Home

Recover It All Now – Documentation –

image

Contents

1. Description Recover It All Now Ver 1 0 is a comprehensive data recovery tool that offers a fast and easy solution to catastrophic data loss RIA Now is a Windows based software tool designed for the recovery of data lost through deletion file system corruption or slight noninvasive hardware anomalies It brings a high end recovery engine to the fingertips of the average end user RIA Now runs in a Windows XP 7 and 8 environments and will address any physical device connected to the computer It is advisable to not install RIA Now on the hard drive that you are trying to recover your data from as any new data written to the drive has the high possibility of overwriting any lost or corrupted data RIA Now will not write data to your hard drive and has safeguards built into the software that will aide in protecting your drive from further damage That being said if the drive has been found to be damaged by either a surface scan Windows Surface Scanner or other means and if your data is important to you it is imperative that a data recovery specialist team be employed to give you the optimum possibility of recovering your data DTI Data Inc is such a company and with its many years of service to the community can offer a professional helping hand to get your data back for you DTI Data is your friend in the data recovery community and can be counted on to do everything to ensure a successful recovery Installing Software After the softwa
2. RECYCLER H E System Volume Information Orphan ata g E EE8182 png 12 18 2014 20 08 01 25 2012 20 50 EI EE8183 png 12 18 2014 20 08 01 25 2012 20 50 Status Unkni Unkn Unkn Unkni Unkni Unkni Unkni Unkni Unkm Unkm Unkm Unkm Unkm Unkm Urkm 2 Type Date Time Message STATUS 01 30 2015 13 34 53 LEGACYMBR WDC WD10 STATUS 01 30 2015 14 39 46 Beginning File System Scan STATUS 01 30 2015 14 39 46 Complete Read Ers Time Rem 00 00 00 99 Folders 31 Files 1957 Figure 2 RECOVER IT ALL NOW MES SaaS Step 3 Follow the instructions in the Copying Files portion of this documentation to quickly recover your lost data Scanned Recovery There are times when the initialization process will not be able to resolve critical damage to the file system The causes for this are numerous but can consist of viruses hardware glitches application software and malware just to name a few In instances like this there will more than likely not be a volume listed for the physical device in the Device Volume List In order for the software to create a list of possible volumes a scan of the entire physical device must be done In order to accomplish this the following steps should be taken Step 1 In the Device Volume Device list Figure 1 choose the physical device green you wish to scan Step 2 On the Function Button bar click on Scan Physical Device This will im
3. reading from it will become an impossibility For these situations the Search Files function Figure 1 offers a solution to precisely carve out a particular file with a minimum amount of access to the hard drive RECOVER IT ALL NOW FINRA FieSearch gp i mmm File Extension Filter Le jpa docx etc 1 Include Active Files Only V Include Date Filter Include Deleted Files Only 7 Include Size Filter Begin Search Date Month Day Year Smallest File Size 30000 January a z am Largest File Size 1000000 End Search Date h Month Day Year January 01 2013 Found Files List Name Size Path Created Modified Accessed Case 60858 Tools exe Root Case 60858 Tools Deb 12 18 2014 10 11 2012 12 18 2014 MessageReport pdf Root Build PDF Report 0 2 Build PDF Report exe Root Build PDF Report 0 D Calc Start of RAID exe Root Cale Start of RAID De V MessageReport pdf Root Build PDF Report 1 V Build PDF Report exe Root Build PDF Report 1 D iis lt O E a lt Figure 4 Button Bar The button bar offers the set of functions used to search for and copy the required data Begin File Search Mark All Found Files Exit File Search are all very self explanatory It is Copy All Marked Files and Terminate Search that need explanation Terminate Search allows the user to stop a se
