In this article, we are going to address the very common and troublesome issue of the damaged Service Area (SA) on Hitachi drives. We will show you a method of Hitachi IBM repair (for NOT ARMED drives).
ATTENTION! This solution requires patience and good PC-3000 knowledge. If you are not sure in your skills, please contact our TS! Also, please note, that all the actions would be useless in case of radial scratches.
Hello, Friends! Today we are proud to present you the long-awaited solution to the very disturbing issue of recovering data from locked Seagate F3 Rosewood HDDs. The latest PC-3000 v.6.3.12 update brings you the ability to repair damaged Rosewood hard drives and extract data from them. In this article, we will show you how to access the Service and User Areas of your locked patient device in a few clicks.
Attention! Special Restrictions! Due to the fact that the FW has particular features, we strongly recommend that you do not apply Recount translator commands (both, ATA or terminal), Clear G-list, Reset S.M.A.R.T and spare heads in ROM commands. This will clear Media Cache and you might lose user data forever.
In this article, we will demonstrate using Data Extractor to identify encryption key location in the Macintosh system encrypted with FileVault. We will also share some tips and techniques for using Data Extractor for maximum effectiveness. For a basic introduction to the FileVault option, please refer to the Introducing.
Hello Friends! All of us facing the problem during the work with Western Digital drives, when some of the important modules are damaged, and system heads can write, but the Service Area is full of bad sectors and it’s impossible to change the location of bad module because of that.
In this short article we will see how to fix module 31 using the Dir Editor in PC-3000 Marvell utility even if we can’t move the translator to another place in SA.
Many of you have encountered Hitachi HCCxxxx locked drives which were previously used in DVR. Those HDDs have different label with Elsil logo which is pasted above original Hitachi. If you connect such drive to PC it won’t be recognised via standart device manager…
Now we want to consider one of such examples and explain how to return it to normal conditions.
A lot of times PC-3000 owners asked us about sharing step-by-step guide.
One of the often problems on Seagate F3 architecture drives is a Translator problem.
Usually we try to regenerate Translator automatically (by Translator regeneration and Recovery translator procedures).
Basically case can be solved successfully and get an access to whole user area, but sometimes utility can’t hide a defects in to NRG-list properly as result we have a particualar access to the user area (from LBA0 till someone in the middle).
In this article we would like to describe how to hide defects manually, regenerate a translator and get an access to whole user area.
During the Prague monolith meetup in March 2017 ACE Lab announced a new Spider Board adapter for convenient monolith reading. In this article we are going to describe the main features of this adapter and show example of MicroSD reading.
PC-3000 Flash Spider BoardAdapter is a universal solution for safe monolith recovery without tedious soldering! Using it you don’t need specific adapters to each monolith you deal with.
It is designed for connection to internal contacts of NAND-based Flash drives manufactured as single-package chips (monoliths). The adapter consists of 25 universal contacts that support software configuration of their association with NAND interface signals in a corresponding task. Please note, that the adapter is supported by PC-3000 Flash Reader 4.0 only.
Watch the video below to have a complete overview of Spider Board adapter and example of MicroSD reading process:
You know that we are living in the world where PCs can be infected with malware. The best-known example is WannaCry which infected many computers in different countries of the world. However, there are many other malware worms which execute on a system and target computer running.
Usually, malware exploits a vulnerability in Microsoft Windows operation system where the NTFS file system is used in most cases. So we would like to give couple examples how Data Extractor can recover NTFS partition which was a target of malware attack.
Hello Friends! We all know that new Western Digital 2,5″ drives have some differences in their FW, so the common solutions don’t work for these drives. In this article we will learn how to bypass the error when the drive can’t read it’s own Service Area due to a special SED issue.