Saturday 23 November 2013

An Analysis Of Data Recovery

By Angela Briggs


Different pieces of information may be lost when a computer system fails. The system fails as a result of a number of attacks. The attacks may occur when a system get infected by various malicious programs. This corrupts the disk storage applications leading to loss of information in such locations. Data recovery activities are aimed at salvaging the information in the corrupted disk segments. A number of approaches may be used in such a case.

A computer system is made up of software and hardware elements. These are interlinked by communication channels which are transferring the pieces from one location to another. The flow of data between the various tangible elements is done by the use of information buses. The software applications initiate the processing operations by issuing a series of commands. The commands direct the hardware components on the operation to initiate.

The operating system is the core program within the computer system. It is the main program that controls the running of other applications. It forms the basis on which other applications are run. The interface provided buy this program ensures that there is a smooth flow of data from one point to another. The coordination of various elements is done through the management of resources in the system. Memory allocation is very critical in various operations. This is also done by the program.

A memory segment may be allocated to two or more applications of devices. This results from interference of memory corruption. It happens when a system is corrupted by malicious applications. The applications attack the main memory and then corrupt the critical files used in issuing of commands. The corrupted files then may issue a number of commands to other devices or the programs.

Program installation procedures are very critical. The main and key files are installed first. This is done sequentially in way that allows for a disk processes. The rest of program files are installed afterwards. Execution is also done sequentially. Large disks are critical in information recovery. The main disks holds data being processed after which it is transferred to external locations.

Fragmentation of the primary and secondary storage location is very critical in information management. The fragmentation partitions the disks into a number of independent segments. Each is accessed in a different way. Management is eased through disk fragmentation. This also ensures that in an event that one of the segment collapses, the other one is not affected. The flow of information is therefore not affected.

Malicious attack on the storage segments differ depending on the level of attack. If the attack was mild, the information can be transferred to external sources before a complete failure of such segments. If a severe attack occurs, the disk may fail completely. Information can be recovered in good time before a complete loss of data. This happens when there a large disk system within the storage locations.

Data recovery operations may incorporate a series of forceful booting in the event that a severe attack occurs. The storage disks which have been corrupted are subjected to forceful booting. This process slows down the rate of erasing data. In the process some of information is slowly retrieved as the dead segments comes alive.




About the Author:



No comments:

Post a Comment