4. Sg System Reserved NTFS 340D7D19 0 10 GB 2048 lt NTFS 146C9E 1862 92 GB 206848 Model WDC WD20 Drive Number 0 ze Intel 1 0 Raid 0 Volume 9315 07 GB RAID Serial Number 05 0 02FAEX 007BA 10 TB NTFS 5CBD0363 9314 94 GB 262656 Firmware Rev 05 0 ze 57325082 SNDOX7N1 232 89 GB Serial ATA Interface RAID NO NAME FAT32 995C3C7E 20 00 GB 2048 Bytes Per Sector 512 amp NTFS VOL NTFS 208FA7EA 20 00 GB 41945088 Total Sectors S EXFAT VOL EXFAT B24292BB 192 88 GB 83888128 ze Hitachi GTF202P8GTNS3F 698 64 GB Serial ATA S 62270 NTFS 40904438 698 63 GB 2048 Ss WDC WD10 80 0 EARS 00Z5B81 931 51 GB USB Development NTFS E46DF131 791 65 GB 63 Device Volume Description Device Volume Device List Type Date Time Message STATUS 01 30 2015 13 34 53 LEGACYMBR 57325082 STATUS 01 30 2015 13 34 53 LEGACYMBR Hitachi STATUS 01 30 2015 13 34 53 LEGACYMBR WDC WD10 Read Ens Informational and Progress fields Time Rem Folders Files Figure 1 Function Buttons Function buttons are the center to the recovery of a hard drives data Consider each button a tool in a very sophisticated tool box for use in restoring your lost data to you Device Volume List Upon initialization the following hard drive and physical device list is created This list consists of the physical device which a
5. mount the Volumes that can be found Use the procedure to Copy your data onto another hard drive mp RECOVER IT ALL NOW FINRA Drive hangs or locks up Windows This is normally a sign of either a damaged drive or a drive that is on its way out In this case it is best to call a data recovery specialist in order to help ensure that your data has the highest possibility of recovery Drive has been restored There are two types of restore first is the function to restore a system to a restore point Although this may or may not lose data there is a possibility that something may be missing Use the Simple Restore method to recover your data If the Restore to Manufacturer Settings has been used the normally all data is lost There are some methods that may be employed to recover some fragments of data but a data recovery expert should be employed to aide you Chkdsk has been run Of all of the Microsoft tools this is probably the most destructive Chkdsk by its very nature is designed to align the file system so that the volume can be mounted If that means deleting inodes and renaming them to file fragments Chkdsk will do just that Chkdsk is not a file data recovery tool but a file system alignment tool and can wreak havoc on even the most benign file system anomaly The Scan Physical Device function offers the most comprehensive method for dealing with drives that have had Chkdsk run on them Technic
6. the same file has been saved in several different folders and will cause duplicate file names RIA Now handles this by saving the duplicate file with a number appended to the end of the file name not the extender As an example in Figure 4 in the light gray rectangle we see the file Message Report pdf listed twice When copied to the folder the files will be shown as Message Report pdf and Message Report 1 pdf The extender remains intact only the file name itself is updated RECOVER IT ALL NOW MUNIRA E Seege a ens e Begin Forensic Scan IS Save File List a Terminate Forensic Scan E Exit Forensic Scan Found Files List Name Size Path Modified Created Bad Sectors alex quate ipaq 7282279 Root Lacie Rugged 01 02 2013 01 02 2013 14223 alex guate psd 125139070 Root Lacie Rugged 01 02 2013 01 02 2013 244412 Desktop DB 45568 Root Lacie Rugged 12 18 2013 11 22 2011 89 IMG_1908 JPG 5874512 Root Lacie Rugged 11 20 2012 11 19 2012 11473 IMG_1911 JPG 5645251 Root Lacie Rugged 11 20 2012 11 19 2012 11025 matchbox 538F1 3004367c234cec4931e22 38831 Root Lacie Rugged 12 31 2012 12 31 42012 75 MVI_1912 MOV 89988452 Root Lacie Rugged 11 20 2012 11 19 2012 175758 GOPRO322 JPG 4192745 RootsLacie Rugged 100G0 03 27 2011 03 27 2011 3 GOPRO323 JPG 4521361 Root Lacie Rugged 100G0 03 27 2011 03 27 2011 1 GOPRO344 JPG 4455081 Root Lacie Rugged 100G0 03 28 2011 03 28 2011
