• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
20 Feb

Chinese Spyware Pre-Installed on All Samsung Phones (& Tablets)

Chinese Spyware Pre-Installed on All Samsung Phones (& Tablets)

The reddit user throws light on the Samsung’s involvement with Qihoo 360,

I know the title is rather sensational, however it couldn’t get any closer to the truth.

For those who are too busy to read the whole post, here’s the TL;DR version: The storage scanner in the Device Care section is made by a super shady Chinese data-mining/antivirus company called Qihoo 360. It comes pre-installed on your Samsung phone or tablet, communicates with Chinese servers, and you CANNOT REMOVE it (unless using ADB or other means).

This is by no means signaling hate toward Samsung. I have ordered the Galaxy S10+ once it’s available in my region and I’m very happy with it. I have been a long time lurker on r/samsung and r/galaxys10 reading tips and tricks about my phone. However, I want to detail my point of view on this situation.

For those who don’t know, there’s a Device Care function in Settings. For me, it’s very useful for optimizing my battery usage and I believe most users have a positive feedback about this addition that Samsung has put in our devices. With that being said, I want to go into details regarding the storage cleaner inside Device Care.

If you go inside the Storage section of Device Care, you’ll see a very tiny printed line “powered by 360”. Those in the west may not be familiar with this company, but it’s a very shady company from China that has utilized many dirty tricks to attempt getting a larger market share. Its antivirus (for PC) is so notorious that it has garnered a meme status in China, Hong Kong, Taiwan and other Chinese speaking countries’ Internet communities. For example, 360 Antivirus on PC would ACTIVELY search for and mark other competitors’ products as a threat and remove them. Others include force installation of 360’s browser bars, using misleading advertisements (e.g. those ‘YOUR DEVICE HAS 2 VIRUSES, DOWNLOAD OUR APP TO SCAN NOW’ ads). These tactics has even got the attention of the Chinese government, and several court cases has already been opened in China to address 360’s terrible business deeds. (On the Chinese version of Wikipedia you can read further about the long list of their terrible misconducts, but there’s already many on its English Wikipedia page: https://en.wikipedia.org/wiki/Qihoo_360).

If the company’s ethics are not troublesome enough, let me introduce you to the ‘Spyware’ allegation I made in the title. A news report from the Chinese government’s mouthpiece ChinaDaily back in 2017 reveals 360’s plan to partner up with the government to provide more big data insights. In another Taiwanese news report back in 2014, 360’s executive even admits that 360 would hand the data over to the Chinese government whenever he is asked to in an interview (https://www.ithome.com.tw/news/89998). The Storage scanner on your phone have full access to all your personal data (since it’s part of the system), and by Chinese laws and regulations, would send these data to the government when required.

With that in mind, for those who know intermediate computer networking, I setup a testing environment on my laptop with Wireshark trying to capture the packets and see what domains my phone are talking to. I head over to Device Care’s storage section and tapped update database (this manual update function seems to be missing from One UI 2.0), and voila, I immediately saw my phone communicating to many Chinese servers (including 360 [dot] cn, wshifen [dot] com). I have collected the packets and import them into NetworkMiner, here’s the screenshot of the domains: https://imgur.com/EtfInqv. Unfortunately I wasn’t able to parse what exactly was transferred to the servers, since it would require me to do a man in a middle attack on my phone which required root access (and rooting seemed to be impossible on my Snapdragon variant). If you have a deeper knowledge about how to parse the encrypted packets, please let me know.

Some may say that it’s paranoia, but please think about it. Being the digital dictatorship that is the Chinese government, it can force 360 to push an update to the storage scanner and scan for files that are against their sentiment, marking these users on their “Big Data platform”, and then swiftly remove all traces through another update. OnePlus has already done something similar by pushing a sketchy Clipboard Capturer to beta versions of Oxygen OS (which compared clipboard contents to a ‘badword’ list), and just call it a mistake later. Since it’s close source, we may really know what’s being transmitted to the said servers. Maybe it was simply contacting the servers for updates and sending none of our personal data, but this may change anytime (considering 360’s notorious history).

