From what media do you need to recover your data? Sherlock Data Recovery Services recovers from all types of storage media and platforms. Each section below presents the details on our services: from loss situations we recover from, the recovery process, price, time, types of service, to the technical capabilities we provide. Since 1987, Sherlock Data Recovery Services has defined the standard of excellence in the data recovery industry. We provide the finest and most innovative data recovery services available anywhere, at any price!
  • Sherlock Data Recovery Services has facilities in the United States and Canada.
  • We pioneered the concept of evaluations with our no data – no data recovery fee policy.
Our customer satisfaction level is second to none. Fully documented and audited statistics indicate satisfaction with our services, which is in excess of 95% for all customers (including those who decline our quote and even those cases where a recovery was not possible). Sherlock Data Recovery Services has many engineers, technicians, researchers, customer service reps and managers that are dedicated to a single goal: recovering your data as quickly, completely, and economically as possible. After all, we do not generate a single dollar of revenue, unless we successfully recover your data to your satisfaction.

Hard Drive Recovery

service thumbnail

Sherlock Data Recovery Services is a certified Seagate Data Recovery partner. We provide expert data recovery and computer repair services on all Apple OS file systems(Hierarchical File System (HFS)), Redhat Linux and slackware file systems( e.g ext2, ext3 ), Microsoft Windows NTFS and FAT file systems, and on all models of Seagate, Maxtor, Fujitsu, EMC, IBM, HP, Gateway, Hitachi, Quantum, ExcelStor, Prima International, Western Digital, Dell, Samsung, Compaq, HP, Sony and Toshiba and all other USB, Firewire, SATA, IDE and SCSI disk drives.


Examples of Data Loss Situations – Hard Disk Drives

Recovery from physical and logical damage due to mechanical and electrical failure, software corruption or human error.

  • Computer will not boot
  • Hard disk crashes
  • Accidental reformatting of partitions
  • Accidental deletion of data
  • Applications are unable to run or load data
  • Corrupted data
  • Fire and water damage or crushed
  • Hard disk component failures
  • Inaccessible drives and partitions
  • Virus
  • Media surface contamination and damage

Recovery Process

Each recovery case begins with a free evaluation in order to determine the potential for retrieval and to provide a firm price-quote for your review. The initial diagnosis determines whether the media is accessible to our lab equipment. If so, the first priority is to create a raw image of the data on Sherlock Data Recovery Services media. This is a way for the logical analysis to determine the nature of the situation. If the media is inaccessible, our facilities will test the components and closely examine its internal health to determine the extent of physical damage. Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment. We use specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets and drive motors.

Logical recovery uses the raw image by examining the low-level data sectors and determining what fixes on the filesystem structures are needed to get access to the important data. Sometimes the existing filesystem structures are missing or damaged, so much that the data has to be extracted directly from one or more fragments of the raw image.

Sherlock Data Recovery Services’ programmers have created a full set of software tools used by our experts to analyze, fix, and recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Turn-Around Data Recovery Time

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.


Call (800) 267-4712 or in New York (212) 249-9888 or in Pennsylvania (800) 267-4712

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Hard Drive Brands, Models and Interfaces Recovered From

Sherlock Data Recovery Services implements recovery on all hard drive brands, models and interfaces. What follows is a comprehensive list. If you have any questions, please do not hesitate to call. EIDE and IDE Hard Drives drives from all manufacturers including Western Digital, Seagate, Quantum, IBM, Maxtor, Toshiba, Fujitsu, Hitachi, Samsung, Conner, Micropolis, JTS, Digital, NEC, Compaq, Digital, Kalok, Fuji, Areal and JVC using 2.5″ laptop & 3.5″ Normal 40 pin ATA through to the UDMA6 interface. SCSI drives from all manufacturers including Seagate, Quantum, IBM, Western Digital, Fujitsu, Digital, Compaq, Hewlett-Packard, Micropolis, Maxtor, CDC, Imprimis, Conner, Epson, Rodime, Toshiba, Samsung, Hitachi and NEC using Normal SE, UW, Differential (WD), LVD, Hot Swappable (SCA) and 2.5″ laptop interfaces. Fibre Channel drives from Seagate and IBM with FC (1Gigabit Copper) interfaces. ESDI, RLL & ST/MFM drives from all manufacturers including Seagate, Western Digital, Conner, Fujitsu, Maxtor, Miniscribe, Quantum, Tandon, Fuji, Toshiba, IBM, Kalok, Micropolis, Priam, Microscience, Tandon, JTS, Kyocera, LaPine and Tulin.
MCA drives from IBM, Western Digital and Seagate with IBM ST-506 & ESDI and 2.5″ laptop ESDI interfaces.

PCMCIA Type I, II, III hard drives from IBM, Western Digital, Integral Peripherals and Procomm.
1.8″ ATA-5 drives from Toshiba and Hitachi
CF+ Type II IBM Microdrives


Operating Systems and File Systems We Recover From

Apple OS HFS file systems Intel Platforms Windows XP Professional and Home with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes.Windows 2000 Professional and Server with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes. Windows NT Workstation and Server with NTFS or FAT16 filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.

Windows ME, 98 / 95 with FAT32 or FAT16 filesystems.

MS-DOS and variants using 12 or 16 bit FAT filesystems.

Compressed volume managers including Stacker, DoubleSpace & DriveSpace.

OS/2 with FAT and HPFS filesystems.

Novell NetWare with FAT and NSS filesystems using standalone, spanned, striped or fault-tolerant important data. Sometimes the existing filesystem structures are missing or damaged so much that data has to be extracted directly from one or more fragments of the raw image. Sherlock Data Recovery Services Data Recovery programmers have created a full set of software tools used by our experts to analyze, fix and recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Call For a Free Quote

Turn-Around Data Recovery Time

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.


Call (800) 267-4712 or in New York (212) 249-9888 or in Pennsylvania (800) 267-4712

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Hard Drive Brands, Models and Interfaces Recovered From

Sherlock Data Recovery Services implements recovery on all hard drive brands, models and interfaces. What follows is a comprehensive list. If you have any questions, please do not hesitate to call. EIDE and IDE Hard Drives drives from all manufacturers including Western Digital, Seagate, Quantum, IBM, Maxtor, Toshiba, Fujitsu, Hitachi, Samsung, Conner, Micropolis, JTS, Digital, NEC, Compaq, Digital, Kalok, Fuji, Areal and JVC using 2.5″ laptop & 3.5″ Normal 40 pin ATA through to the UDMA6 interface. SCSI drives from all manufacturers including Seagate, Quantum, IBM, Western Digital, Fujitsu, Digital, Compaq, Hewlett-Packard, Micropolis, Maxtor, CDC, Imprimis, Conner, Epson, Rodime, Toshiba, Samsung, Hitachi and NEC using Normal SE, UW, Differential (WD), LVD, Hot Swappable (SCA) and 2.5″ laptop interfaces. Fibre Channel drives from Seagate and IBM with FC (1Gigabit Copper) interfaces.ESDI, RLL & ST/MFM drives from all manufacturers including Seagate, Western Digital, Conner, Fujitsu, Maxtor, Miniscribe, Quantum, Tandon, Fuji, Toshiba, IBM, Kalok, Micropolis, Priam, Microscience, Tandon, JTS, Kyocera, LaPine and Tulin.

MCA drives from IBM, Western Digital and Seagate with IBM ST-506 & ESDI and 2.5″ laptop ESDI interfaces.

PCMCIA Type I, II, III hard drives from IBM, Western Digital, Integral Peripherals and Procomm.

1.8″ ATA-5 drives from Toshiba and Hitachi

CF+ Type II IBM Microdrives


Operating Systems and File Systems We Recover From

Apple OS HFS file systems Intel Platforms Windows XP Professional and Home with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes. Windows 2000 Professional and Server with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes.Windows NT Workstation and Server with NTFS or FAT16 filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.

Windows ME, 98 / 95 with FAT32 or FAT16 filesystems.

MS-DOS and variants using 12 or 16 bit FAT filesystems.

Compressed volume managers including Stacker, DoubleSpace & DriveSpace.

OS/2 with FAT and HPFS filesystems.

Novell NetWare with FAT and NSS filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.

Unix Operating systems including:
SCO OpenServer and Xenix,
UnixWare from Novell and SCO,
Solaris,
Linux with ext2fs, xfs, reiserfs & jfs filesystems on standalone & RAID volumes,
BSD-based systems such as FreeBSD, OpenBSD and NetBSD, BSDI,
LynxOS,
QNX.

