You all must be aware of word Hard Drive failure and Data Recovery. Now days in modern world everyone is using digital devices which involves lot of file saving, downloading and data exchange. Nowadays data recovery is not only associated with Hard drive Failures but also with many other devices like Phones, Music Player, Memory Cards, Cameras etc. These days every school kid has their own cell phone and they all save tones of pictures, music and videos. Data is very important and crucial for it owner and no matter how careful you are these devices fail suddenly and that’s when you need file recovery.
What is Data Recovery?
In simple words data recovery is extracting data from damage or corrupted hard drives, magnetic tapes, memory cards, SSD by using software plus hardware recovery method and saving it to a good hard drive. Data extraction is a very complex and delicate process as in this process professionals only get 1 or 2 chances to recover files.
Types of Recovery :
· Deleted Data – This is usually done by very expensive advanced professional Software which is able to scan and read sectors on drive which were deleted.
· Inaccessible/ Lost partition - In this case data is on the storage drive but is not accessible.
· Operating System Failure – This is most common failure and can be seen in both Mac and Windows based laptops. This is also one of most common type of recovery.
· Physical Damage – This is type of recovery where the storage device is physically broken or damaged beyond repair. This type of recovery is done is special Labs also known as Clean Room. This is usually most expensive type of recovery.
· Logic Board Failure – This happens when the circuit board on HDD is not working or HDD cannot be turned ON. It is not easy to perform this kind of recovery as HDD need same exact same logic board from same manufacture and model of the hard drive.
Should I attempt to Recovery Data on my own?
Yes if you definitely don’t want your data back then go ahead and try it. Recovering data by users on their own is not recommended at all, if you do so then you will be the one destroying hard drive plus any possibility of recovering data by professionals. Remember even professional recovery companies have only 1 or at most 2 chances of recovering data. If you attempt something then for sure you don’t love your data and you will end up getting nothing.
There are few free data recovery software’s out there which one should never use as these software’s are for advertisement purpose and not for actual recovery. Professional recovery software’s are very expensive and engineers who are trained to recover files follow proper step by step procedure to recover valuable data. These free softwares actually reduce chance of recovering any data even by professionals as it requires drive scanning for hours and thus making many sectors unreadable. Also this software will advertise their company and ultimately ask you to bring HDD to them so better not to attempt anything foolish.
Is Windows & Mac recovery same?
It is important to understand that windows and mac both are using different file systems. Windows hard drive is formatted as NTFS whereas Mac uses HFS+. That’s why software recovery of both the systems is performed in different way using different typed of recovery program. Not every company can recover Mac hard drive so it is not recommended to give HDD for recovering to Windows Recovery Company. Mac recovery is more complex than windows but when it comes to physical recovery the basic steps are same for both.
Dos and Don’ts
· When your mac hard drive crashes do not turn on your MacBook as this will force drive to read data which will make drive condition worst.
· When your mac OSX is not booting up then do not force boot it or turn it OFF & ON multiple times as this will lead to complete HDD failure.
· If your camera memory card is not readable just take it out and leave it. Don’t try inserting it in other devices as it reduces recovery chances.
· Never attempt any kind of recovery on your own.
· Always keep a backup copy of your data no matter what device you are using.
· If your hard drive is making clicking sound that means it needs hardware recovery so never attempt to open it physically.
· If you have deleted data by mistake then right away turn OFF your computer and don’t use it unless data is recovered. If you do so you will be overwriting sectors and recovery will be impossible.
Data recovery is a very complex and time consuming process and it requires highly skilled engineers to extract files from damage drives so it will be always an expensive process no matter which device you recover. Whenever recovery is required of files such as photos, music, videos do not attempt to recover on your own and always ask for professional help. Pictures and Videos means a lot to people and these files are large in nature so that’s why there recovery is difficult compared to documents.