7. 014 20 08 01 25 2012 20 50 Unknil y H E System Volume Information e E EE See ey e 4 m OrphanData Type Date Time Message a STATUS 01 30 2015 13 34 53 LEGACYMBR WDC WD10 STATUS 01 30 2015 14 39 46 Beginning File System Scan z STATUS 01 30 2015 14 39 46 Complete E i m d E Marked 1004159 Bytes Read Enrs Block Time Rem 00 00 00 99 Folders 31 Files 1957 Debug Figure 3 In Figure 3 we see that folder and file hierarchy for this particular recovery In this example the client wants to recovery all of the data in the Emoji PNG folder It is a simple matter of clicking the check box to the left of the folder name Once this is done all child files and folders will be marked for copying If there are certain files and folders that you do not want to copy such as in the example Image Set Five then simply click on the check box to the left of the name and all child folders and files will be unchecked Once you have marked all of the data you wish to copy simply click on the button Copy Marked Data located on the button bar Figure 1 Searching for Data Ultimately there will be some occasions where the recovery of a single file will be sufficient to complete a recovery A situation along the lines of a single Quick Books file an Outlook PST file or something as extensive as a single database file that houses an entire client base In addition the hard drive itself may be on a slippery slope to where
8. 2 GOPRO410 JPG 5370556 Root Lacie Rugged 100G0 03 28 2011 03 28 2011 6 GOPRO413 JPG 5173724 RootsLacie Rugged 100G0 03 28 2011 03 28 2011 H GOPR0421 JPG 4977342 Root Lacie Rugged 100G0 03 28 2011 03 28 2011 6 GOPR0440 JPG 5176527 Root Lacie Rugged 100G0 03 28 2011 03 28 2011 1 GOPRO447 JPG 5699166 Root Lacie Rugged 100G0 03 28 2011 03 28 2011 4 GOPR0453 JPG 5173688 Root Lacie Rugged 100G0 03 28 2011 03 28 2011 7 GOPR0456 JPG 5043563 Root Lacie Rugged100G0 03 28 2011 03 28 2011 5 A Current File Name Total Blocks Figure 5 Forensic Scan DTI Data has received thousands of calls and emails over the years that describe a data situation that leads one to believe that there is corrupted data or some type of data anomaly caused by physical damage to the hard drive components These anomalies are such that they do not present themselves in an easily identifiable manner and many times can only be resolved by looking at each and every one of the files on an individual basis For many clients this type of verification can be tedious at best and mind numbingly fruitless is application With that being said DTI Data has designed a method within RIA Now that offers a quick and easy solution to find the vast majority of corrupted data without the painstaking one file at a time methodology The following is a concise step by step method for addressing such a situation Step 1 Using Speed Clone for Windows make an
9. RECOVER IT ALL NOW Recover It All Now Ver 1 0 is a comprehensive data recovery utility that offers a quick and easy solution to catastrophic data loss RIA Now is a Windows based software tool designed for the recovery of data lost through deletion file system corruption or slight noninvasive hardware anomalies RECOVER IT ALL NOW MES SaaS Table of Contents Descriptio keceran e board cine co etabieeeine ened eee ene erate 2 Installing Een 2 SoftWare IMMA ZAM ON EEN 2 Screen DEER 3 EE 3 IR WONG LIST EE 3 Device Volume Description kA 3 Status Message E 3 Informational and Progress Fields vccisccsccssssdeiccscecatceussieterunedineedeniaiwennvpeteeunedasesueeleneeemmiaeenases 4 une 4 Scanned SCOVE Y crccsssscrancinte mcsnierietrmuteansenietd cami aieimenaniek outed Eesen 5 ele 5 Searching tor KE 6 ue ie EE 7 Pile Extension FIG sosisini e r ARE EEE AN AREE ARTE EE EKE 8 Filtering Ee Ce 8 BELEA E 8 SIZE E 8 Dae FS COU E 8 Duplicate Fil En 8 alo ico ogee Ot reer OP es ep ee Teen OP mre P ONT Cy err TTT oor T E E E T Creer rrr eee 9 Button cave E 10 GER E 10 Scenario S eeben 10 SISO RE 10 Drive Needs to be Formatted kee EEN 10 Drive hangs or locks Up Wumdows AEN 11 Drive has been Ree Ea rien een rr rte errr ee ee ee eee 11 Chkosk has Deen E 11 Ee elle Ee EE 11 Figure T eagrenas np ina gg EELER 3 EE 4 EE 6 PUNE Ae eebe et Seege eebe deeds 7 PIQUIO eg eut Seed Ee e EE EENS 9 RECOVER IT ALL NOW MES Sse ANIONS
10. al Support For software support or other data recovery needs please contact us Toll Free Phone Number 1 866 438 6932 Email Richard Correa dtidata com Address DTI Data Inc 1155 Pasadena Ave S Suite H South Pasadena FL 33707 11
