An Analysis Of Data Recovery

By Angela Briggs


Different pieces of information may be lost when a computer system fails. The system fails as a result of a number of attacks. The attacks may occur when a system get infected by various malicious programs. This corrupts the disk storage applications leading to loss of information in such locations. Data recovery activities are aimed at salvaging the information in the corrupted disk segments. A number of approaches may be used in such a case.

A computer system is made up of many components. The hardware components comprises of all the tangible elements within a system. These are interlinked with each other. The software element provides a platform of running the computer. The programs installed within a system are used for running various operations. The instructions issued are interpreted and then executed leading to a number of operations.

The operating system is the main application within a computer system. It controls all the running applications and defines the memory allocation for each of these programs. It offers a communication interface between the hardware, software and the end-users. The interfaces ensure that there is a good flow of information between different points. The memory allocation ensures that there is no conflict in running of different applications.

Conflicting instruction may be sometimes issued. This happens when the same memory segment is allocated to a number of computer elements. This result in freezing of applications may cause a failure in the storage locations if it is severe. Malicious applications may also launch an attack on the main memory. This corrupts the memory. A series of harmful instruction may be given to storage locations such that a failure may also occur. This ends up corrupting the information stored here.

Program and application installation is very critical in memory and application management. The programs are installed systematically in such a way that the critical files are installed first then followed by other applications. The large disk applications are used ion management of storage locations. The large disk system ensures that there are primary and secondary disks. The primary disks are used for holding the temporary information being processed after which this information is transferred to the secondary storage locations.

Fragmentation of the primary and secondary storage location is very critical in information management. The fragmentation partitions the disks into a number of independent segments. Each is accessed in a different way. Management is eased through disk fragmentation. This also ensures that in an event that one of the segment collapses, the other one is not affected. The flow of information is therefore not affected.

The malicious applications that infect the computer systems results in different types of damages. Mild attacks by worms and back doors result in a slowed down system. The operating system may detect this and initiate a procedure of transferring information from such locations. A severe attack may corrupt a system entirely in such a way that pieces of data may get lost. External sources of information are often used for backups when salvaging information.

Data recovery may be approached in a different way in an event of a complete failure. The failed disks may be subjected to a forceful rebooting in such a case. This forces the booting applications to start. This takes place slowly. As the disks slowly comes to life, the information is carefully mined form the dead disk segments.




About the Author:



No comments:

Post a Comment