Non-Intel Platforms Apple Macintosh
OS 9 with HFS and HFS+ filesystems,
OS X with HFS, HFS+ and Unix ufs filesystems
All Macintosh hardware using SCSI, IDE & Firewire interfaces, including software RAID drivers such as SoftRaid & FWB Raid.
Unix Systems including:
Solaris on Sun/SPARC equipment, with ufs and Veritas VxFS filesystems
HPUX on Hewlett-Packard workstations with hfs and Veritas VxFS filesytems on standalone and LVM volumes,
IRIX on SGI workstations with efs and xfs filesystems,
equipment using ODS filesystems,
AIX on IBM RS/6000 with jfs filesystems on LVM volumes.
Legacy Systems:
VMS & OpenVMS running on HP/Compaq & DEC


Preserving your Warranty

Sherlock Data Recovery Services has established agreements with most manufacturers regarding preserving warranty during data recovery service. Please inquire whether or not your manufacturer is included in this agreement.

If the seals on a media must be broken in order to extract data, Sherlock Data Recovery Services will re-seal the media upon completion of service with a tamper resistant sticker, which the manufacturer will accept for warranty purposes. You will also receive an invoice receipt to indicate you have pursued data recovery services with Sherlock Data Recovery Services.

When in doubt, inquire with the manufacturer about keeping your warranty before pursuing data recovery.

Laptop Recovery

service thumbnail

Examples of Data Loss Situations For Blackberrys / PDAs / Laptops and Notebooks

Recovery from physical and logical damage due to mechanical and electrical failure, software corruption or human error.

  • Dropped Blackbery / PDA / notebook computer / Laptop- no longer turns on
  • Broken Screen
  • Broken Keypad
  • Inaccessible drives and partitions
  • Applications that are unable to run or load data
  • Corrupted data
  • Virus
  • Hard disk component failure
  • Hard disk crashes
  • Fire, water, coffee and other liquid damage
  • Media surface contamination and damage
  • Accidental reformatting of partitions
  • Accidental deletion of data

The Recovery Process of Blackberrys / PDAs / Laptops and Notebooks

Initial diagnosis determines whether the media is accessible to our equipment. If so, the first priority is to create a raw image of the data on Sherlock Data Recovery Services media so that logical analysis can determine the nature of the data loss situation. If the media is inaccessible our experts will test the components and closely examine its internal health to determine the extent of physical damage.

Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment and using specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets & drive motors.

Logical recovery uses the raw image by examining the low-level data sectors and determining what fixes to filesystem structures are needed to get access to the important data. Sometimes the existing filesystem structures are missing or damaged so much that data has to be extracted directly from one or more fragments of the raw image.

Sherlock Data Recovery Services Data Recovery programmers have created a full set of software tools used by our technicians to analyze, fix & recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Call For a Free Quote

Turn-Around Time On the Data Recovery of Blackberrys / Laptops / Computer Notebooksand PDAs

S

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.

Hard Drive Brands, Models and Interfaces

Sherlock Data Recovery Services services all hard drive brands, models and interfaces. What follows is a comprehensive list. If you have any questions, please do not hesitate to call.EIDE and IDE drives from all manufacturers including Western Digital, Seagate, Quantum, IBM, Maxtor, Toshiba, Fujitsu, Hitachi, Samsung, Conner, Micropolis, JTS, Digital, NEC, Compaq, Digital, Kalok, Fuji, Areal and JVC using 2.5″ laptop & 3.5″ Normal 40 pin ATA through to the UDMA6 interface.SCSI drives from all manufacturers including Seagate, Quantum, IBM, Western Digital, Fujitsu, Digital, Compaq, Hewlett-Packard, Micropolis, Maxtor, CDC, Imprimis, Conner, Epson, Rodime, Toshiba, Samsung, Hitachi and NEC using Normal SE, UW, Differential (WD), LVD, Hot Swappable (SCA) and 2.5″ laptop interfaces.
Fibre Channel drives from Seagate and IBM with FC (1Gigabit Copper) interfaces.
ESDI, RLL & ST/MFM drives from all manufacturers including Seagate, Western Digital, Conner, Fujitsu, Maxtor, Miniscribe, Quantum, Tandon, Fuji, Toshiba, IBM, Kalok, Micropolis, Priam, Microscience, Tandon, JTS, Kyocera, LaPine and Tulin.
MCA drives from IBM, Western Digital and Seagate with IBM ST-506 & ESDI and 2.5″ laptop ESDI interfaces.
PCMCIA Type I, II, III hard drives from IBM, Western Digital, Integral Peripherals and Procomm.
1.8″ ATA-5 drives from Toshiba and Hitachi
CF+ Type II IBM Microdrives

Apple Mac Recovery

service thumbnail

If you’ve lost your important data due to a hard drive crash, virus or any other malware, we can most likely restore that data like it was never erased. We provide the latest data recovery technique and capability in Apple data recovery, and we support both versions of the Hierarchical File System; HFS and HFS+. The same no data-no charge guarantee, which we offer on PC hard drives, also applies to Apple Mac, Powerbook and Xserve systems. Many companies say they can recover data from Apple computers, but most of them outsource their work. We actually utilize several different Apple recovery methods. A drive that can’t be recovered when using one method may be perfectly recoverable using another. We can recover data from any Apple computer, using just about any Apple Operating System (OS) including:

  • OS 8.0
  • OS 8.1
  • OS 8.5
  • OS 8.5.1
  • OS 8.6
  • OS 9.0
  • OS 9.0.2
  • OS 9.0.3
  • OS 9.0.4
  • OS 9.1
  • OS 9.2
  • OS 9.2.1
  • OS 9.2.2
  • OS X v10.0 (Cheetah)
  • OS X v10.1 (Puma)
  • OS X v10.2 (Jaguar)
  • OS X v10.3 (Panther)
  • OS X v10.4 (Tiger)
  • OS X v10.5 (Leopard)
apple-products-3

If your Apple hard drive or Xserve RAID disk has suffered a mechanical failure, there is still a good chance of recovering your data successfully. In most cases, a physically failed hard drive is a result of either an electronics failure or a head failure. We don’t get your drive functioning to the point that you could use it again, we simply get it operational so that we can pull a good image of the raw data contained on the drive. Once we have that image, we then perform our recovery operation and restore the data onto the media of your choice.


Recovery Process

apple-products-1
Each recovery case begins with a free evaluation in order to determine the potential for retrieval and to provide a firm price-quote for your review. The initial diagnosis determines whether the media is accessible to our lab equipment. If so, the first priority is to create a raw image of the data on Sherlock Data Recovery Services media. This is a way for the logical analysis to determine the nature of the situation. If the media is inaccessible, our facilities will test the components and closely examine its internal health to determine the extent of physical damage. Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment. We use specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets and drive motors.

Logical recovery uses the raw image by examining the low-level data sectors and determining what fixes on the filesystem structures are needed to get access to the important data. Sometimes the existing filesystem structures are missing or damaged, so much that the data has to be extracted directly from one or more fragments of the raw image.

Sherlock Data Recovery Services’ programmers have created a full set of software tools used by our experts to analyze, fix, and recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Call For a Free Quote

Turn-Around Data Recovery Time

apple-products-2
Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.

Call (800) 267-4712 or in New York (212) 249-9888 or in Pennsylvania (800) 267-4712

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Preserving your Warranty

Sherlock Data Recovery Services has established agreements with most manufacturers regarding preserving warranty during data recovery service. Please inquire whether or not your manufacturer is included in this agreement.

If the seals on a media must be broken in order to extract data, Sherlock Data Recovery Services will re-seal the media upon completion of service with a tamper resistant sticker, which the manufacturer will accept for warranty purposes. You will also receive an invoice receipt to indicate you have pursued data recovery services with Sherlock Data Recovery Services.

When in doubt, inquire with the manufacturer about keeping your warranty before pursuing data recovery.

Desktop Recovery

service thumbnail

Recovery from physical and logical damage due to mechanical and electrical failure, software corruption or human error.

  • Computer Desktop no longer turns on
  • Broken Screen
  • Inaccessible drives and partitions
  • Applications that are unable to run or load data
  • Corrupted data
  • Virus
  • Hard disk component failure
  • Hard disk crashes
  • Fire, water, coffee and other liquid damage
  • Media surface contamination and damage
  • Accidental reformatting of partitions
  • Accidental deletion of data

Initial diagnosis determines whether the media is accessible to our equipment. If so, the first priority is to create a raw image of the data on Sherlock Data Recovery Services media so that logical analysis can determine the nature of the data loss situation. If the media is inaccessible our experts will test the components and closely examine its internal health to determine the extent of physical damage.Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment and using specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets & drive motors.Logical recovery uses the raw image by examining the low-level data sectors and determining what fixes to filesystem structures are needed to get access to the important data. Sometimes the existing filesystem structures are missing or damaged so much that data has to be extracted directly from one or more fragments of the raw image.Sherlock Data Recovery Services Data Recovery programmers have created a full set of software tools used by our technicians to analyze, fix & recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.