I discovered that the Device Care could not even be disabled in Settings. I went ahead and bought an app called PD MDM (not available on Play Store) and it can disable builtin packages without root (by abusing Samsung’s Knox mechanism, I assume). However I suffered a great battery performance loss by disabling the package, since the battery optimizer is also disabled too.

After a bit of digging, the storage cleaning in Device Care seemed to be present for a long time, but I’m not sure since which version of Android. It previously seemed to be handled by another sketchy Chinese company called JinShan (but that’s another story), but got replaced by 360 recently.

Personally, I’m extremely disappointed in Samsung’s business decision. I didn’t know about 360 software’s presence on my phone until I bought it, and no information was ever mentioned about 360 in the initial Setup screen. I could have opted for a OnePlus or Xiaomi with the same specs and spending much less money, but I chose Samsung for its premium build quality, and of course, less involvement from the Chinese government. We, as consumers, paid a premium on our devices, but why are we exposed to the same privacy threats rampant on Chinese phone brands? I get it that Samsung somehow has to monetize their devices with partnerships, but please, partner with a much more reputable company. Even Chinese’s Internet users show a great distrust about the Qihoo 360 company, how can we trust this shady and sketchy company’s software running on our devices?

This is not about politics, and for those who say ‘USA is doing the same, why aren’t you triggered?’, I want to clarify that, no, if the same type of behavior is observed on USA companies, I will be equally upset. As for those who have the “nothing to hide” mentality, you can buy a Chinese phone brand anytime you like. That is your choice. We choose Samsung because we believe it stand by its values, but this is a clear violation of this kind of trust.

If you share the same concern, please, let our voices be heard by Samsung. I love Reddit and I believe it’s a great way to get the community’s attention about this issue. Our personal data is at great risk.
To Samsung, if you’re reading this, please 1.) Partner with an entirely different company or 2.) At least make the Storage scanner optional for us. We really like your devices, please give us a reason to continue buying them.

Temporary Solution and Concern to note also.

Just in case in all the apps you’ve downloaded you spot ads , please note  also the developers of those apps are sharing and selling your data as part of adverts, nothing personal so to speak but those terms and conditions we all ignore to read before installing or are made difficult to locate where the links are. This is what screws everyone for ignoring them. Please read and know what you are bound to or about to give conceit for them to access.

The authorized system tracks or monitor your browser history, apps, the  music you listen or even stuff you normally buy on Amazon, eBay or even in google and to make matters worse triangulate your location. Well this is the future of A.I for big data being sold shared and sold out by the giants.

Solution: As a temporary solution, change all your settings for your apps, clear your browser’s history, daily clean all your cache’s out, delete apps you don’t use or need. Please read the terms before installing. This will minimize your exposure.

Contact us now:

Call now 0711 051 000. We are the Data recovery Experts in Kenya and Africa.  We also do digital forensics.
Do not Suffer in Silence we can help.  We are located at Chiromo Court 3rd floor Nairobi Kenya.

 

This blog is Courtesy of Reddit.com

Share this
05 Feb

Free Data data recovery software

Free Data data recovery software

Most people when they are facing Data Loss the first thing they do is search for Free Data data recovery software. I wish to warn you that this tools may work or not, and heavily rely on expert skills , East African Data Handlers are the Best Data Recovery Company in Kenya and Africa . The Danger of  trying to do it by yourself are , you may damage your device or even corrupt the lost data never to recover it.
Before  you start searching for this questions:
1) data recovery software free download
2) data recovery software for windows 7
3) recuva data recovery software
4) data recovery software for windows 10
5) best data recovery software
6) free unlimited data recovery software
7) data recovery software mac
8) deleted file recovery software free

Take a moment and ask yourself are you ready to gamble with your data recovery process, are you skilled enough to do the actual data recovery?   If you are at this state please Call now 0711 051 000 or visit www.datarecovery.co.ke .

