Description of the errors detected by TIP.EXE
In the case when the drive is absolutely unable to access any of the four Z-tracks of the cartridge, it gives a message about the failure of the Z-tracks. In…

Continue reading →

Can I recover information myself?
Of course, in simple cases this is possible. Accidentally destroyed files are recovered by common utilities, usually without any problems. This can be done even by poorly trained users -…

Continue reading →

Zip Drive Frequently Asked Questions
What are the models of Zip drives? Currently, there are 2 main types of Zip drives: Zip-100 (100 MB removable disk capacity) and Zip-250 (250 MB removable disk capacity). Zip-100…

Continue reading →

Can I recover information myself?

Of course, in simple cases this is possible. Accidentally destroyed files are recovered by common utilities, usually without any problems. This can be done even by poorly trained users – “dummies”. But quite serious knowledge of the file system and some skills are still necessary. The main thing is to have a good idea of ​​the possible consequences of your actions.

How is information recovered in difficult cases? The full recovery technology, of course, cannot be summarized in the brief volume of our article. It is based on the use of special technological equipment and programs, on routine manual labor and requires a lot of experience and constant research. In severe cases, the only method remains to analyze the contents of the hard drive and to logically compare the sequence of clusters that may belong to one or another file. Do not try to do it yourself! Such work requires a lot of experience and good knowledge of all the features of the file system.

Even in the conditions of a service center with the necessary equipment and experienced personnel, approximately 92% of disks are restored completely and without delay. The rest are considered “problematic.” By “problematic” we mean disks, information recovery on which is possible (sometimes, however, not in full), but requires additional time costs. In 9 cases out of 10, the number of “problematic” discs included disks on which attempts were made to restore information by the user himself. Information recovery on such disks requires a lot of time and costs the computer owner much more. The remaining “problem” disks are those that have very strong fragmentation, there are many lost and confused chains of clusters and many other defects.

What conclusions can be drawn from these facts?

findings
The main conclusion: you need to care about your computer no less than about your beloved dog or cat. Regularly (before the misfortune happened, and by no means after!) It is necessary to check the status of the disk with the built-in ScanDisk utility (“disk check” in the Russian version of Windows 95). More often defragment your hard drive. Scan your computer for viruses. It is better to set automatic protection (for example, Norton AntiVirus or AntiViral ToolKit). Also make sure that your favorite computer always has the latest version of the antivirus program. Do not install programs of dubious origin. Turn off the computer only through “shutdown” in the “start” menu. Make backups of what you do not want to lose forever. Believe me, feeling a good attitude towards yourself, the computer will not let you down in difficult times. Even if he “dies” from a virus, he can be brought back to life.

The Iron Problem of 2000
The 2000 issue is already becoming a hot topic. Moreover, a little more than 200 days remain before its onset. The point is that, for a number of reasons, in…

...

The Taming of the Shrew CIH
More recently, on April 26, we witnessed the massive destruction of computers (the destruction of CMOS content) and the destruction of information on hard drives. The blow to the pocket…

...

What is worse than the "golden" wheels?
The prerequisites for the fact that the “golden” discs are worse than the “aluminum” ones are laid down in the recording technology itself. Standards for compact discs provide that the…

...

Viruses are serious, and Win95.CIH is not alone
Currently, there are quite a few viruses that destroy the contents of CMOS. For example, the stealth virus FindMe (stealth virus - “invisible virus”, like the stealth bomber), the destructive…

...