Server Recovery

service thumbnail

File Servers, Web Servers, Application Servers, Mail Servers, NAS devices and just plain Servers form the backbone of many corporations’ business records storage. There may be one hard drive or many, configured together in volumes spanning drives or striped across drives, on permanent hard drives or removable media.We perform full data recovery services on NetWare, Apple, Solaris, HPUX, AIX, and Linux servers . Sherlock Data Recovery Services experts are intimately familiar with server hardware from IBM, Hewlett-Packard, Sun hardware as well as numerous others.


Examples of Data Loss Situations – UNIX / Linux

The increased complexity of many server operating systems results in additional data loss
scenarios such as:

  • Server registry configuration lost
  • Intermittent drive failure resulting in configuration corruption
  • Multiple drive failureIntermittent drive failure resulting in configuration corruption
  • File system corruption
  • Accidental replacement of media components
  • Flaky Disk Controller card responsible for corrupt data on Mirrored drives

Our Recovery Process

At the Sherlock Data Recovery Services facility, our lab technicians treat Server and RAID loss situations as high priority cases. An initial diagnosis determines whether each media device is accessible to our lab equipment. If so, the first priority is to create a raw image of all data from accessible media onto the Sherlock Data Recovery Services media, so that logical analysis can determine the nature of the data loss situation.

If some of the media is inaccessible, our lab will test the components and closely examine its internal health to determine the extent of physical damage.

Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment, and using specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets & drive motors.

Technicians must determine both the exact layout of volumes, which span or are striped across multiple drives, and what fixes of the filesystem structures are needed to get access to the important data.

Multiple-drive servers are typically ‘destriped’ onto Sherlock Data Recovery Services media so that filesystem repairs can be performed and the data files can be extracted. Sometimes the existing filesystem structures are missing or damaged, so much that data has to be extracted directly from one or more fragments of the destriped image.

Sherlock Data Recovery Services facility programmers have created a full set of software tools used by our technicians to analyze, destripe, fix, and recover data from raw image drives on all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Call For a Free Quote

Recovery Turn-Around Time

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Operating Systems and File Systems Treated

Intel PlatformsUnix Operating systems that run on Intel Platforms including:
Linux with ext2fs, xfs, reiserfs & jfs filesystems on standalone & RAID volumes,
SCO OpenServer and Xenix,
UnixWare
Solaris,
BSD-based systems such as FreeBSD, OpenBSD and NetBSD, BSDI,
LynxOS,
QNX.

Unix and Systems that run on Non-Intel Platforms(Proprietary Hardware) including:
Solaris on Sun/SPARC equipment, with ufs and Veritas VxFS filesystems
HPUX on Hewlett-Packard workstations with hfs and Veritas VxFS filesytems and Logical Volume Manager(LVM) based volumes,
IRIX on SGI workstations with efs and xfs filesystems,
AIX on IBM RS/6000 with jfs filesystems on LVM volumes


Preserving your Warranty

Sherlock Data Recovery Services has established agreements with most manufacturers regarding preserving warranty during data recovery service. Please inquire whether or not your manufacturer is included in this agreement.

If the seals on a media must be broken in order to extract data, Sherlock Data Recovery Services will re-seal the media upon completion of service with a tamper resistant sticker, which the manufacturer will accept for warranty purposes. You will also receive an invoice receipt to indicate you have pursued data recovery services with Sherlock Data Recovery Services.

When in doubt, inquire with the manufacturer about keeping your warranty before pursuing data recovery.

RAID Recovery

service thumbnail

The standard RAID levels are a basic set of RAID configurations that employ the techniques of stripingmirroring, or parity to create large reliable data stores from general purpose computer hard disk drives. The most common types today are RAID 0 (striping), RAID 1 and variants (mirroring), RAID 5 (distributed parity) and RAID 6 (dual parity). RAID levels and their associated data formats are standardized by the Storage Networking Industry Association in the Common RAID Disk Drive Format (DDF) standard.


Examples of Data Loss Situations on RAID / SAN / NAS

Naturally, the individual media in Servers suffer from the same failure points as do drives in personal computers and workstations.

The increased complexity of many server operating systems results in additional loss situations:

  • RAID Controller failure
  • Server registry configuration lost
  • Intermittent drive failure resulting in configuration corruption
  • Accidental reconfiguration of RAID drives
  • Multiple drive failure
  • Accidental replacement of media components

The Recovery Process

At the Sherlock Data Recovery Services facility, our lab technicians treat Server and RAID loss situations as high priority cases. An initial diagnosis determines whether each media device is accessible to our lab equipment. If so, the first priority is to create a raw image of all data from accessible media onto the Sherlock Data Recovery Services media, so that logical analysis can determine the nature of the data loss situation.

If some of the media is inaccessible, our lab will test the components and closely examine its internal health to determine the extent of physical damage.

Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment, and using specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets & drive motors.

Technicians must determine both the exact layout of volumes, which span or are striped across multiple drives, and what fixes of the filesystem structures are needed to get access to the important data.

Multiple-drive servers are typically ‘destriped’ onto Sherlock Data Recovery Services media so that filesystem repairs can be performed and the data files can be extracted. Sometimes the existing filesystem structures are missing or damaged, so much that data has to be extracted directly from one or more fragments of the destriped image.

Sherlock Data Recovery Services facility programmers have created a full set of software tools used by our technicians to analyze, destripe, fix, and recover data from raw image drives on all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Call For a Free Quote

Turn-Around Time for Data Recovery of Raid /NAS / SAN

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Brands, Models and Interfaces

Workgroup, Departmental & Enterprise servers from all manufacturers including IBM, Hewlett-Packard, Compaq, Dell, Sun and NEC.

Standalone and rack-mounted RAID arrays using SCSI, Fibre Channel or IDE drives from all manufacturers including EMC, IBM, Compaq, Hewlett-Packard and Hitachi.

Network Attached Storage devices such as Iomega NAS P400 series, Quantum Snap! Server, Maxtor MaxAttach, NSS uStor and HP / Compaq TaskSmart and SureStore devices.


Operating Systems and File Systems

Intel Platforms
Windows XP Professional and Home with NTFS, FAT32 or FAT16 filesystems using dynamic spanned, striped or fault-tolerant (RAID) volumes.
Windows 2000 Professional and Server with NTFS, FAT32 or FAT16 filesystems using dynamic spanned, striped or fault-tolerant (RAID) volumes.
Windows NT Workstation and Server with NTFS or FAT16 filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.
Windows ME, 98 / 95 with FAT32 or FAT16 filesystems.
MS-DOS and variants using 12 or 16 bit FAT filesystems.
Compressed volume managers including Stacker, DoubleSpace & DriveSpace.
OS/2 with FAT and HPFS filesystems.
Novell NetWare with FAT and NSS filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.
Unix Operating systems including:
SCO OpenServer and Xenix,
UnixWare from Novell and SCO,
Solaris,
Linux with ext2fs, xfs, reiserfs & jfs filesystems on standalone & RAID volumes,
BSD-based systems such as FreeBSD, OpenBSD and NetBSD, BSDI,
LynxOS,
QNX.

Non-Intel Platforms
Apple Macintosh
OS 9 with HFS and HFS+ filesystems,
OS X with HFS, HFS+ and Unix ufs filesystems
All Macintosh hardware using SCSI, IDE & Firewire interfaces, including software RAID drivers such as SoftRaid & FWB Raid.
Unix Systems including:
Solaris on Sun/SPARC equipment, with ufs and Veritas VxFS filesystems
HPUX on Hewlett-Packard workstations with hfs and Veritas VxFS filesytems on standalone and LVMvolumes,
IRIX on SGI workstations with efs and xfs filesystems,
VMS & OpenVMS running on Compaq & DEC equipment using ODS filesystems,
AIX on IBM RS/6000 with jfs filesystems on LVM volumes.


Preserving your Warranty

Sherlock Data Recovery Services has established agreements with most manufacturers regarding preserving warranty during data recovery service. Please inquire whether or not your manufacturer is included in this agreement.

If the seals on a media must be broken in order to extract data, Sherlock Data Recovery Services will re-seal the media upon completion of service with a tamper resistant sticker, which the manufacturer will accept for warranty purposes. You will also receive an invoice receipt to indicate you have pursued data recovery services with Sherlock Data Recovery Services.

When in doubt, inquire with the manufacturer about keeping your warranty before pursuing data recovery.

Data Recovery

service thumbnail

Sherlock Data Recovery Services is a certified Seagate Data Recovery partner. We provide expert data recovery and computer repair services on all Apple OS file systems(Hierarchical File System (HFS)), Redhat Linux and slackware file systems( e.g ext2, ext3 ), Microsoft Windows NTFS and FAT file systems, and on all models of Seagate, Maxtor, Fujitsu, EMC, IBM, HP, Gateway, Hitachi, Quantum, ExcelStor, Prima International, Western Digital, Dell, Samsung, Compaq, HP, Sony and Toshiba and all other USB, Firewire, SATA, IDE and SCSI disk drives.


