Condusiv Technologies Blog

Condusiv Technologies Blog

Blogging @Condusiv

The Condusiv blog shares insight into the issues surrounding system and application performance—and how I/O optimization software is breaking new ground in solving those issues.

How to Recover Deleted Files from Network Shares

by Dawn Richcreek 17. October 2019 04:09

You may have discovered—and too late—that while you can recover some deleted files from the Windows Recycle Bin on local machines, you cannot recover deleted files (accidentally or otherwise) from network drive shared folders. If you delete a file from a network share, it is gone. If you look in the Recycle Bin, it won’t be there. 

This happens because Windows is organized so that deleted files can be captured by the Windows Recycle bin on local drives only. If a user deletes a file on a server from a network shared folder, it isn’t being deleted from the local machine, so the Recycle Bin does not capture it. This is also true of files deleted from attached or removable drives, and files deleted from applications or the Command Prompt. Only files deleted from File Explorer on a machine’s local drive will be saved by the Recycle Bin.

With some types of software, you might be able to recover an earlier saved version of a file deleted from a network shared folder, which would give you the version prior to the deletion. Failing this, the only other way to recover a file deleted from a network share (without a third-party solution—see below) is to have your system administrator retrieve an earlier saved version of the file from the most recent backup. This will only work if:

 

a) A version of the file was actually backed up

b) You can recall the file name so that the system administrator can find it

c) You can recall with some accuracy the time and date when the file was saved. 

 

This method is, of course, extremely time consuming for the sys admin—and for you, too, if you have to wait. 

Even if the previous version can be retrieved, any work done on the file since the last save is lost forever. 

 

Problem Solved: Undelete

Fortunately, there is a very easy and cost-effective solution to this perpetual issue: Undelete® Instant Data Recovery software from Condusiv. 

1. To permanently solve this problem site-wide, download and install Undelete Server, which is extremely fast and simple, and doesn’t require a reboot to complete the installation (something you really don’t want to have to do on a server running databases or applications requiring constant uptime). 

 

 

2. Following installation, the first thing you’ll notice is that the Windows Recycle Bin has been replaced by the Undelete Recovery Bin. The Recovery Bin will not only capture files deleted from network shares, but also files overwritten on the user’s drive, files deleted between backups, and files deleted from the Command Prompt. 

3. Test it for yourself. Create a test file within a network drive shared folder and delete it. You’ll see that your file has, as you would expect, disappeared from the server as well. 

4. Open the Undelete Recovery Bin. You’ll be able to easily navigate to the shared folder from which you deleted the file—and there you’ll find it again. (if you are not an Admin, see Undelete Client below)

 

 

5. You can then select that file and recover it back to its original location, or even to a new location. 

 

 

 

 6. You’re done! That’s how easy it is.

 

Undelete Client

The above example demonstrates a user opening Undelete Server on the respective server to recover the file. Users, however, may not have access to the server, but a system administrator can certainly log on and open Undelete Server to recover the file. 

However, once Undelete is installed on a system, a user can open Undelete on the remote Network Share, follow the above steps, and view and recover their own files. 

 

Buy Undelete Instant Data Recovery now, and always be able to recover deleted files from network shares. 

 

Purchase Online Now https://www.condusiv.com/purchase/Undelete/

 

Request a Volume Quote https://learn.condusiv.com/Volume-Licensing-Undelete.html

 

Download a Free trial https://learn.condusiv.com/LP-Trialware-Undelete.html

Tags:

Data Recovery

Ransomware Protection Tips

by Gary Quan 7. October 2019 05:47

You hope that your systems never get attacked by Ransomware, but in case you do, you want to be prepared. One of the best ways to recover from such a malicious attack is to ensure you keep good and recent backups of your systems. But even with that, you can only recover back to the last known good backup. What about the files worked on since that last good backup? To fully recover from a Ransomware attack, you want those files recovered too. This is where Undelete® instant file recovery software can help, when set up properly. 

Undelete can provide a further level of recovery with its versioning and deleted file protection 

Undelete’s versioning capability can keep copies of files worked on since that last backup, plus any files created and deleted since that last backup.  This can help you recover new or updated files since the last backup completed. This latter feature of capturing deleted files can be extremely beneficial as there are some variants of Ransomware that copy the original files to an encrypted form, then delete the original file. In these cases, many of the deleted original files may be in Undelete Recovery Bin and available for recovery.  

But what about protecting the Undelete Recovery Bin from the Ransomware attack?

This is where the Common Recovery Bin feature can help.  By default, Undelete creates a Recovery Bin folder on each volume that it is protecting. All the versioned and deleted files from each volume are stored in the Recovery Bin folder on the respective volumes. With the Common Recovery Bin feature, you can select a single location on a different volume that will contain all of the versioned and deleted files from all of your protected volumes.  For example, you may want to set up a dedicated X: volume that contains the Recovery Bin files from all of the protected volumes. So, even if your main system volumes get affected by Ransomware, these other volumes may remain safe.  This is not a fail-safe protection against Ransomware, but just another deterrent against these Recovery Bin files getting infected. 