11. arch before it is completed This might be used in the case of the client seeing their file immediately or the search parameters may be too wide and need to be narrowed a bit In these cases the user just clicks on the Terminate Search button they will be presented with a Message Box asking them if in fact that is what they wish to do and the current search process will be terminated Copy All Marked Files is exactly as stated but some explanation is necessary as to the processing of the files Upon clicking the button the user will be presented with a destination folder choose dialog box Simply click on the folder for the files to be copied too and begin the copy Each file will then be copied and unmarked from the list of found files RECOVER IT ALL NOW ES SaaS File Extension Filter In order to hone in on a particular file type this function allows for the entry of file extensions to bring the list size to something manageable The format is simply the file extender as exhibited in Figure 4 the red rectangle For multiple extensions a separator of a semi colon is used between each extender No spaces are necessary just the semi colon In Figure 4 files with the extender pdf and exe are to be included in the search Filtering Manager In order to tell the search function which filters to use a check box is located next to the filter type The manager can be found bounded by the blue rectangle In Figure 4 we can see tha
12. at volume double click on it The software will immediately query the volume on the hard drive and compile a list of all files and folders that can be found Step 2 Once the list is compiled you will be given a tab on the top of the device list window that will display the folder and file hierarchy of all of the data found during the recovery scan Once finished you will be taken to a display that will show you each of the folders and files recovered g E Gm Folder List Name Created Modified E LE BIM older Lis em r os Z EE8089 png File List 12 18 2014 20 08 01 25 2012 20 50 BCG Library Build PDF Report 0 H EE8090 pna 12 18 2014 20 08 01 25 2012 20 50 E Debug l EE8091 png 12 18 2014 20 08 01 25 2012 20 50 EJ Emoji PNG EE8092 pna 12 18 2014 20 08 01 25 2012 20 50 E Image Set Five EE8093 png 12 18 2014 20 08 01 25 2012 20 50 E Image Set Four E EE8094 png 12 18 2014 20 08 01 25 2012 20 50 E Image Set One E EE8095 png 12 18 2014 20 08 01 25 2012 20 50 E Image Set Six E EE8096 png 12 18 2014 20 08 01 25 2012 20 50 E Image Set Three E EE8097 png 12 18 2014 20 08 01 25 2012 20 50 E Image Set Two E EE8098 png 12 18 2014 20 08 01 25 2012 20 50 H E Build PDF Report 1 E EE8099 png 12 18 2014 20 08 01 25 2012 20 50 H E Cale Start of RAID E EE8180 png 12 18 2014 20 08 01 25 2012 20 50 tH Case 60858 Tools E EE8181 png 12 18 2014 20 08 01 25 2012 20 50 E MSlab71c tmp H E
13. ess RECOVER IT ALL NOW ES SaaS P RIA Now DEMO Version babak E Open Image File bed Seach ries Search Files thd So urene soan Stop Curent Scan Wo EISE eg Forensic Scan Forensic Scan ei sanan Ext RIA Now Se Connected Devices NTFS VOL 57325082 V Root Name Size Created Modified Status VS Ger 7 EE8081 png 1237 12 18 2014 20 08 01 25 2012 20 50 Unknd C7 Build PDF Report HI EE8082 png 1362 12 18 2014 20 08 01 25 2012 20 50 Unkni LAB Debug HI EE8083 png 639 12 18 2014 20 08 01 25 2012 20 50 Unk Emoj PNG HI EE8084 png 1176 12 18 2014 20 08 01 25 2012 20 50 Unk E Image Set Five 7 EE8085 png 1382 12 18 2014 20 08 01 25 2012 20 50 Unk Wl image Set Four 7 EE8086 png 1135 12 18 2014 20 08 01 25 2012 20 50 Unk Wl image Set One Z EE8087 png 1058 12 18 2014 20 08 01 25 2012 20 50 Unk Z Image Set Six JS EE8088 png 1214 12 18 2014 20 08 01 25 2012 20 50 Unk Z Image Set Three DI EE809F png 1288 12 18 2014 20 08 01 25 2012 20 50 Unk Z Image Set Two HI EE8184 png 982 12 18 2014 20 08 01 25 2012 20 50 Unk 6 E Build PDF Beton HI EE818B png 1146 12 18 2014 20 08 01 25 2012 20 50 Unk mate Start of RAID Hi EE818C png 988 12 18 2014 20 08 01 25 2012 20 50 Unk loo 60858 Tools DI EE818D pna 1510 12 18 2014 20 08 01 25 2012 20 50 Unknw E MSlab71c tmp 7 EE818E png 1348 12 18 2014 20 08 01 25 2012 20 50 Urban RECYCLER 7 EE818F png 1280 12 18 2