Examples of Data Loss Situations – Hard Disk Drives

Recovery from physical and logical damage due to mechanical and electrical failure, software corruption or human error.

  • Computer will not boot
  • Hard disk crashes
  • Accidental reformatting of partitions
  • Accidental deletion of data
  • Applications are unable to run or load data
  • Corrupted data
  • Fire and water damage or crushed
  • Hard disk component failures
  • Inaccessible drives and partitions
  • Virus
  • Media surface contamination and damage

Recovery Process

Each recovery case begins with a free evaluation in order to determine the potential for retrieval and to provide a firm price-quote for your review. The initial diagnosis determines whether the media is accessible to our lab equipment. If so, the first priority is to create a raw image of the data on Sherlock Data Recovery Services media. This is a way for the logical analysis to determine the nature of the situation. If the media is inaccessible, our facilities will test the components and closely examine its internal health to determine the extent of physical damage. Recovery of crashed hard disks often involves replacing failed or damaged components in a clean environment. We use specialized hardware and software tools to create the raw image. Failed components typically include electronics, read/write heads, head assemblies, magnets and drive motors.

Logical recovery uses the raw image by examining the low-level data sectors and determining what fixes on the filesystem structures are needed to get access to the important data. Sometimes the existing filesystem structures are missing or damaged, so much that the data has to be extracted directly from one or more fragments of the raw image.

Sherlock Data Recovery Services’ programmers have created a full set of software tools used by our experts to analyze, fix, and recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Turn-Around Data Recovery Time

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.


Call (800) 267-4712 or in New York (212) 249-9888 or in Pennsylvania (800) 267-4712

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Hard Drive Brands, Models and Interfaces Recovered From

Sherlock Data Recovery Services implements recovery on all hard drive brands, models and interfaces. What follows is a comprehensive list. If you have any questions, please do not hesitate to call. EIDE and IDE Hard Drives drives from all manufacturers including Western Digital, Seagate, Quantum, IBM, Maxtor, Toshiba, Fujitsu, Hitachi, Samsung, Conner, Micropolis, JTS, Digital, NEC, Compaq, Digital, Kalok, Fuji, Areal and JVC using 2.5″ laptop & 3.5″ Normal 40 pin ATA through to the UDMA6 interface. SCSI drives from all manufacturers including Seagate, Quantum, IBM, Western Digital, Fujitsu, Digital, Compaq, Hewlett-Packard, Micropolis, Maxtor, CDC, Imprimis, Conner, Epson, Rodime, Toshiba, Samsung, Hitachi and NEC using Normal SE, UW, Differential (WD), LVD, Hot Swappable (SCA) and 2.5″ laptop interfaces. Fibre Channel drives from Seagate and IBM with FC (1Gigabit Copper) interfaces. ESDI, RLL & ST/MFM drives from all manufacturers including Seagate, Western Digital, Conner, Fujitsu, Maxtor, Miniscribe, Quantum, Tandon, Fuji, Toshiba, IBM, Kalok, Micropolis, Priam, Microscience, Tandon, JTS, Kyocera, LaPine and Tulin.
MCA drives from IBM, Western Digital and Seagate with IBM ST-506 & ESDI and 2.5″ laptop ESDI interfaces.

PCMCIA Type I, II, III hard drives from IBM, Western Digital, Integral Peripherals and Procomm.
1.8″ ATA-5 drives from Toshiba and Hitachi
CF+ Type II IBM Microdrives


Operating Systems and File Systems We Recover From

Apple OS HFS file systems Intel Platforms Windows XP Professional and Home with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes.Windows 2000 Professional and Server with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes. Windows NT Workstation and Server with NTFS or FAT16 filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.

Windows ME, 98 / 95 with FAT32 or FAT16 filesystems.

MS-DOS and variants using 12 or 16 bit FAT filesystems.

Compressed volume managers including Stacker, DoubleSpace & DriveSpace.

OS/2 with FAT and HPFS filesystems.

Novell NetWare with FAT and NSS filesystems using standalone, spanned, striped or fault-tolerant important data. Sometimes the existing filesystem structures are missing or damaged so much that data has to be extracted directly from one or more fragments of the raw image. Sherlock Data Recovery Services Data Recovery programmers have created a full set of software tools used by our experts to analyze, fix and recover data from raw images of all operating systems. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Call For a Free Quote

Turn-Around Data Recovery Time

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.


Call (800) 267-4712 or in New York (212) 249-9888 or in Pennsylvania (800) 267-4712

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Hard Drive Brands, Models and Interfaces Recovered From

Sherlock Data Recovery Services implements recovery on all hard drive brands, models and interfaces. What follows is a comprehensive list. If you have any questions, please do not hesitate to call. EIDE and IDE Hard Drives drives from all manufacturers including Western Digital, Seagate, Quantum, IBM, Maxtor, Toshiba, Fujitsu, Hitachi, Samsung, Conner, Micropolis, JTS, Digital, NEC, Compaq, Digital, Kalok, Fuji, Areal and JVC using 2.5″ laptop & 3.5″ Normal 40 pin ATA through to the UDMA6 interface. SCSI drives from all manufacturers including Seagate, Quantum, IBM, Western Digital, Fujitsu, Digital, Compaq, Hewlett-Packard, Micropolis, Maxtor, CDC, Imprimis, Conner, Epson, Rodime, Toshiba, Samsung, Hitachi and NEC using Normal SE, UW, Differential (WD), LVD, Hot Swappable (SCA) and 2.5″ laptop interfaces. Fibre Channel drives from Seagate and IBM with FC (1Gigabit Copper) interfaces.ESDI, RLL & ST/MFM drives from all manufacturers including Seagate, Western Digital, Conner, Fujitsu, Maxtor, Miniscribe, Quantum, Tandon, Fuji, Toshiba, IBM, Kalok, Micropolis, Priam, Microscience, Tandon, JTS, Kyocera, LaPine and Tulin.

MCA drives from IBM, Western Digital and Seagate with IBM ST-506 & ESDI and 2.5″ laptop ESDI interfaces.

PCMCIA Type I, II, III hard drives from IBM, Western Digital, Integral Peripherals and Procomm.

1.8″ ATA-5 drives from Toshiba and Hitachi

CF+ Type II IBM Microdrives


Operating Systems and File Systems We Recover From

Apple OS HFS file systems Intel Platforms Windows XP Professional and Home with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes. Windows 2000 Professional and Server with NTFS, FAT32 or FAT16 filesystems using standalone basic partitions or dynamic spanned, striped or fault-tolerant (RAID) volumes.Windows NT Workstation and Server with NTFS or FAT16 filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.

Windows ME, 98 / 95 with FAT32 or FAT16 filesystems.

MS-DOS and variants using 12 or 16 bit FAT filesystems.

Compressed volume managers including Stacker, DoubleSpace & DriveSpace.

OS/2 with FAT and HPFS filesystems.

Novell NetWare with FAT and NSS filesystems using standalone, spanned, striped or fault-tolerant (RAID) volumes.

Unix Operating systems including:
SCO OpenServer and Xenix,
UnixWare from Novell and SCO,
Solaris,
Linux with ext2fs, xfs, reiserfs & jfs filesystems on standalone & RAID volumes,
BSD-based systems such as FreeBSD, OpenBSD and NetBSD, BSDI,
LynxOS,
QNX.

Non-Intel Platforms Apple Macintosh
OS 9 with HFS and HFS+ filesystems,
OS X with HFS, HFS+ and Unix ufs filesystems
All Macintosh hardware using SCSI, IDE & Firewire interfaces, including software RAID drivers such as SoftRaid & FWB Raid.
Unix Systems including:
Solaris on Sun/SPARC equipment, with ufs and Veritas VxFS filesystems
HPUX on Hewlett-Packard workstations with hfs and Veritas VxFS filesytems on standalone and LVM volumes,
IRIX on SGI workstations with efs and xfs filesystems,
equipment using ODS filesystems,
AIX on IBM RS/6000 with jfs filesystems on LVM volumes.
Legacy Systems:
VMS & OpenVMS running on HP/Compaq & DEC


Preserving your Warranty

Sherlock Data Recovery Services has established agreements with most manufacturers regarding preserving warranty during data recovery service. Please inquire whether or not your manufacturer is included in this agreement.

If the seals on a media must be broken in order to extract data, Sherlock Data Recovery Services will re-seal the media upon completion of service with a tamper resistant sticker, which the manufacturer will accept for warranty purposes. You will also receive an invoice receipt to indicate you have pursued data recovery services with Sherlock Data Recovery Services.

When in doubt, inquire with the manufacturer about keeping your warranty before pursuing data recovery.

Operating System Recovery

service thumbnail

An operating system (OS) is software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware,[1][2] although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones andvideo game consoles to supercomputers and web servers.