 

 

Athough you may have purchased or tried Undelete for its file recovery features for accidental user file deletions from local or network shares, it can also provide added recovery benefits from malicious attacks.

If you need additional Undelete licenses, you can contact your account manager or buy instantly online.

You can also download a free 30-day trial of Undelete.

Learn more about Undelete from this series of videos.

Undelete Saves Your Bacon, An In-depth Video Series

by Spencer Allingham 13. May 2019 03:43

Undelete® is a lot more than those simple file recovery utilities that just search through free space on Windows machines looking for recoverable data. Undelete does so much more; protecting files in network shared folders and capturing versions of any number of file types.

If you've ever had to rely on restoring from backup or a snapshots to get a deleted file back, watch now to find out how Undelete makes the recovery faster and more convenient on workstations, laptops and Windows servers.

Undelete, the world’s #1 file recovery software, as a first line of defense in your disaster recovery strategy can save your bacon!

“Undelete saved my bacon.” — Ken C, Cleveland State University

Why are some deleted files not in the Windows Recycle Bin?

Were you aware that the Windows Recycle Bin falls short of capturing all file deletions?

Whilst the Recycle Bin is very quick and convenient, it doesn’t capture:

· Files deleted from the Command Prompt

· Files deleted from within some applications

· Files deleted by network users from a Shared Folder

Undelete from Condusiv Technologies can capture ALL deletions, regardless of how they occur.

“It saved our bacon when a file on my system was accidentally deleted from another workstation. That recovery saved hours of work and sold us on the usefulness of the product.”

“Our entire commissions database was saved by the Undelete program. Very happy about that. We would have lost a week of commissions (over 2000 records easily). We were very grateful that we had your product." Frank B, Technical Manager, World Travel, Inc.

Watch this video for a demonstration of why the Recycle Bin falls short and how the Undelete software can pick up the slack and truly become the first line of defense in your disaster recovery strategy. 

What is Undelete File Versioning?

Have you ever accidentally overwritten a Microsoft Word document, spreadsheet or some other file?

Would it be helpful to have several versions of the same file available for recovery in the Windows Recycle Bin? Sorry, but the Recycle Bin can’t do that.

However, the Undelete Recovery Bin can!

“I'm glad I found yours -- it works very well, and the recovery really saved my bacon!” — John

Watch this video to see a demonstration of how capturing several versions of the same file when they get overwritten can really help save time as well as data.

Searching the Undelete Recovery Bin

Recover deleted files quickly and conveniently with Undelete’s easy search functions.

Even if you only know part of the file name, or aren’t sure what folder it was deleted from, see in this video how easy it is to find and recover the file that you need.

“I would recommend undelete as it has saved my bacon a couple of times when I was able to recover something that I deleted by accident.” — Joseph

Inclusion and Exclusion lists in Undelete

Find out how to use Inclusion and Exclusion Lists in the Undelete software to only capture those files that you really might want to recover and exclude all of those files that you don’t really care about.

Have you ever needed to get a file back that was deleted during a Windows Update? Probably not, so why have those files take up space in your Recovery Bin?

“It saved my bacon a few times.” — Jason

Watch this to see how configurable the Undelete Recovery Bin is.

Emergency Undelete Software

See a demonstration showing how easy it is to recover deleted files, even BEFORE you install the Undelete software from Condusiv Technologies.

Prevent that awful moment of extreme realization when you delete a file that isn’t backed up.

Oh! And if you’ve found this page because you need to recover a file right now, click here to get the free 30-day trialware of Undelete. We hope this helps you out of the jam!

“It has saved my bacon a couple of times when I was able to recover something that I deleted by accident.”

How to safely delete files before recycling your computer with Undelete

Want to get a new computer, but worry what would happen to your personal data if you recycled your old one, or sold it?

Watch now to see how to securely wipe your files from your computer’s hard drives with SecureDelete®, which is included in the Undelete software from Condusiv Technologies, before recycling your old computer, selling it, or passing it on to a friend.

We hope these videos help you navigate Undelete like a pro, and perhaps save your bacon, too!

Watch the Series - here!

Tags:

Data Protection | Data Recovery | File Protection | File Recovery | General | Undelete

Undelete 11 coming soon – User Feedback Drives New Features

by Gary Quan 4. January 2019 09:38

Soon to be released is a new major version of Undelete. I have been able to preview a pre-release version of this new Undelete and wanted to share the new enhancements. These changes were driven from current Undelete customer feedback looking for further improvement of the product. In a later blog, I will go into each new feature in more detail, but for now, I just wanted to briefly list some of these new features that will be soon available to you.

Ø  New User Interface: Undelete now has a familiar File Explorer-like interface that is easy to navigate, which makes it easy to find and recover deleted files.

o   The interface is also much faster and more responsive than before.

o   A Drag and Drop feature has been added to easily recover local files from the Undelete Recovery Bin.