14. image of the hard drive in question This cloning allows for Speed Clone to map the bad sectors into the image so that they become easier to spot and ultimately aggregate in each file Step 2 Using the Open Image function in RIA Now load the image into the Connected Devices list Once this has been accomplished follow the steps for finding valid partitions outlines in either the Scanned recovery or the Simple Recovery RECOVER IT ALL NOW MES SaaS Step 3 Once you have the Volume you want analyzed recognized use the Forensic Scan button on the main display of RIA now to invoke that function Figure 5 clearly shows the Forensic Scan screen In order to evaluate a drive just use the Begin Forensic scan button RIA Now will now scan every file listed in the current mounted volume and evaluate each file for possibly corrupted files Figure 5 shows the list of files that have been found on this particular volume that have corrupted data in them Depending upon the total files and the size of the files that scan could take as long as four to six hours It is best to let the scan complete Most of Figure 5 is self explanatory but there are a few areas that need some brief explanation Button Save File List This will allow the user to save a list of all of the corrupted files found to a file that can be shared with technicians clients or simply archived Bad Sectors Display The number associated with this col
15. mediately begin a scan of the entire drive and may take anywhere from one and one half hours to eight hours depending upon the size of the drive as well as any damage that may currently causing the drive to read slowly Step 3 Once the scan is finished a list of all possible volumes will have been displayed under the physical device you chose to scan In order to populate the folder tree and file list double click on the volume that you believe is the one housing your data and a display Figure 2 will give results Finally if the scan is taking an extraordinary amount of time to complete and or no volume list was created then there may be serious physical or file system damage on your hard drive It is at this time that a data recovery specialist team should be employed if your data is valuable to you DTI Data Inc offers several comprehensive methods of recovery for even the most stubborn of situations Give them a call 727 345 9665 and speak to a data recovery specialist to help you on your way to a safe and full recovery Copying Files The steps to recovery can sometimes be complex and frustrating Each recovery offers a unique set of steps in order to ensure that the optimal amount of data is found DTI Data realizes that once the recovery process is finished the method for copying the data from the damaged hard drive to a safe and secure set of media should be as quick and painless as possible The following is a description of that proc
16. re is purchased the file will be saved to your hard drive as Setup exe Double click on this executable and the installation sequence will commence Once completed the software can now be executed from the Start menu as any other software product Software Initialization Upon starting the software the application immediately queries your system for any and all physical devices These devices include installed hard drives USB drives thumb drives and any other physical device that is considered a block storage device The DVD drives are not queried and therefore eliminated from the search During the query of the physical devices there may be some stalling or perhaps the software will seem to hang This action can be the result of drives that have gone into a hibernation mode and take a few moments to bring online or there is a possibility that one of the drives the software is querying has damage to the internals and is causing slow reads If this is the case then the drive needs to be checked out with a surface scanner before any recovery is started DTI Data offers a Windows Surface Scanner at no charge to its software purchasers RECOVER IT ALL NOW MES Sse ANIONS Screen Description RIA Now DEMO Version o B X SES DER 7 Function Buttons KA Scan Physical Device KZ Copy Marked Data jig Forensic Scan Ji Ext RIA Now lt gt Connected Devices d Connected Devices Type Value oa