Some Common Free Data data recovery software

Below is a list of some of  the Free Data data recovery software:   but the issue is, if you are not an expert you will damage your recovery process. Below are five most know

Five FREE Data Data Recovery Software
#1 – EaseUS Data Recovery Wizard: The Best to Easily Recover Files FAST.
#2 – MiniTool Power Data Recovery FREE – The Runner Up.
#3 – Disk Drill.
#4 – Recuva – Recover Anything From Anywhere.
#5 – UnDeleteMyFiles Pro.

Contact us now:

Call now 0711 051 000. We are the Data recovery Experts in Kenya and Africa.
Do not Suffer in Silence we can help.  We are located at Chiromo Court 3rd floor Nairobi Kenya.

Share this
04 Dec

Cyber Criminals Are Using YouTube To Install Cryptojacking Malware

Cyber Criminals Are Using YouTube To Install Cryptojacking Malware

 At East African Data Handlers we have discovered that the  Slovakian software security firm Eset  uncovered that cyber criminals  are behind Cryptojacking Malware, the Stantinko botnet which has been distributed as a Monero (XMR) cryptocurrency mining module via Youtube.

We wish to warn the public to be careful. Further research indicate that, On Nov. 26, the major antivirus software supplier Eset reported that the Stantinko botnet operators have expanded their criminal reach from click fraud, ad injection, social network fraud and password stealing attacks, into installing Cryptojacking Malware on victims’ devices using Youtube.

Stantinko botnet has been active since at least 2012

The Stantinko botnet, which has been active since at least 2012 and predominantly targets users in Russia, Ukraine, Belarus and Kazakhstan, reportedly uses YouTube channels to distribute its Cryptojacking Malware module, which mines the privacy-focused crypto coin Monero on the CPUs of unsuspecting victims.

This cryptocurrency-stealing malware has reportedly infected around 500,000 devices, and is similar to the recently discovered malicious malware, Dexphot, malware discovered by Microsoft that has already infected more than 80,000 computers.

These crypto-hijacking codes steal processing resources, take over legitimate system processes and disguise the nefarious activity with the ultimate goal of running a crypto miner on the infected devices.

Eset informed YouTube, which reportedly responded by removing all the channels that contained traces of Stantinko’s code.

Malware on Monero’s official website was stealing crypto

In November, Monero’s core development team said that the software available for download on Monero’s official website might have been compromised to steal cryptocurrency. A professional investigator going by the name of Serhack confirmed that the software distributed after the server was compromised was indeed malicious:

“I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downloaded the build yesterday around 6pm Pacific time.”

 Be warned of this trend that  is now slowly coming to Africa. 

Courtesy of https://cointelegraph.com/

NEED HELP?

We are proud to provide you with full Data Recovery Service and Malware investigation services coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
30 Nov

Cloud back up services in Kenya

Cloud back up services in Kenya

Are you looking for Cloud back up services in Kenya  or Cloud Back up Solution in Kenya ? By definition cloud backup is defined as a strategy of sending any copy of a virtual file or a physical or database to a secondary storage, all this is done to an off-site location that will help preserve in the event of an equipment failure or even a catastrophe. This is done in mind to protect data.

To explain a little bit more, this offsite location having the copy of the virtual file or the physical file which has all the database is stored to a secondary storage known as the cloud.  The process of restoring all the data through cloud computing of any information that was created, edited, managed is done remotely over the internet.

Do you know disaster can’t be planned and can strike any time?  A good example is when there is a malware attacks, ransomware attacks, system failure, power outage, floods, fire or even terrorist attacks denying your organization to access data and causes loss of the same data. If you’re organization has  subscribed to our cloud backup services, they will be able to recover their lost data the moment all the restoration functionality is activated which will rollback copies of  the files and the stored data to preferred latest choice of a valid backup performed earlier through a stable internet connection remotely.

