along with the software allows the photographers to Recover Deleted Photos with ease. The read only software is compatible with Macintosh and Windows operating systems.

How to Recover Deleted Text Messages From a Sanyo CDMA Cellular Phone

As popular as cell phones are with teenagers, you would almost think that they were born with them attached to their body. Just think about it, if they happen to get grounded and their phone is taken away, they act as if you have just removed their lifeline. Although most of our teens just use these devices to stay in contact with their close friends and family members, there are times when they can become tempted to engage in activities that they have no business sticking their noses. A few of the more common problems that many parents face is sexting with their girlfriends or boyfriends, and bullying other teens that they have gotten into arguments with. Another big problem that some parents also face is illegal drug use. Each of these are generally problems that you will find evidence of in their cellular devices. This is because these devices are their favorite form of communicating with others and is where most of their conversations take place. If a parent notices any hint that their teenager is engaging in any of these types of situations, it is recommend that you consult with a professional investigator that knows how to recover deleted text messages from a Sanyo CDMA cellular device.

Experts that are knowledgeable in cell phone forensic investigations can easily retrieve data from your teens cellular device. This makes it easier for parents to obtain information they need to see if there are problems that need to be addressed. A PI can recover deleted text, SMS history, NV memory dump, phone book information, GUID properties, device properties, call history, file system, and other data that has been erased from the cellular device.

One mistake that some parents have made that you will want to make yourself aware of, is the use of over-the-counter SIM card readers. Using these readers can end up with more problems, as they are bad about destroying data as the process is being performed, making it impossible to be recovered again. Investigators that perform cell phone forensic investigations use equipment that costs thousands of dollars and will not destroy data they are retrieving for you. Many times even when they go to retrieve deleted text, several different tools have to be tried before they find one that matches up to a Sanyo CDMA device, and matching store-bought counters is close to impossible.

If you are concerned about any of your teens activities, the best investigative tool that can be used is offered by experienced investigators that know what their doing. They can recover deleted text and other data in as little as 48 hours.

Copyright (c) 2010 Ed Opperman

Solution to Error-Mount – Wrong File System Type

LINUX operating system is popular for its new-age advanced technology and features. LINUX facilitates working on the same computer along side Windows. The process of having two different operating systems on a single computer is known as dual boot, where you can have choice to choose either of the listed operating systems at the boot time. LINUX is the most widely used complete open source operating system and has the bare minimum compatibility issue with other popular operating systems. However, sometimes, accessing of LINUX volumes from Windows can’t be possible and error occurs while accessing the same from LINUX also. In such cases, you have to look for any LINUX data recovery utility to recover your valuable LINUX data back.

Let us elaborate the scenario, suppose that you are having Windows and LINUX on the same computer under a multi-booting mixed-OS system. You tried to mount the ext2 based LINUX volume but failed to do so with some error messages on the screen. Thereafter, you tried to boot your system with LINUX OS, but failed to do so with some boot errors and the data remains completely inaccessible. The error messages that flashed on the screen while trying with Windows can be read as follows:

“mount: wrong file system type, bad option, bad superblock, or too many mounted file systems”

Or

“can’t find ext2 File System on dev ide1 (22, 65)”

Possible cause:

The most likely reason behind the above problem is a possible LINUX volume or file system corruption. Usually due to virus attack, unsystematic shut down, unconventional mounting of the drive etc, such file system corruption occurs.

In order to resolve the above error, it is wise to format and reinstall the OS. It is the data in the LINUX drive that is more important than the resolution of the error. Hence, either you can restore the data from the backup or you have to opt for any LINUX data recovery software or ext2 recovery utility.

These LINUX data recovery utilities are developed to recover the lost, formatted or inaccessible data from any LINUX partitions, irrespective of the data loss situation. In addition to this, their lucid functionality and stepwise instructions place them among the user friendliest utilities.

Stellar Phoenix Linux Data Recovery is a recovery utility meant to recover any lost, deleted, inaccessible or formatted LINUX data from ext4, ext3, ext2, FAT16, FAT12 and FAT32 file system based volumes. The software incorporates features like creating of image, save scan etc and can recover your data irrespective of the hard drive type.