Examples of popular modern operating systems include AndroidBSDiOSLinuxOS XQNXMicrosoft Windows,[3] Windows Phone, and IBM z/OS. All these, except Windows, Windows Phone and z/OS, share roots in UNIX.

Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with this and can help you recover your Operating System.

Database Recovery

service thumbnail

Data stored in SQL Server, Oracle, SyBase, My Sql Server, Exchange Server, Microsoft Access and other databases maintained on networked Fileservers. Relational and object database management technologies are fundamental to modern IT systems, often underpinning the lifeblood applications run by the entire corporation.


Examples of Data Loss Situations SQL, Oracle RDBMS Databases

Naturally, the individual media in database Servers suffer from the same failure points as do drives in personal computers and workstations.

Experienced System Administrators and DBAs know that a relational or object oriented database environment is fragile unless supported by comprehensive and well-tested backups. Unfortunately, it is all too common for devices to become corrupt beyond the scope of routine recovery methods. Failures still occur in even the most well-configured system with critical problems such as:

  • Backup files not recognizable by database engine
  • Database files are locked preventing access
  • Deleted or dropped tables
  • Accidentally deleted records
  • Corrupted database files and devices
  • Damaged individual data pages
  • Accidentally overwritten database files and devices

Our Recovery Process for Databases and Exchange Services

Sherlock Data Recovery Services’ lab technicians treat Database loss situations as high priority cases. An initial diagnosis determines whether each media device is accessible to our lab equipment. If so, the first priority is to create a raw image of all data from accessible media onto Sherlock Data Recovery Services media so that the database devices and tables can be accessed. If hardware problems or operating system configuration problems have rendered the basic data tables inaccessible or damaged, then our technicians proceed just as they would for a Server / RAID Data Recovery Services.

Sherlock Data Recovery Services Data Recovery Sherlock Data Recovery Services experts can then analyze the contents of the raw sector images to identify the tables and records containing your desired data. This data can then be extracted and the entire database rebuilt, if necessary.

Normal system maintenance routines are unable to recover all data in situations where underlying media failure or structural corruption has eliminated key pointers; indeed those routines will often exacerbate the damage.

Sherlock Data Recovery Services’ programmers have created a full set of database level and system level software tools used by our technicians to analyze, fix and recover data from relational and object database systems. Once a recovery has been successfully performed, files, databases, users, triggers, procedures, indexes, and table lists are created and data validity is checked and system parameter files are restored to sane values if possible.


Call For a Free Quote

Turn-Around Time For a Database and Exchange Server Database/Server recovery

Your time is always important for us! Sherlock Data Recovery Services has dedicated its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why, each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday. If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.

Time estimates are based on procedures and expertise required to recover the data and or if possible the database(s) you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Our Recovery Capabilities and Types of Databases We Recover

RDBMS (Relational Database management Systems) Relational Databases

Microsoft SQL Server 6.0, 6.5, 7.0 & 2000,
Oracle Lite, Oracle 7.x, 8.x ,8i.x ,9i.x,10g
Sybase SQL Server, Sybase SQL Anywhere,
Gupta SQL Anywhere,
MySQL AB MySQL,
PostgreSQL

Standard Office Databases

Microsoft Access up to 2003,
All xbase products such as dbase, Foxpro

Productivity Applications

Microsoft Office, including all versions of Word, Excel & Powerpoint

Mail Server and Client Applications

Microsoft Exchange & Outlook
Lotus Notes

Eudora up to version 7
TheBat up to version 3.64
Applications conforming to the Unix mbox format such as Eudora and Netscape and Ritlabs TheBat.


Preserving your Warranty

Sherlock Data Recovery Services has established agreements with most manufacturers regarding preserving warranty during data recovery service. Please inquire whether or not your manufacturer is included in this agreement.

If the seals on a media must be broken in order to extract data, Sherlock Data Recovery Services will re-seal the media upon completion of service with a tamper resistant sticker, which the manufacturer will accept for warranty purposes. You will also receive an invoice receipt to indicate you have pursued data recovery services with Sherlock Data Recovery Services.

When in doubt, inquire with the manufacturer about keeping your warranty before pursuing data recovery.

SCSI Data Recovery

service thumbnail

Small Computer System Interface (SCSI) is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols and electrical and optical interfaces. SCSI is most commonly used for hard disks and tape drives, but it can connect a wide range of other devices, including scanners and CD drives, although not all controllers can handle all devices. The SCSI standard defines command sets for specific peripheral device types; the presence of “unknown” as one of these types means that in theory it can be used as an interface to almost any device, but the standard is highly pragmatic and addressed toward commercial requirements.

SCSI is an intelligent, peripheral, buffered, peer to peer interface. It hides the complexity of physical format. Every device attaches to the SCSI bus in a similar manner. Up to 8 or 16 devices can be attached to a single bus. There can be any number of hosts and peripheral devices but there should be at least one host. SCSI uses handshake signals between devices, SCSI-1, SCSI-2 have the option of parity error checking. Starting with SCSI-U160 (part of SCSI-3) all commands and data are error checked by a CRC32 checksum. The SCSI protocol defines communication from host to host, host to a peripheral device, peripheral device to a peripheral device. However most peripheral devices are exclusively SCSI targets, incapable of acting asSCSI initiators—unable to initiate SCSI transactions themselves. Therefore peripheral-to-peripheral communications are uncommon, but possible in most SCSI applications. The Symbios Logic 53C810 chip is an example of a PCI host interface that can act as a SCSI target.

Sherlock Data Recovery Services has established a SCSI recovery service. We perform recoveries under the Sherlock Data Recovery Services brand.


Examples of Ditgital Tape,DLT Loss Situations – Tape

Tape data storage can be inaccessible for a number of reasons:

  • Tape drive failure has corrupted tape headers
  • Tape media stretched or snapped
  • Fire & water damage
  • Media surface contamination and damage
  • Accidental reformatting or erasure of tape
  • Accidental overwriting of headers
  • Tape backup software corruption

The Digital Tape Recovery Process

Initial diagnosis determines whether the media is accessible to our lab equipment. If so, the first priority is to create a raw image of the data on Sherlock Data Recovery Services tape or drive media so that logical analysis can determine the nature of the data loss situation. If the media is inaccessible our lab will test the cartridge components to determine the extent of physical damage.

Recovery of damaged tape media often involves cleaning, splicing & respooling healthy segments of tape into new carriers using specialized tools. Specially configured tape drives using customized hardware and software tools are used to create a raw image from whatever portions of tape that are readable.

Logical recovery uses the raw image by examining the low-level data sectors and determining what fixes to tape format structures are needed to get access to the important data. Sometimes the existing structures are missing or damaged so much that data has to be extracted directly from the raw image.

Sherlock Data Recovery Services Data Recovery Labs programmers have created a full set of software tools used by our technicians to analyze, fix & recover data from raw tape images. Once a recovery has been successfully performed, file lists are created and data validity is checked.


Data Recovery Turn Around Time

Sherlock Data Recovery Services has geared its entire service to recover your data as fast as possible. When dealing with such a wide variety of problems, estimating time before the problem is diagnosed can be difficult. That is why each recovery case starts with an evaluation.

The evaluation begins immediately on receipt of the media. Generally, it takes us 2 to 24 hours to complete it. The process involves several hours of work and testing. (Mirroring alone may take up to 24 hours of computer time with extensive re-tries for badly damaged devices).

Complete turn-around time, including analysis and recovery, is usually between 1 to 5 days. Some severe cases can take considerably more time.

Our hours of operation are 9am to 7pm EST Monday to Saturday (All facilities). If you have an emergency situation, we have technical staff on call for weekends and after hours in all locations.

Time estimates are based on procedures and expertise required to recover the data you need. You are not charged by the hour. A firm quote is provided for your approval following the evaluation.


Call For a Free Quote

Tape Formats and Manufacturers

DLT III, DLT IV, DLT-1, VS80, VS160 & Super DLT tapes up to 320Gb capacity.
LTO 1, 2 Ultrium tapes up to 400Gb capacity.
4mm DAT format DDS, DDS-2, DDS-3 & DDS-4 tapes up to 40Gb capacity.
Exabyte 8mm 112m and 160m tapes & Mammoth 1 (Exabyte 8900), Mammoth 2 up to 150Gb capacity.
Seagate AIT & AIT-2, AIT-3 tapes up to 260Gb capacity.
Travan TR-1, TR-3, TR-4 & TR-5 tapes up to 20Gb capacity.
Iomega Ditto 2Gb QIC tapes.
QIC Mini-Cartridges DC2000-DC2120 with 40, 80Mb & 250Mb capacity.