At East African Data Handlers  depending on the type of data you have, you can select the optimal type of backup that is needed for your business; we heavily focus on any core business operations with our cost-effective, automated, reliable data storage and backup solution services that are powered by a Tier 3 data center.

To entice you more, we make sure that our data backup solution covers all and is not limited to only files and folders, backup network drives, MySQL databases, Microsoft exchange, Microsoft SQL Outlook Mail and Microsoft SQL.

Our 3 Approach to backup is either;

  • Differential backup
  • Full backup
  • Incremental backup

On a liter note, East African Data Handlers Cloud backup features are best designed in mind to have minimal intervention from our staff support as the dashboard is easy to manage hence save support cost.

Best Features for Cloud Backup Services

  • You Set it and no need to forget it: Our backup agent will do the backup process automatically the way you set your scheduled and submit accurate reports to your emails.
  • Secure and highly data encrypted End to end solution; We make sure your data is safely encrypted both during its motion and even at storage rest.
  • Compatibility merits with any Platform: Our backup agent is cross platform-independent. It can support Windows or Linux environments. You have less worries
  • Speed during deployment and data restoration: Our restoration process gets your systems in minutes to start running as a quick data recovery process. This helps to minimize the cost of downtime.
  • Surveillance is assured to be 24/7 monitoring services: Our team of experts work tireless to monitor all processes while enforcing data safety, it’s integrity and security.
  • After Sale Services and a Dedicated support system: Anytime you need disaster recovery needs done, you can count on us.

Why East African Data Handlers Cloud Back up Services?

  • It’s Safe
  • Fast
  • Simple  and Easy Scheduling Process
  • Quick and Simple Restore Process
  • Can support Group Policy

We Support : personal cloud backup, online backup comparison, , cloud backup solutions for small business, best cloud backup for mac, enterprise cloud backup and do sos online backup.

GET A QUOTE NOW:  Call +254 711 051 000

Share this
19 Nov

Data Recovery Services

Data Recovery Services

By definition a data recovery services is a service which is dedicated to the process of doing recovery of lost or any corrupted data. It entails salvaging of data that is either corrupted, damaged, inaccessible storage or failed media using the normal data methods to access and cannot be executed.

At East African Data Handlers we Offer :

  • NO Processing Fee, No Diagnosis Fee, NO Data No Charge

Our Data Recovery Service are :

Desktop Recovery
Laptop Recovery
Hard Drive Recovery
RAID Recovery
Server Recovery
Encrypted Data Recovery
Operating System Recovery
Digital Photo Recovery
Database Recovery
File Recovery
Forgotten Password Recovery
Ransomware Recovery Services
Server Recovery
Tape Recovery
Email Recovery
Mobile Phone Data Recovery Kenya
Computer Forensics Services

Some of the Causes of Data loss are.

 power loss.
 Human error.
 Logical or hardware failure.
 Natural disaster
 Viruses.

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Raid Recovery process.

What to do when experiencing Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
19 Nov

Data Recovery In Nairobi

Data Recovery In Nairobi

Are you looking for Data Recovery in Nairobi ? Are you stranded where to get this services. Do you know you can get this services at East African Data Handlers by just calling 0711 051 000 at a very affordable price.
Are you new in Nairobi? Do you know that Nairobi is Kenya’s capital city? In addition to it’s urban core, the city has Nairobi National Park, a large game reserve known for breeding endangered wild animals. It is also East Africa ICT HUB.
When talking of Data recovery services in Nairobi, East African Data Handlers is the best Company offering Data recovery Services. We Get our Cases from all over  Kenya.

Our Data Recovery Service are :

 Desktop Recovery
 Laptop Recovery
 Hard Drive Recovery
 RAID Recovery
 Server Recovery
 Encrypted Data Recovery
 Operating System Recovery
 Digital Photo Recovery
 Database Recovery
 File Recovery
 Forgotten Password Recovery
 Ransomware Recovery Services
 Server Recovery
 Tape Recovery
 Email Recovery
 Mobile Phone Data Recovery Kenya
 Computer Forensics Services

Some of the Causes of Data loss are.

 power loss.
 Human error.
 Logical or hardware failure.
 Natural disaster
 Viruses.