These days there has been sudden increase in email hacking and every day we are receiving many computers and laptops which are hacked and contains malicious programs on it. Recently there are few new hackers in market who are not very experienced but still can create enough trouble for you. These type of hackers are newbie but they are dangerous as they spend more time finding out information and try new methods of hacking. Also these hackers are either teenagers or someone unemployed. Email hacking is the easiest and most popular way of hacking any computer and because not every user is protected with right kind of security program there email often get hacked.
How to know my email is Hacked?
1. If you are not able to login to your email with same old password.
2. If your friends are receiving emails from your account asking for money.
3. If people in your contact list are receiving strange links and picture links.
4. After you login you find out there are no mails at all and all mails are deleted.
5. When you see strange emails in sent items which you never sent.
How does my email got hacked? What did I do?
1. Did you click on the link sent calming jobs, lottery confirm? See Picture.
2. Did you open any attachment claiming TT transfer Successful.
3. Did you download any software from unknown website recently?
4. Are you using same password on many websites?
5. Did you open link sent by friend to see pictures? may be his email is also hacked and he is unaware of it.
6. Did you receive email from your own email address asking to open link?
What to do once email is Hacked?
1. The most important step Change password immediately. Create a strong password and do not use your name or friends name which hacker can find from social networking websites.
2. If you cannot access your account then only option is to go for password recovery.
3. Once you login to your account change password reset setting and make sure hacker did not change your recovery email address.
4. Check if hacker has not created any settings to forward all emails to some other account.
5. Scan your computer with an Antivirus program and look for virus or spyware.
6. Uninstall any recently installed program from unknown source.
7. Install a firewall as this will not allow information to be sent to hacker.
Future Precautions -
Follow precautions suggested by us to make your online browsing and emailing safe. If you not sure about security of you computer then you can consult computer security experts at MacWin Technology - 64037272.
Every day we receive many Macbooks being damage by liquids like coke, juice, sodas, coffee, tea or other kinds of party liquids like Beer, Whiskey, Cocktails or plain water. Many customers ask us what to do in case of liquid damage as they have already damage their machines so it’s too late to explain procedure. Now you can know the procedure to save your macs in case of liquid damage before it is too late.
What happens when liquid spills on mac? Do liquid spill really damage laptop? Why computers don't work after liquid spill?
Usually liquid wont damage your computer right away in fact most of the macs are damaged by actual user itself and not the liquid. What we have seen is after spilling liquid every person tries to turn on their macs or if it is already on they don’t turn it off instead they run around to get tissue or towel to dry it.
Mac Liquid Spill Repair Hong Kong will tell you step by step procedure what to do in case of Liquid spill but before that you must know what kind of liquid you have spilled on computer. We have divided liquids in 3 types of categories:
1. Sugary drinks/Sticky Liquid - These are liquids that are sticky in nature due to presence of sweetener or sugar inside. These liquids always damages keyboards, trackpad and are most dangerous kinds of liquids e.g. Juice, Sodas, Coffee, Hot Chocolate, Milk etc.
2. Water base Drinks - These are drinks that are mixed with water. These may or may not have sugar inside so they are less dangerous like Green tea or Chinese tea.
3. Alcoholic Drinks – With this category people have wrong assumption that alcohol does not damage computer but actually it does as they have water or sugar inside like beer, vodka, whiskey and Pinna Colada which girls always spill :)
Now as you are familiar with categories of Liquids so we can proceed to procedure of saving mac. Mac SSD Upgrade Hong Kong will tell you what to do in case of Liquid Spill in the procedure below.
Dos and Don'ts
Follow the steps provided by Water Damage Laptop Repair HK and your mac will be fine. Remember never turn ON liquid damage computers and must seek for professional help immediately. Contact MacWin Technology Hong Kong (852) 64037272
Many times in offices, schools or universities while using computer you will leave your desk for few minutes may be for a meeting or cup of coffee, sandwich, etc. When you come back you get a feeling that something is not right and someone was looking into your computer or trying to take out some information.