 

Ø  Expanded File version protection: In previous Undelete editions, the popular ‘Versioning’ feature was limited to just Microsoft Office files. This versioning protection has been expanded to other file types.  This means that if you accidently save a new version of a file with incorrect changes, Undelete can help you go back to the previous version to recover from those unwanted changes.

Ø  Enhance Search Wizard: Expanded search capabilities have been added to help find the user’s deleted files in instances where the user cannot recall the name of the file or where it was located. This includes wild card names search capabilities, plus deleted date ranges, plus who deleted the file.

Ø  Inclusion List: For those users who only want specific deleted folders, file names, or file types to be protected, they can now specify them with this inclusion list capability.

Ø  Cloud Support: The Common Recovery Bin can now be stored or located in the cloud using OneDrive and other hosting capabilities. This has several benefits, including saving space on your local storage, plus protecting these recovery files from security threats like ransomware.

 I look forward to our customers using this new and improved release of Undelete.

Tags:

Data Protection | Cloud | Data Recovery | General | Undelete

Solving the IO Blender Effect with Software-Based Caching

by Spencer Allingham 5. July 2018 07:30

First, let me explain exactly what the IO Blender Effect is, and why it causes a problem in virtualized environments such as those from VMware or Microsoft’s Hyper-V.



This is typically what storage IO traffic would look like when everything is working well. You have the least number of storage IO packets, each carrying a large payload of data down to the storage. Because the data is arriving in large chunks at a time, the storage controller has the opportunity to create large stripes across its media, using the least number of storage-level operations before being able to acknowledge that the write has been successful.



Unfortunately, all too often the Windows Write Driver is forced to split data that it’s writing into many more, much smaller IO packets. These split IO situations cause data to be transferred far less efficiently, and this adds overhead to each write and subsequent read. Now that the storage controller is only receiving data in much smaller chunks at a time, it can only create much smaller stripes across its media, meaning many more storage operations are required to process each gigabyte of storage IO traffic.


This is not only true when writing data, but also if you need to read that data back at some later time.

But what does this really mean in real-world terms?

It means that an average gigabyte of storage IO traffic that should take perhaps 2,000 or 3,000 storage IO packets to complete, is now taking 30,000, or 40,000 storage IO packets instead. The data transfer has been split into many more, much smaller, fractured IO packets. Each storage IO operation that has to be generated takes a measurable amount of time and system resource to process, and so this is bad for performance! It will cause your workloads to run slower than they should, and this will worsen over time unless you perform some time and resource-costly maintenance.

So, what about the IO Blender Effect?

Well, the IO Blender Effect can amplify the performance penalty (or Windows IO Performance Tax) in a virtualized environment. Here’s how it works…

 

As the small, fractured IO traffic from several virtual machines passes through the physical host hypervisor (Hyper-V server or VMware ESX server), the hypervisor acts like a blender. It mixes these IO streams, which causes a randomization of the storage IO packets, before sending out what is now a chaotic mess of small, fractured and now very random IO streams out to the storage controller.

It doesn’t matter what type of storage you have on the back-end. It could be direct attached disks in the physical host machine, or a Storage Area Network (SAN), this type of storage IO profile couldn’t be less storage-friendly.

The storage is now only receiving data in small chunks at a time, and won’t understand the relationship between the packets, so it now only has the opportunity to create very small stripes across its media, and that unfortunately means many more storage operations are required before it can send an acknowledgement of the data transfer back up to the Windows operating system that originated it.

How can RAM caching alleviate the problem?

 

Firstly, to be truly effective the RAM caching needs to be done at the Windows operating system layer. This provides the shortest IO path for read IO requests that can be satisfied from server-side RAM, provisioned to each virtual machine. By satisfying as many “Hot Reads” from RAM as possible, you now have a situation where not only are those read requests being satisfied faster, but those requests are now not having to go out to storage. That means less storage IO packets for the hypervisor to blend.

Furthermore, the V-locity® caching software from Condusiv Technologies also employs a patented technology called IntelliWrite®. This intelligently helps the Windows Write Driver make better choices when writing data out to disk, which avoids many of the split IO situations that would then be made worse by the IO Blender Effect. You now get back to that ideal situation of healthy IO; large, sequential writes and reads.

Is RAM caching a disruptive solution?

 

No! Not at all, if done properly.

Condusiv’s V-locity software for virtualised environments is completely non-disruptive to live, running workloads such as SQL Servers, Microsoft Dynamics, Business Information (BI) solutions such as IBM Cognos, or other important workloads such as SAP, Oracle and the such.

In fact, all you need to do to test this for yourself is download a free trialware copy from:

www.condusiv.com/try

Just install it! There are no reboots required, and it will start working in just a couple of minutes. If you decide that it isn’t for you, then uninstall it just as easily. No reboots, no disruption!


RecentComments

Comment RSS

Month List

Calendar

<<  December 2019  >>
MoTuWeThFrSaSu
2526272829301
2345678
9101112131415
16171819202122
23242526272829
303112345

View posts in large calendar