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Raid Recovery process.

What to do when experiencing Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

Share this
19 Nov

Kenya Data recovery

Kenya Data Recovery

What is Data recovery?

Kenya Data Recovery plays a big role in Kenya business industry to help companies resolve data disaster occurence. So, do you understand what it means to do data recovery?  Do you have lost data or have data files that are corrupted ? Are you looking for Data recovery  experts? Do you have raid drives and and  in urgent need of raid recovery?

Are you stranded looking for a reliable Data Recovery Experts company in Kenya, Dar es Salaam Tanzania , Kampala Uganda and  Kigali Rwanda? Do you know we also do  Data recovery Sudan

In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, formatted or corrupted data from secondary storage, data files or removable media, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid- state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystem, and other electronic devices.

Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevent it from being mounted by the most operating system (OS).

The most common data recovery scenario involves an operating system failure, malfunction of a storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged to another new drive. This can be easily accomplished using a live CD or DVD by booting directly from a ROM instead of the corrupted drive in question.

Many live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigate by disk partitioning and consistently storing valuable data files (or copies of them) on different partition from replaceable OS system files.

Another scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices.

Depending on the situation, solutions involve repairing the logical file system, partition or the master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery or corrupted data, hardware and software-based recovery of damaged service areas (also known as hard disk drives “firmware”), to hardware replacement on a physically damaged drive which allow for extraction of data files to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one time recovery, salvaging whatever data can be read.

The term “data recovery” is also used in the context of forensic applications, where data which has been encrypted or hidden, rather than damaged, are recovered. Sometimes data files present in the computer get encrypted or hidden due to reasons like virus attack which only be recovered by computer forensic experts.

Are you in Nairobi Kenya and Looking for recovery process by best Data Recovery Experts for services likeraid recovery,photo recovery, recovery kenya laptop recovery file recovery or have Storage media (storage devices )like flash drives , hard drive ( hard disk drives) and need to recover the data files call now East African Data Handlers.

Causes of Data loss in Kenya.

  • power loss.
  • Human error.
  • Logical or hardware failure.
  • Natural disaster
  • Viruses.

 

Evaluation.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the Data Loss and give a comprehensive diagnostic report of what we feel can be recovered. This helps the clients to make an informed decision when giving a go ahead for the Data Recovery process.

What to do when experiencing RAID Data Loss.

At East Africa Data Handlers LTD, we carry out an evaluation before doing any recovery of the RAID system and give a comprehensive diagnostic report of what we feel can be recovered. This helps.

Our Services

We are proud to provide you with full Data Recovery Service coverage to any part of Kenya; NairobiMombasaKisumu, Eldoret. Data Loss is only temporary and we prove it every day with the highest Hard Drive Recovery Success rate in Kenya. We Recover Data in Kenya from the Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

East African Data Handlers ltd no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Contact us now

If you’ve lost valuable, irreplaceable data — We can save it! Call us now at 0711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands

 

Share this
05 Nov

Data Recovery Kampala, Uganda Service

Data Recovery Kampala, Uganda Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Kampala, Uganda Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Uganda (Kampala, Nansana, Kira, Makindye/Ssabagabo, Mukono, Mbarara, Mukono, Gulu, Lugazi, Masaka, Kasese, Hoima, Lira, Mityana, Mubende, Masindi, Mbale, Jinja, Kitgum, Entebbe, Njeru ) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;
Hard Drives,
Network-Attached Storage (NAS),
Flash Drives and Solid State Drives
Mobile Phones,
Laptops,
SAS and SCSI Hard Drives,
Desktops,
Memory Cards,
Raid Systems,
Storage Area Network (SAN),
Tapes, Servers,
SAS and SCSI Hard Drives,

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Kampala, Uganda 

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
31 Oct

RAID Recovery in Kenya

RAID Recovery in Kenya

Are you looking for Raid Recovery in Uganda,  Raid Recovery in Kenya, Raid Recovery in Tanzania, Raid Recovery in Rwanda  do not struggle  East African Data Handlers we Recovers all types of corrupted RAID arrays.