Backup File Foramts

  • Microsoft Tape Format (MTF) applications such as NT Backup and Seagate/Veritas BackupExec for Windows NT/2000, Backup Exec for NetWare
  • System Independent Data Format (SIDF) applications such as Novell’s Sbackup and Palindrome’s Backup Director
  • Practically all legacy DOS and Windows backup formats, including Colorado/Cheyenne Backup for Windows, Arcada/Seagate Backup Exec for Windows 95 & 98
  • Cheyenne/Computer Associates ARCserve for NT & NetWare
  • Previos/Stac Replica Backup for NT, NetWare
  • Legato NetWorker (all platforms)
  • Dantz Retrospect for Macintosh
  • unix tar, cpio, fbackup, fsdump & ufsdump archives
  • Compaq/DEC VMS Backup
  • Intelliguard/Legato Budtools for Unix platforms
  • Sytron / Seagate / Veritas Sytos & Sytos Plus for DOS, NetWare & OS/2

E-mail Recovery

service thumbnail

Email is an information and communications technology. It uses technology to communicate a digital message over the Internet. Users use email differently, based on how they think about it. There are many software platforms available to send and receive. Popular email platforms include Gmail, Hotmail, Yahoo! Mail, Outlook, and many others.

Network-based email was initially exchanged on the ARPANET in extensions to the File Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and body) itself.

Sherlock Data Recovery helps you recover Files and Information from your  email program from any media and PC platform.

Computer Repair Service

service thumbnail

Computer Repair & Virus Removal Based in New York, New York 

Keep your computers running at their best with the help of On Line Computer, Laptop Service and Repairs. We offer complete computer repair work including virus removal and data recovery services. Contact us in New York, New York, to receive more details.

Full-Service Repairs

When your computer is having problems, bring it to our computer service for effective solutions. We are able to service, upgrade, and repair systems of all kinds. Our team installs programs, fixes glitches, removes viruses, and adds security umbrellas to keep your computer from being compromised.

 Our Specializations

On Line Computer, Laptop Service and Repairs specializes in installing and implementing graphics applications including Adobe™ products. We also build networks and servers. Plus, we’re able to fix corrupted email programs such as Microsoft Outlook™ and do data recovery for specially made computers including those used for medical preparations.

Forensic Work

On Line Computer, Laptop Service and Repairs also does computer forensic work. We work with attorneys with chain of custody formsmaking copies of all the information they want on non-changeable media as evidence. Our services ensure that all data, including text and images, are preserved for all parties involved.

Call or stop by our location to have us address your computer repair needs.

Outlook PST Recovery

In Microsoft Exchange Server, the messages, the calendar, and other data items are delivered to and stored on the serverMicrosoft Outlook stores these items in a personal-storage-table (.pst) or off-line-storage-table (.ost) files that are located on the local computer. Most commonly, the .pst files are used to store archived items and the files to maintain off-line availability of the items. This is an essential feature of Microsoft Outlook.

The size of these files no longer counts against the size of the mailbox used; by moving files from a server mailbox to .pst files, users can free storage space on their mailservers.To use the .pst files from another location the user needs to be able to access the files directly over a network from his mail client. While it is possible to open and use a .pst file from over a network, this is unsupported, and Microsoft advises against it, as .pst files are prone to corruption when used in this manner.

Both the .pst and .ost files use a fixed-block-based allocation scheme; the file is enlarged by a fixed amount of bytes, and the file internally maintains information about the allocated and non-allocated blocks. So, when data files like email messages are added to a .pst file, its file size is automatically adjusted by the mail client (if necessary). When mail is deleted from a .pst file, the size of the .pst file will stay the same, marking the space as unallocated so that it will hold future data items. Recently removed data items can actually be recovered from .pst and .ost files.

To reduce the size of .pst files, the user needs to compact them.

Data access

Password protection can be used to protect the content of the .pst files.However, Microsoft admits that the password adds very little protection, due to the existence of commonly available tools which can remove or simply bypass the password protection.The password to access the table is stored without the first and last XOR CRC-32 integer representation of itself in the .pst file. Outlook checks to make sure that it matches the user-specified password and refuses to operate if there is no match. The data is readable by the libpst project code.

Microsoft (MS) offers three values for the encryption setting: nonecompressible, and high.

  • None the .pst data is stored as plain text.
  • Compressible the .pst data is encrypted with a byte-substitution cipher with a fixed substitution table.
  • High (sometimes called “better”) encryption is similar to a WWII German Enigma cipher with three fixed rotors.

Note that neither of the two encryption modes uses the user-specified password as any part of the key for the encryption.

Support

The .pst file format is supported by several Microsoft client applications, including Microsoft Exchange ClientWindows Messaging, and Microsoft Outlook. The .pst file format is an open format for which Microsoft provides free specifications and irrevocable free patent licensing through the Open Specification Promise 

The libpst project includes tools to convert .pst files into open formats such as mbox and LDAP Data Interchange Format. libpst is licensed under the GPL and is now included in Fedora 10.MVCOM is a commercially licensed COM Component that provides access to .pst files without MAPI.

There are tools to convert .pst to other formats or to upload to other online e-mails like Gmail, for example.

Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with this and can help you recover your Outlook PST Files.

Solid State Drive Recovery

service thumbnail

solid-state drive (SSD) (also known as a solid-state disk or electronic disk, though it contains no actual “disk” of any kind or motors to “drive” the disks) is a data storage device using integrated circuit assemblies as memory to store data persistently. SSD technology uses electronic interfaces compatible with traditional block input/output (I/O) hard disk drives, thus permitting simple replacement in common applications.[5] Also, new I/O interfaces like SATA Express are created to keep up with speed advancements in SSD technology.

SSDs have no moving (mechanical) components. This distinguishes them from traditional electromechanical magnetic disks such as hard disk drives(HDDs) or floppy disks, which contain spinning disks and movable read/write heads.Compared with electromechanical disks, SSDs are typically more resistant to physical shock, run silently, have lower access time, and less latency. However, while the price of SSDs has continued to decline in 2012, SSDs are still about 7 to 8 times more expensive per unit of storage than HDDs.

As of 2010, most SSDs use NAND-based flash memory, which retains data without power. For applications requiring fast access, but not necessarily data persistence after power loss, SSDs may be constructed from random-access memory (RAM). Such devices may employ separate power sources, such as batteries, to maintain data after power loss.

Hybrid drives or solid state hybrid drives (SSHD) combine the features of SSDs and HDDs in the same unit, containing a large hard disk drive and an SSD cache to improve performance of frequently accessed data.

Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with this and can help you recover your Files from a solid-state disk.

Memory Card Recovery

service thumbnail

memory card or flash card is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players and video game consoles. Most of these can be diminutive, re-recordable, and can retain data without power.

Overview of all memory card types

Main article: Comparison of memory cards
  • PCMCIA ATA Type I Flash Memory Card (PC Card ATA Type I)
    • PCMCIA Type II, Type III cards
  • CompactFlash Card (Type I), CompactFlash High-Speed
  • CompactFlash Type II, CF+(CF2.0), CF3.0
    • Microdrive
  • MiniCard (Miniature Card) (max 64 MB (64 MiB))
  • SmartMedia Card (SSFDC) (max 128 MB) (3.3 V,5 V)
  • xD-Picture Card, xD-Picture Card Type M
  • Memory Stick, MagicGate Memory Stick (max 128 MB); Memory Stick Select, MagicGate Memory Stick Select (“Select” means: 2×128 MB with A/B switch)
  • SecureMMC
  • Secure Digital (SD Card), Secure Digital High-Speed, Secure Digital Plus/Xtra/etc (SD with USB connector)
    • miniSD card
    • microSD card (aka Transflash, T-Flash)
    • SDHC
    • WiFi SD Cards (SD Card With WiFi Card Built in) Powered by Device. (Eye-Fi, WiFi SD, Flash Air)
  • MU-Flash (Mu-Card) (Mu-Card Alliance of OMIA)
  • C-Flash
  • SIM card (Subscriber Identity Module)
  • Smart card (ISO/IEC 7810, ISO/IEC 7816 card standards, etc.)
  • UFC (USB FlashCard) (uses USB)
  • FISH Universal Transportable Memory Card Standard (uses USB)
  • Intelligent Stick (iStick, a USB-based flash memory card with MMS)
  • SxS (S-by-S) memory card, a new memory card specification developed by Sandisk and Sony. SxS complies to the ExpressCard industry standard.
  • Nexflash Winbond Serial Flash Module (SFM) cards, size range 1 mb, 2 mb and 4 mb.

Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with this and can help you recover your Memory Card.

Digital Photo Recovery

service thumbnail

Digital photography uses an array of electronic photodetectors to capture the image focused by the lens, as opposed to an exposure onphotographic film. The captured image is then digitized and stored as a computer file ready for digital processing, viewing, digital publishing or printing.

Until the advent of such technology, photographs were made by exposing light sensitive photographic film, and used chemical photographic processingto develop and stabilize the image. By contrast, digital photographs can be displayed, printed, stored, manipulated, transmitted, and archived using digital and computer techniques, without chemical processing.

