Computer Science
Currently Browsing: Business

All About Hard Drive Platters

Looking to store all your memories and information safely on your hard drive? It isn’t a dependable solution over the longer term – even the best hard drives are known to fail with time. While the SSD’s today can help make your informatin stay secure over a longer period of time, it wasn’t so easy even a decade back.

 

Back then, when everyone used hard drives, they needed to know about hard drive platters – which actually could determine how sturdy your hard drive is.

 

What Is a Hard Drive Platter?

Every computer hard disk drive consists of one or more disks that are coated in a magnetic media. These disks permanently store your computer’s data. These disks are called Hard Disk Platters or Hard Drive Platters. They are usually made of aluminium, ceramic or glass. When your computer is turned on, the Hard Disk platters rotate extremely fast, defined by your hard drive model’s speed (measured in RPM)Some hard drives are configured for 5600 RPM, some are configured for 7200 RPM and there are also some which go faster. As these platters rotate, the read/write head of the hard drive gains access to the information on the platters. Each platter consists of cylinders, tracks and sectors which help it store and fetch data.

 

How many Platters does a Hard Drive usually contain?

The quantity of platters on a hard drive usually depends on the physical size of the drive, its storage capacity and manufacturer quality. There really isn’t any fixed number of platters on any computer hard drive. Most modern hard drives have at least two or more platters. Some computers have an SSD (Solid-State-Drive), which is a different, more advanced storage drive that does not contain any platters.

platter damage

What are Platters Made of?

Most modern Hard Drive Platters are made of Glass. Older drives used to be made of materials like aluminium or ceramic, but as hard drive technology advanced, most manufacturers switched to glass platters. There are several reasons manufacturers started looking for alternatives to aluminium, like glass, glass composites and magnesium alloys. The following benefits can be observed from using glass platters:

Better Quality: The main reason manufacturers switched to glass was the superior quality of it. Glass platters are significantly smoother and flatter than aluminium platters.This affects how dependable a hard drive can be while also increasing file transfer rates.

Better Rigidity: Despite being the same weight as aluminium, glass platters are significantly more rigid than aluminium platters. This reduces the noise your computer’s hard drive makes while it is being used and also reduces the vibrations on high speed hard drives.

Thinner Platters: The enhanced rigidity of the glass platters means that they can be made thinner. These thinner platters also weigh less, reducing the total weight of the hard drive require lesser capacity spindle motors and also make room for an increased number of platters to be placed on the hard drive. This increases the speed at which data can be accessed from the platters, increasing the overall speed of your computer’s operation in the process.

Thermal Consistency: Aluminium expands as it heats up and while glass is capable of the same, it expands at a much slower rate. There are a few platters which consist of over 35,000 tracks and even the slightest of expansion can cause these tracks to move around faster. Hard drives have a servo mechanism that keeps control over the expansions and contractions. It is still preferable to use material that moves as less as possible to improve the efficiency of the hard drive.

Information has been obtain as cutesy from the following source: Data Analyzers Data Recovery and Wikipedia

How Does a Platter Based Hard Drive Work?

The data stored on your computer hard drive is made of magnetic patterns, stored in a thin media layer on the surface of the platters. The material that your platter is made up of is known as “substrate” which basically supports the layer of media.

 

Once a computer is turned on and being used, the platters start to spin along with read/write heads that are placed just above them. It is imperative that the surface of these platters be as smooth as possible. Older hard drives with slower spindles had plenty of fly height so the quality of the surface of the platters didn’t matter as much.

 

But as technology developed over time, the gap between the platter and the heads continued to decrease, therefore increasing the spin rate (which speeds up the file transfer process), calling for a level of consistency in the quality of the platter’s surface. This is one of the main reasons manufacturers switched to glass plattered hard drives.

 

Are there any disadvantages to Glass Platters?

Glass platters, while now considered the norm in modern hard drives do have their own disadvantages. For one, they’re far more fragile than Aluminium platters which means they have a tendency to get damaged if pushed too hard from the user trying to get better performance out of it. For this reason, manufacturers have been experimenting with other materials as well, like ceramic and some glass composites.