Allow our Team of Experts to Recover data from corrupted RAID arrays with sophisticated tools. Our tools automatically detect the type of original RAID array that you have during RAID Recovery while allowing for fully manual operation.

Our RAID Recovery engineering team recover from all types of RAID arrays, whether hardware or software.

We Reconstruct all types of arrays just as easily as a single hard disk. Our Team of Experts know and can recognizes all imaginable configurations of various types of arrays, including RAID 0, 1, 0+1, 1+0, 1E, RAID 4, RAID 5, 50, 5EE, 5R, RAID 6, 60 and JBOD, no matter whether they are connected to a RAID server, a dedicated RAID controller or a RAID-enabled motherboard from NVidia®, Intel®, or VIA®.

Apple®, Linux® (NAS), Microsof® software RAIDs (also called Dynamic Disks) are also supported, including JBOD (span), RAID 0, 1, and 5 configurations, QNAP RAID, mdamd RAID. Product works with Adaptec®, HP®, Dell®, MegaRAID®, Silicon® RAID Controllers and DDF compatible devices. ZFS with RAIDZ are also supported. RAID Recovery™ works only under Windows but restores RAID that is running Mac OS, Unix, etc.

Step one is to detect the right type of an array

Our Team ensure they do this for vital and correct recovery process to start. They study the DiskInternals during the RAID Recovery process both manual and with the use of our fully automatic detection tools for essential parameters such as a type of array, type of RAID controller, stripe size, and disk order.

Step two is to assemble RAID configurations manually

We assemble RAID configurations manually via a simple drag-and-drop operation. Our Raid Recovery Tools re-constructs any array from the available hard disks and detects the right type and size or the array as well as the order of the disks automatically.

Special technical skills are required during this process to recover broken RAID arrays.

Our RAID Recovery Team gives our customers the best and top of the art method of Raid Data Recovery as a way to ensure all the data is recovered and the integrity maintained.

Be at peace knowing that our RAID Recovery method use advanced search algorithms to allow recovering important files such as documents, pictures, and multimedia even if there is a missing disk in the array, or if the file system is missing or damaged.

So if you are Located in Uganda we offer Uganda Raid Data Recovery.

Our stretch

 

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
08 May

Surge of MegaCortex Ransomware attacks detected

Surge of MegaCortex Ransomware attacks detected

A new strain named MegaCortex.

A cyber-security firm in the UK has reported detecting a spike in ransomware attacks at the end of last week from a new strain named MegaCortex. The firm said the MegaCortex ransomware appears to have been designed to target large enterprise networks as part of carefully planned targeted intrusions – a tactic that is known as “big-game hunting.” The modus operandi is not new and has been the preferred method of delivering ransomware for almost half a year.

MegaCortex now joins an ever-growing list of ransomware strains that cyber-criminal groups are using only in targeted attacks, rather than with spam or other mass deployment techniques. The list includes some recognizable names, such as Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga, and Matrix.

SUDDEN RISE OF ATTACKS THIS MONTH.

According to a report released late Friday night 3rd May 2019, MegaCortex was first spotted back in late January, when someone uploaded a sample on malware scanning service VirusTotal.

Since then, the number of attacks has been growing, but they spiked mid last week when the firm says it detected 47 attacks – accounting for two-thirds of all the 76 MegaCortex attacks the company has seen all year.

The firm says it blocked the attacks it detected, which originated from enterprise networks located in the United States, Canada, the Netherlands, Ireland, Italy, and France. However, other megacortex attacks might have occurred in other places where the UK antivirus vendor had no coverage.

 

 

Share this

© 2015  East African Data Handlers. All rights reserved.