17. re listed in green and any file system volumes blue that may have been mounted during the initialization process Device Volume Description A comprehensive description of the currently highlighted hard drive or volume This display offers a clearer description to the user in order to help them make a decision as to which device they wish to recover Status Message Bar This simple bar display progress messages as well as any difficulties that may have occurred during the recovery process Strict attention should be paid to this display as there is usually some type of message that pertains to the current state of your recovery RECOVER IT ALL NOW MINETAN Informational and Progress Fields During the recovery phase these informational fields offer a second by second of either the recovery or the copying of the found data It is the visual rendering of the internal processing of the software and offers a clear and concise representation of the data flow Simple Recovery Although each recovery is unique unto its self and can offer its own set of hurdles to overcome there is a general flow of recovery that can be used in most cases By following these few simple steps it is possible that you will in fact receive a full recovery and no other method will need to be used in order to find and copy your data Step 1 Look at the Device Volume List and find which volume listed in blue that you wish to recover your data from When you find th
18. t the Date and Size filter have been indicated for usage Date Filter Outlined by the green rectangle the date filter offers the user the ability to screen the search by a spread of dates The top date is the date to use for the beginning of the search the bottom date of course is the last date of the file The date used is the Modified date of the file It is to be noted that the dates are inclusive not exclusive of the start and end parameters In the example in Figure 4 all files from January 1 2011 to January 1 2013 will be included in the filter Size Filter Presented with the dark gray outline the file size filter allows the user to make sure that a certain file of a certain size is presented in the search There are many times that the file size is known in general terms especially database files and this filter allows for the masking of any files outside those parameters For many programs there are example files that have the same extender and may clutter the search using the size function allows the user to filter those out Data Recount Simply stated this is the total files found and the size of those files in bytes This is represented by the purple rectangle Duplicate File Names There will be many occasions where there is more than one file with the same name This can occur for many reasons Primarily files that have been deleted and then recreated will show in the file system as duplicate There will be times where
19. umnar heading describes how many bad sectors were found in this particular file Clearly the higher the number the more corrupt the file is Step 4 Once the list has been created it is time to find the files that are important to you and see if they may have some corruption Exit Forensic Scan in order to get back to the main screen menu From this menu use the Search Files function to find the files you are interested in As an example if you have a spread sheet that you absolutely must have simply type xls in the mask field and Begin File Search You will see a standard display however and file that has been found to be corrupted will be highlighted in red You may then follow the copy procedures to test the file In this case read the file with Microsoft Excel and see if in fact the file is corrupt Scenarios Over the course of many years in the business there are a few challenges that show up on a regular basis The following is just a few of these and the method used by RIA Now to recover the data Deleted Files One of if not the most common complaint for data loss is the accidental or malicious deleting of data In these cases a simple recover can be used to find the deleted files Once found simply copy the data off and begin restoring the data Drive Needs to be Formatted This is usually because either the Partition Marker and or the Volume Marker have been lost Follow the steps to do a Scan and

Download Pdf Manuals

image

Related Search

Related Contents

Moen INS1250B User's Manual  Samsung Home cinéma blu-ray, HT-D7200WXZF, série 7, SMART TV, 3D Manuel de l'utilisateur  Crimestopper Security Products RS-300 User's Manual  Weider WEEMBE1326 User's Manual  Loù Libretoùn de janvier en ligne à consulter  Flex complete guide  Balai vapeur combiné NT554  GAMMA Users Guide  YARO2 Manual (English)  My Document - Support  

Copyright © All rights reserved.
Failed to retrieve file