Digital photography is one of several forms of digital imaging. Digital images are also created by non-photographic equipment such as computer tomography scanners and radio telescopes. Digital images can also be made by scanning other photographic images.

Sensors and storage

Image sensors read the intensity of light, and digital memory devices store the digital image information as RGB color space or as raw data.

The two main types of sensors are charge-coupled devices (CCD), in which the photocharge is shifted to a central charge-to-voltage converter, and CMOS or active pixel sensors.

Nearly all digital cameras use built-in and/or removable solid state flash memory. Digital tapeless camcorders that double as a digital still cameras use flash memory, discs and internal hard drives. Certain 20th century digital cameras such as the Sony Mavica range used floppy disks and mini-CDs.

Multifunctionality and connectivity

Except for some linear array type of cameras at the highest-end and simple web cams at the lowest-end, a digital memory device (usually a memory cardfloppy disks and CD-RWs are less common) is used for storing images, which may be transferred to a computer later.

Digital cameras can take pictures, and may also record sound and video. Some can be used as webcams, some can use the PictBridge standard to connect to a printer without using a computer, and some can display pictures directly on a television set. Similarly, many camcorders can take still photographs, and store them on videotape or on flash memorycards with the same functionality as digital cameras.

Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with this and can help you recover your Digital Photos.

Flash Drive Recovery

service thumbnail

flash drive may refer to:

Specific flash drive types

Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with this and can help you recover Files from your Flash  Drive.

Specialized Recovery Services

service thumbnail

Fileservers, Application Servers, Mail Servers, Web Servers, NAS devices (Quantum SNAP, Dell Power Vault etc..) and just plain Servers form the backbone of many corporations’ business records storage. There may be one hard drive or many, configured together in volumes spanning drives or striped across drives, on permanent hard drives or removable media.Windows NT and Windows 2000 are the most popular Operating

Systems for servers today but we see many NetWare, Apple, Solaris, HPUX, and linux servers as well. Sherlock Data Recovery Services Data Recovery facilities technicians are intimately familiar with server hardware from IBM, Compaq, Hewlett-Packard, Sun hardware as well as numerous others.

Which media are you looking to recover data from?

Sherlock Data Recovery Services recovers from all types of storage media and platforms. Each section below details: loss situations we recover from, the recovery process, price, time, types of service, and technical capabilities we provide.

Since 1987, Sherlock Data Recovery Services has defined the standard of excellence in the data recovery industry. We provide the finest and most innovative data recovery services available anywhere, at any price!

Sherlock Data Recovery Services has facilities in the United States and Canada.

We pioneered the concept of evaluations with our no data – no data recovery fee policy.

Our customer satisfaction level is second to none. Fully documented and audited statistics indicate satisfaction with our services in excess of 95% for all customers (including those who decline our quote and even those cases where a recovery was not possible).

Sherlock Data Recovery Services’s many engineers, technicians, researchers, customer service reps and managers are dedicated to a single goal: recovering your data as quickly, completely, and economically as possible. After all, we do not generate a single dollar of revenue unless we successfully recover your data, to your satisfaction.

Data Recovery Capabilities

service thumbnail

Data Recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drivessolid-state drives (SSD), USB flash drivestorage tapesCDsDVDsRAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

The most common “Data Recovery” scenario involves an operating system failure, accidental damage etc. (typically on a single-disk, single-partition, single-OS system), in which case the goal is simply to copy all wanted files to another disk. This can be easily accomplished using a Live CD, many of which provide a means to mount the system drive and backup disks or removable media, and to move the files from the system disk to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioningand consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.

Another scenario involves a disk-level failure, such as a compromised file system or disk partition, or a hard disk failure. In any of these cases, the data cannot be easily read. Depending on the situation, solutions involve repairing the file system, partition table or master boot record, or hard disk recovery techniques ranging from software-based recovery of corrupted data, hardware-software based recovery of damaged service areas (also known as the hard drive’s “firmware”), to hardware replacement on a physically damaged disk. If hard disk recovery is necessary, the disk itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.

In a third scenario, files have been “deleted” from a storage medium. Typically, the contents of deleted files are not removed immediately from the drive; instead, references to them in the directory structure are removed, and the space they occupy is made available for later overwriting. In the meantime, the original file contents remain, often in a number of disconnectedfragments, and may be recoverable.

The term “data recovery” is also used in the context of forensic applications or espionage, where data which has been encrypted or hidden, rather than damaged, is recovered.

Sherlock Data Recovery Services’s many engineers, technicians, researchers, customer service reps and managers are dedicated to a single goal: recovering your data as quickly, completely, and economically as possible. After all, we do not generate a single dollar of revenue unless we successfully recover your data, to your satisfaction.

Seagate Data Recovery

service thumbnail

eForensics, Digital Forensics, eDiscovery all revolve around the process of finding information (resident on digital media) that can be certified as evidence in a criminal, civil or corporate investigation.

Data Recovery can be an important step in the eForensics process. When the media being investigated is rendered inaccessible (e.g. accidentally or intentionally damaged or corrupted) or the number of media is large (e.g. 1000 tapes) or the data is stored on old technology, professional in-lab data recovery/media restore is often required. Providing access to the data on the problem media is where Sherlock Data Recovery Services can help.

Unlike many data recovery companies, we do not claim to be experts in forensics; we do however understand and actively support eForensics. A lot of law enforcement, legal and corporate investigators rely on Sherlock Data Recovery Services when they need data recovery in the course of discovery.

Our objective is to make data accessible and usable as much as possible. We also provide chain-of-custody support based on our methodology. We leave the actual forensics work to our customers who are eForensics experts.

Electronic Discovery Cost cutting:

Sherlock Data Recovery Services’ experience ranges from the most straightforward and basic to the most complex. Initially over the phone, our highly trained experts will be able to listen to your situation and requirements. Then they will give you advice on how to proceed and how our service may be of help.

We apply the latest techniques for removing duplication of data across all known file formats as well as database mining techniques designed to interactively drill down only those folders that need be recovered, leaving out many folders containing irrelevant data and thereby saving costs of Electronic Discovery and computer forensic recovery.
Call us at our Toll Free Number (800) 267-4712 or (212) 249-9888

Forensic Recovery

service thumbnail

Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.

Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high-profile cases and is becoming widely accepted as reliable within U.S. and European court systems.

Forensic process

A portable Tableau write blocker attached to a Hard Drive

Computer forensic investigations usually follow the standard digital forensic process (acquisition, analysis and reporting).[7] Investigations are performed on static data (i.e. acquired images) rather than “live” systems. This is a change from early forensic practices where a lack of specialist tools led to investigators commonly working on live data.

Techniques

A number of techniques are used during computer forensics investigations.

Cross-drive analysis
A forensic technique that correlates information found on multiple hard drives. The process, still being researched, can be used to identify social networks and to perform anomaly detection.
Live analysis
The examination of computers from within the operating system using custom forensics or existing sysadmin tools to extract evidence. The practice is useful when dealing with Encrypting File Systems, for example, where the encryption keys may be collected and, in some instances, the logical hard drive volume may be imaged (known as a live acquisition) before the computer is shut down.
Deleted files
A common technique used in computer forensics is the recovery of deleted files. Modern forensic software have their own tools for recovering or carving out deleted data.[11] Most operating systems and file systems do not always erase physical file data, allowing investigators to reconstruct it from the physical disk sectors. File carving involves searching for known file headers within the disk image and reconstructing deleted materials.
Stochastic forensics
A method which uses stochastic properties of the computer system to investigate activities lacking digital artifacts. Its chief use is to investigate data theft.

Steganography

One of the techniques used to hide data is via steganography, the process of hiding data inside of a picture or digital image. This process is often used to hide pornographic images of children as well as information that a given criminal does not want to have discovered. Computer forensics professionals can fight this by looking at the hash of the file and comparing it to the original image (if available.) While the image appears exactly the same, the hash changes as the data changes.

Volatile data

When seizing evidence, if the machine is still active, any information stored solely in RAM that is not recovered before powering down may be lost.One application of “live analysis” is to recover RAM data (for example, using Microsoft’s COFEE tool, windd, WindowsSCOPE) prior to removing an exhibit. CaptureGUARD Gateway bypasses Windows login for locked computers, allowing for the analysis and acquisition of physical memory on a locked computer.

RAM can be analyzed for prior content after power loss, because the electrical charge stored in the memory cells takes time to dissipate, an effect exploited by the cold boot attack. The length of time that data is recoverable is increased by low temperatures and higher cell voltages. Holding unpowered RAM below −60 °C helps preserve residual data by an order of magnitude, improving the chances of successful recovery. However, it can be impractical to do this during a field examination.