 

Eventually Phased Out

With the arrival of SSDs, the use of Hard Drives has started to decrease. Several modern laptops are sold with SSDs. These SSDs boast of significantly faster file transfer rates at the expense of storage space. They are also much smaller but as more and more developments are being made, higher capacity SSDs are being invented and installed onto computers.

 

Eventually, these SSDs will lead to Hard Drives being phased out as they are now considered obsolete compared to SSDs which are being looked upon as the storage devices of the future. SSDs are drives which do not use any platters so the manufacturing process of Hard Disk platters will also cease in a few years time.

 

 


How to Prevent Ransomware

Ransomware is malicious software that blocks access to the system of a computer. To be able to unlock it, you will be required to pay a certain amount of money through a transfer. Numerous people around the globe have fallen victims of ransomware, but thankfully, there are things that can be done to alleviate this matter.

Update Your System

Many people tend to forget to update their system, but this is extremely important to conduct to avoid ransomware from taking place, as well as other negative elements. Today’s cyberattack seems to have come from a bug in Microsoft’s Windows operating system that was solved with the upgrade to the latest version. It is recommended to update the systems to the latest version as reported by the manufacturer on its website.

Don’t Open Attachments from Unknown Users

If you noticed that there is an attachment from an unknown in your inbox, do not commit the wrongdoing of opening like most people tend to do. Instead, you should opt to delete it. If you stop and think about it, it is better to prevent than lament. Via email is how a lot of scammers like to spread the virus and thus make more money.

Likewise, even if they come from known users, always be careful when downloading attachments. Unless you are completely sure of what you are downloading, do not do it or you could put your computer’s privacy in danger.

Don’t Reply to Unknown Individuals

If you receive a suspicious email, delete it completely. Do not opt to reply, as this could only result in you becoming a victim of ransomware in a short period of time.

Don’t Click on Unknown Links

It’s important that you do not click on any links that you suspect. The latest known scam that infected a smartphone of a particular social media user came from a Netflix offering. In that case, it was not ransomware, although it could have been.

Ransomware Notification

The ransomware manifests itself when the damage is already done—when the information has been blocked. A message is displayed on the screen warning you about this and asking for ransom for release.

Do not pay under any circumstance. Paying does not guarantee that you will have access to the data again. If you pay, it is possible that you will be subject to attacks again, since the cybercriminals know that you are willing to pay.

The future of ransomware is not known. Yes, there are ways that you can report the crime, but this crime continues to affect many people on a daily basis. It seems that the only way that it can come to a complete halt is if PC users start to become wiser on the matter so that they don’t easily fall for it.

Take the Proper Precautions

The previously mentioned tips can greatly aid you in never becoming a ransomware victim like so many people have unfortunately already been. From now on, you should put them to practice, as this type of scam is getting stronger than ever. Scammers are finding new ways to get into people’s systems, and thus you should take the proper precautions.


DATA RECOVERY 101

INTRODUCTION

The loss of data can be due to various reasons such as hard drive failure, damage or its corruption, accidentally deleting the wrong files and also formatting gone wrong. However, this process is reversible through data recovery. In most extreme cases such as that of a hard drive recovered from plane crash, data recovery is more complicated than when the information is lost through a simple power outage. Data recovery is process of information retrieval .It basically means trying to salvage the information that has been lost by all means.

 

DISCUSSION

The process of successfully recovering data from a hard drive or a computer can be in 2 categories i.e. logical damage and mechanical damage. These two categories are named after the type of damaged that has occurred on the data.

Logical recovery of data- This is whereby the software has been damaged and the data is not readable. The software refers to the file system or the partition table. The logical data damage is usually caused by: an error by the user i.e. through deletion or accidentally formatting the data, the corruption in the operation system, power loss occurring suddenly, viruses, updates in the operating system especially those done automatically, malware and mechanical failure. Data rescue is the best for logical data recovery.

Physical data recovery -It is also known as mechanical data recovery. It is mostly performed when there is an electronic failure or internally damaged hardware. The symptoms include: clicking noise, beeping noise, buzzing noise, dead hard drive, hard drive not detected or recognized, no power to the hard drive, a slow computer and scraping noises. It is usually due to the machine or device falling, improper storage or handling of the machine, damaged hard drive from the manufacturer, power surges, liquid damage, fire damage and inadequate or poor ventilation in a room. In physical data recovery it is necessary to repair the drive so that information can be recovered from it.

