Knowledge base

Whether you are just getting acquainted with data recovery or want to immerse yourself into the nuances of this process, here you can find explanations on most questions related to this topic: how files are stored on different digital media, what may cause their loss, what the chances are to restore them and how you can do that without risks. Also, you can gain an insight into data recovery software, learn to make the right choice of tools and apply them properly in various scenarios.

Storage technologies

The basics of Intel Optane technology

Intel Optane isn’t something frequently encountered in day-to-day experience. And though it has been around for the last few years, the technology still raises questions among a whole lot of users. Marketed as bridging the gap between RAM and solid-state storage, it may have fundamentally different specifics, depending on the actual implementation.

Time to read: 8 min

What is eCryptfs and how does it work?

Nowadays, as cyberattacks become ever more frequent, people spare no effort to secure their confidential data. And the Linux platform offers a variety of tools that keep it safe from prying eyes with the help of encryption.

Time to read: 4 min

What is a WD My Cloud Home volume?

Nowadays, almost everybody has an abundance of digital files they want to keep safe and, preferably, always within reach. For this, some choose the traditional time-tested methods of storing data, like the computer’s local hard drives or portable USB sticks, while others go online and use cloud solutions. One of the existing alternatives to both is building a personal cloud storage network in the house or office.

Time to read: 4 min

What is BitLocker and how does it work?

Keeping sensitive files on a digital data storage always entails a risk that, at some point, they might fall into the wrong hands. In view of the constant threats associated with gadgets, especially with portable ones, like laptops or USB sticks, developers are seeking to provide their users with peace of mind by introducing diverse security measures. The Windows OS, on its part, offers BitLocker, which has become a common choice for individuals and businesses looking for strong protection of their data "at rest". Here you can find an overall explanation of this feature.

Time to read: 7 min

What is APFS encryption and how does it work?

A random person getting their sticky hands on our confidential files is not something we would like to expect. However, Mac users can rest easy in this regard. As one of the most secure platforms, macOS provides a simple way to protect this information from intruders. The native capability of APFS, the Mac’s standard file system, allows encrypting the content of a drive, making it impossible for unauthorized parties to access the locked storage. Here you can learn more about this feature and find out how it works.

Time to read: 6 min

What is LUKS and how does it work?

When sensitive information is available on any computer storage, certain measures have to be taken to keep it away from the prying eyes. And instead of just putting it behind an average password, one can convert this data into unreadable text, so that only an authorized person could decipher it and read the original content. This method of protection is widely known as encryption. On Linux, it can be implemented through LUKS, the kernel’s standard solution serving to encrypt entire disks. Let’s look closer at this technology and its working principles.

Time to read: 5 min