Some of the tools needed to extract volatile data, however, require that a computer be in a forensic lab, both to maintain a legitimate chain of evidence, and to facilitate work on the machine. If necessary, law enforcement applies techniques to move a live, running desktop computer. These include a mouse jiggler, which moves the mouse rapidly in small movements and prevents the computer from going to sleep accidentally. Usually, an uninterruptible power supply (UPS) provides power during transit.

However, one of the easiest ways to capture data is by actually saving the RAM data to disk. Various file systems that have journaling features such as NTFS and ReiserFS keep a large portion of the RAM data on the main storage media during operation, and these page files can be reassembled to reconstruct what was in RAM at that time.

Sherlock Data Recovery Services’s many engineers, technicians, researchers, customer service reps and managers are dedicated to a single goal: recovering your data as quickly, completely, and economically as possible. After all, we do not generate a single dollar of revenue unless we successfully recover your data, to your satisfaction.

Chain Of Custody

service thumbnail

Chain of custody (CoC), in legal contexts, refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence.

Particularly important in criminal cases, the concept is also applied in civil litigation – and sometimes more broadly in drug testing of athletes,traceability of food products and to provide assurances that wood products originate from sustainably managed forests.

The term is also sometimes used in the fields of historyart history, and archives as a synonym for provenance (meaning the chronology of the ownership, custody or location of a historical object, document or group of documents), which may be an important factor in determining authenticity.

Sherlock Data Recovery Services’s many engineers, technicians, researchers, customer service reps and managers are dedicated to a single goal: recovering your data as quickly, completely, and economically as possible. After all, we do not generate a single dollar of revenue unless we successfully recover your data, to your satisfaction.

Cell Phone Detective

Most importantly is the ability to retrieve any type of deleted files like text massages, phone numbers, voice conversations, deleted photos, and videos. All social media deleted communications like facebook, instagram, Whatsapp, Twitter and many others.

  • Perfect tool for sharing information with colleagues and coworkers, enabling easy access to evidence collected
  • Extract and analyze data from mobile devices, their backups, cloud services and call data records

We Service ANY kind of Cell Phone

 




Windows Phone Cloud

Most smartphone users backup their contacts, messages, applications, settings, files etc. on the cloud. The Windows Phone platform offers its own cloud storage which Sherlock Data Recovery can extract.



Web Browsers

Sherlock Data Recovery offers support with all major Web browsers on various operating systems.



Timeline

A device’s usage in sorted in one list referred to as a Timeline. It organizes all data and activity in a chronological fashion making it easier to track.



SQLite Viewer

An SQLite Viewer allows for the exploration of database files with the following extensions: .sqlite, .sqlite3, .sqlitedb, .db, .db3. Sherlock Data Recovery has the means of gaining access to all data stored in such databases regardless of whether they were deleted or not.



Spyware

Sherlock Data Recovery can detect spyware covertly installed on most devices. By processing their logs and configuration files, such spyware can be effectively combated.



Social Graph

A Social Graph visualizes the complex relationships inside various user groups. By reviewing these connections between users, common interrelationships can be ascertained.



Skype & Messengers

Sherlock Data Recovery can offer support for a plethora of messaging apps such as Skype, Facebook, WhatsApp, Viber and more.



Screen Lock Disabler

With locked devices being a common recovery issue, Sherlock Data Recovery is at the forefront in digital recovery methods to access even the toughest of cases.



Reports

Reports are critical in the field of data recovery. Creating, exporting, filing and printing reports highlighting the data recovery process allows for transparency in credibility in the work.



Plist Viewer

Plist files are Property List XML Files which contain a host of relevant recovery information specific to Apple devices. Browser history, settings, cookies, etc. can all be extracted from .plist files.



Phonebook

The Phonebook is essentially an address book housing a user’s contacts with all the relevant data such as name, websites, phone numbers, addresses, emails, etc. Depending on the device, it is possible for recovery services to retrieve relevant information stored in the phonebook.



Passwords

Passwords are used to login to devices, storage and databases. These passwords are stored in applications files which can be recovered.



Oxygen Forensic® Maps

Oxygen Forensic® Maps acquires GPS coordinates from all possible sources such as phones, tablets, computers, cloud storage, media cards, and imported images. The data can then be reviewed both online and off by the experts during the recovery process.



Navigation

Sherlock Data Recovery can access popular Navigation software to highlight searches, routes, and points of interest called on the device.



Messages

Messages contain all of a user’s emails, texts, and messages. Sherlock Data Recovery can recover deleted messages on most devices.



Locked devices acquisition

Sherlock Data Recovery offers the means to recover most locked devices. This system can be used on many of the latest models and operating systems.



Links and Stats

Links and Stats offer a convenient method of exploring social connections between users by analyzing various activity such as phone calls, text and email messages, and application use. This will allow for thorough investigation of any user’s social connections.



Key Evidence

Key Evidence offers an overall view of the evidence marked as essential by recovery experts. The trained experts at Sherlock Data Recovery can tag certain activity as essential while reviewing all regardless of original location.



iTunes Backup

iTunes backup found is often found on tampered computers due to the popularity of Apple devices. Sherlock Data Recovery can extract such data from the iTunes backup files.



Global Search

Every section of a device can be explored using global search. This includes, messages, application use, IPS addresses, GPS coordinates, etc.



Geo Locations

Geo Locations reveal the visited places a user goes. Recovery experts are able to ascertain where and when wifi connection was utilized and determine location accordingly.



File Browser

A File Browser is a powerful resource to access and analyze everything from photos and documents to the code used to view and store their properties.



Event log

The Event Log contains user’s information pertaining to a user’s phone calls. Recovering deleted call information is available for certain devices.



Encrypted backups

Sherlock Data Recovery can decrypt passwords and encrypt backup files and images.



Dictionaries

All the words entered in a device message, note or calendar can be found in the dictionaries. It is important to note, these are not traditional dictionaries. Instead, they have the unique words typed in by the user on the device.



Device Information

Device information displays complete technical information about the device such as manufacturer, model, platform, serial number, phone number and any other specific data.



Data Viewers

Various data viewers help recovery experts analyze extracted data such as with HEX, HTML, SQLite, Plist and various picture, music, video, and text viewers.



Data Scout

Data Scout recovers subscriber information from an extracted phone number. It interacts with other services to gather data from collected phone numbers.



Cloud Data Extraction

Sherlock Data Recovery can recover data from several cloud storages such as OneDrive, Google Drive and Dropbox as well as from various social media platforms such as Twitter and Instagram.



Chinese Devices

Sherlock Data Recovery can bypass screen lock passwords while creating full physical dumps from Chinese chipset devices.



Call Data Records

Sherlock Data Recovery can analyze the various CDR files with all the format and layouts provided by mobile service providers.



Calendar & Tasks

Calendar and Tasks display a user’s notes, tasks, and calendar entries. The various features and sections will depend on the model of device.



BlackBerry Backups

Sherlock Data Recovery is able to extract and backup the BBB and IPD files made with the Blackberry Desktop Manager. These files can often be discovered on the computer itself.



Backups Import

Sherlock Data Recovery can import and extract data from various backup and image files created by the device’s sync software.



Applications

Sherlock Data Recovery can recover and decrypt all vital application data from devices running iOS, Android OS, BlackBerry 10, Windows Phone 8 Operating Systems.



Android Rooting

Sherlock Data Recovery can retrieve a complete set of user data on any device using an Android Operating System.



Aggregated Contacts

Sherlock Data Recovery can analyze contacts from an array of various sources and group them together in one meta-contact file.

Critical Response Options

If you have a critical situation and need immediate help, Call us at (212) 249-9888. The Critical Response Service is available 24 hours a day, 7 days a week.

Critical Response Service at our facilities

This service is for mission critical data recovery, where the media can be taken to one of our facilities. In the facility, dedicated resources and critical response team members are committed to around the clock to your recovery case until its resolution.

Onsite Service

This service is available for situations where immediate shipping to one of our facilities is not feasible or desirable. A technical expert or team of engineers can be dispatched to stabilize and analyze the circumstances of your failure. Response is as fast as possible. For example the time it takes to catch the next plane to your location. This service is not for everybody but if you have a situation that merits this level of service, Sherlock Data Recovery Services is ready to do what is necessary to get the job done.

Our Critical Response Team is comprised of best data recovery experts. They are called on for every kind of situation imaginable from multiple drive multi-Gigabyte and Terabyte RAID servers , Jukeboxes, custom installations and configurations, SQL Database corruption, to tape failure and custom file extraction from corrupted backup sets. Whatever the situation, these technology gurus are ready to recovery your data.

How to submit a Recovery Case

Fill out the On-Line Evaluation Request form or the Printable Evaluation Request form and send it to Sherlock Data Recovery Services with your hard drive for recovery.Careful packaging is important to perserve delicate electronics like hard drives. See Sherlock Data Recovery Services -Packaging Instruction to help avoid shipping damage.