That moment you are really scared and feel unsecured and you wish there was way to find out or catch the person who was messing around with your PC. Don’t worry we will tell you the easiest free way to secure your computer and find out the person who was sneaking around.
All you need to do is login to this website Mouselock and sign in using your Google account. After login select a secret point any number that you can remember, this number will be your unlock code .
Once you have selected code then to lock it just click into the circular slot and you’re done (see Below Picture). Now you can leave your desk and go our anywhere you like. Now when your colleague or your neighbor tries to use your computer while you are not there he will only have 5-7 seconds to click correct code and unlock it. Once he fails to do so you will receive an email notification and at the same time it will capture the image of the person who was trying to access your computer. For photo capture you must have webcam connected to your computer. Usually these days every laptop has built in webcam.
Now you can easily find out who is the person who was trying to access your computer without him knowing it. This application is free and does not require any special computer skill to use it. You do not need to download and install anything just open the website and you are good to go.
Note: Mouse lock is only to find out who was using your computer and to notify you. It does not secure your computer nor protects it from being used.
Keyloggers are the most common software used these days to hack someone’s email password, identity information, credit card details, and many other important login Passwords. Keylogger are very easy to use program and even a primary school kid with basic computer knowledge can use it to hack your computer. Surprised? Furthermore Keylogger can also be installed remotely through other computer so person sending you Keylogger program don’t need physical access to your computer and most important it can also be attached to any picture so when a Victim opens picture file he won’t even know Keylogger is installed in background on his computer. So how to protect your computer against these Keylogger? We will tell you some Good ways to be secured J
First of all you should know what a Keylogger is? Keylogger is a program that records every key stroke of your keyboard as you type. So when you login to your email or when you make online purchase all the password and numbers you type are recorded in a log file and automatically sent to actual owner of Keylogger. Keylogger programs are also capable of recording screen shots and mouse clicks.
Installing good Antivirus is first and most important step. Do not compromise on Antivirus program and never buy antivirus software based on cheapest Price. There are so many Antivirus software in market which one to buy?
To get the answer you can ask our hacking professional who keeps testing all new Antivirus software’s every month and suggests best and reliable software. Let experts at MacWin Technology build your system security so your computer is well protected. Mac users don’t think your system cannot be infected or Mac cannot be Hacked. Always make sure your antivirus program is up to date. All good antivirus programs can detect most common Keylogger.
Now you must be thinking if I have Antivirus software then why do I need Antispyware?
Well Keylogger is considered as spyware and not a virus and not all antivirus programs are capable of catching spywares. Spywares Algorithms and behavior is completely different from a virus. A spyware is meant to steal information and they are programmed to doge Antivirus programs. Antispyware reads programs behavior and they don’t work on same basics as Antivirus. In today’s date anti-spyware is more important and must program than a Antivirus. Most Antivirus software has AntiSpyWare function but most of them are useless. We recommend Pc Tools Spyware doctor.
Apart from these other methods by which you can find Keylogger are:
If you receive a file from some un trusted source and if you are not sure about file security then another good free option is to scan file online. There are many free online scanning websites where you can upload file and run a free scan. Usually these online scanners use more than 20 different popular antivirus programs to scan file and they provide you full report about file security. Good free online scanning website is Virustotal
Most of you guys may have not even heard of Anti logger program. Antilogger is a program that is made to detect Keylogger in a system. Usually all good Antivirus software’s will detect Keylogger but advance hackers will use technique like Hexing and Binding to doge antivirus programs. We have tested many Antilogger programs and we recommend .
Key scrambler is a program that encrypts all your keystrokes when you type so even if a Keylogger manages to doge your antivirus program it still cannot record key strokes. Keylogger installed on your computer will record encrypted key stroke scrambled by Key scrambler and not originally typed keys stokes. is free utility for basic protection. You can download and use it on a public computer for further safety.