 

CONCLUSION

The technique used in the data recovery depends on how the data was lost for example through file deletion or file corruption. It should be noted that if the hard drive has been physically damage the process of data recovery is complicated and requires a professional specialist. Although the process may prove to be costly at times , it is worth it and the best results are delivered at the end.

 

 

 


5 Tips About Cyber Security You Should Know

In this modern, tech-savvy age, computers are a necessity of most people’s daily lives. People use them to help manage finances, organize our schedules, do online banking, pay bills via the Internet, shop on wholesale or auction sites, etc. In many instances, people even work from home on either a full-time or part-time basis. While there are certainly many advantages to computers and technology, there are also pitfalls that users should be aware of and prepared to combat. Namely, people who use computers on a regular basis, particularly those who employ it as a lifeline and/or means of their livelihood, must be knowledgeable about cyber security and the threats that exist over the Internet. That being said, here are 5 tips about cyber security you should know.

 

  1. Passwords Are Necessary–You would think this goes without saying, but it is surprising how often this tip is neglected by those who are technology novices. Just as you would not leave private or confidential documents laying out for prying eyes, it is equally important to safeguard the information stored on your computer in a safe manner.

 

  1. Be on Your Guard–Make sure you have basic protections in place before going online for the first time. You should have a firewall and some sort of anti-virus software protection right out of the gate. Even if it is a free version or trial period software to start, you can purchase additional software and/or malware protection down the road. The point is, do not go online without safeguards in place.

 

  1. Run Scans and Updates–Security scans and updates are important. You should set your computer for automatic updates and allow them to run regularly. You should also run full system scans frequently to safeguard against spyware, viruses, and other forms of malware.

 

  1. Strong Passwords Are Important–Make certain you are choosing strong passwords with numbers, letters, and special characters if possible. Not all sites or interfaces will allow the inclusion of special characters for passwords, but it is important for added protection. It is also important to create a password, code, and/or an acronym that is easy for you to remember. You should also create different passwords for each important account and change your passwords regularly.

 

  1. Backup as a Lifeline–The importance of backing up your computer on a regular basis cannot be overstated. It can safeguard your system from the hackers and identity thieves who might want to steal your data. You should prepare at least 6 months of backup data and make sure the information can be retrieved if needed. Consider it a lifeline because, in technology terms, it literally is your lifeline and safety net.

 

In this hustle, bustle world, things can get away from us without even realizing it. When it comes to your personal information, however, it is very important that you take precautions to prevent that from happening. With that in mind, the 5 tips about cyber security presented about are ones you should know and follow.


Hiring Computer Forensics

Today, computer forensics is a developing field with plenty of practical uses. Some privately owned businesses utilize digital agents. The administrations of these experts may likewise be required by enterprises who have encountered security breaks or lawyers who are getting ready for cases.Experts who work in PC forensics typically should be confirmed in a few distinct ranges and they ought to have an inclination for various sorts of programming. To get workforce who can split PC related wrongdoings, managers may look for Microsoft frameworks design affirmation, the culmination of the Encase affirmation program, as well as information in Solo-3 and Helix programming and Logicube equipment. When you require the administrations of a PC forensics pro, don’t be hesitant to look around.

Tips for Hiring Computer Forensics

There are an expanding number of individuals who can claim to be specialists in the field. Look precisely at the level of experience of the people included, not only the organization. There is significantly more to legitimate PC forensic examination than the capacity to recover information, particularly when a case could go to court. The main issue is you will hold the administrations of a person who will probably be called to affirm in court to clarify what he or she did to the PC and its information.

The court will need to find out about that individual’s own level of preparing and experience, not the experience of their manager.The experience ought to be particularly in PC forensics, not simply in software engineering or data innovation, as aptitude with PCs does not really mean forensic ability. Ensure you discover somebody who has the mastery and experience, as well as one who will face the investigation and weight of round of questioning with their head held up. Converse with references who have seen the individual affirming in court or potentially affidavits.


« Previous Entries