• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
05 Nov

Data Recovery Nairobi, Kenya Service

Data Recovery Nairobi, Kenya Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Nairobi, Kenya Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Kenya (Nairobi, Mombasa, Kisumu, Nakuru, Eldoret, Kitale, Lamu) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Nairobi, Kenya

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
05 Nov

Data Recovery Kampala, Uganda Service

Data Recovery Kampala, Uganda Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Kampala, Uganda Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Uganda (Kampala, Nansana, Kira, Makindye/Ssabagabo, Mukono, Mbarara, Mukono, Gulu, Lugazi, Masaka, Kasese, Hoima, Lira, Mityana, Mubende, Masindi, Mbale, Jinja, Kitgum, Entebbe, Njeru ) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Kampala, Uganda

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
31 Oct

Raid Recovery in Uganda

RAID Recovery  in Uganda

Are you looking for Raid Recovery in Uganda,  Raid Recovery in Kenya, Raid Recovery in Tanzania, Raid Recovery in Rwanda  do not struggle  East African Data Handlers we Recovers all types of corrupted RAID arrays.

Allow our Team of Experts to Recover data from corrupted RAID arrays with sophisticated tools. Our tools automatically detect the type of original RAID array that you have during RAID Recovery while allowing for fully manual operation.

Our RAID Recovery engineering team recover from all types of RAID arrays, whether hardware or software.

We Reconstruct all types of arrays just as easily as a single hard disk. Our Team of Experts know and can recognizes all imaginable configurations of various types of arrays, including RAID 0, 1, 0+1, 1+0, 1E, RAID 4, RAID 5, 50, 5EE, 5R, RAID 6, 60 and JBOD, no matter whether they are connected to a RAID server, a dedicated RAID controller or a RAID-enabled motherboard from NVidia®, Intel®, or VIA®.

Apple®, Linux® (NAS), Microsof® software RAIDs (also called Dynamic Disks) are also supported, including JBOD (span), RAID 0, 1, and 5 configurations, QNAP RAID, mdamd RAID. Product works with Adaptec®, HP®, Dell®, MegaRAID®, Silicon® RAID Controllers and DDF compatible devices. ZFS with RAIDZ are also supported. RAID Recovery™ works only under Windows but restores RAID that is running Mac OS, Unix, etc.

Step one is to detect the right type of an array

Our Team ensure they do this for vital and correct recovery process to start. They study the DiskInternals during the RAID Recovery process both manual and with the use of our fully automatic detection tools for essential parameters such as a type of array, type of RAID controller, stripe size, and disk order.

Step two is to assemble RAID configurations manually

We assemble RAID configurations manually via a simple drag-and-drop operation. Our Raid Recovery Tools re-constructs any array from the available hard disks and detects the right type and size or the array as well as the order of the disks automatically.

Special technical skills are required during this process to recover broken RAID arrays.

Our RAID Recovery Team gives our customers the best and top of the art method of Raid Data Recovery as a way to ensure all the data is recovered and the integrity maintained.

Be at peace knowing that our RAID Recovery method use advanced search algorithms to allow recovering important files such as documents, pictures, and multimedia even if there is a missing disk in the array, or if the file system is missing or damaged.

 

So if you are Located in Uganda we offer Uganda Raid Data Recovery.

Charges and Diagnosis

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

 

 

Share this
08 May

Surge of MegaCortex Ransomware attacks detected

Surge of MegaCortex Ransomware attacks detected

A new strain named MegaCortex.

A cyber-security firm in the UK has reported detecting a spike in ransomware attacks at the end of last week from a new strain named MegaCortex. The firm said the MegaCortex ransomware appears to have been designed to target large enterprise networks as part of carefully planned targeted intrusions – a tactic that is known as “big-game hunting.” The modus operandi is not new and has been the preferred method of delivering ransomware for almost half a year.

MegaCortex now joins an ever-growing list of ransomware strains that cyber-criminal groups are using only in targeted attacks, rather than with spam or other mass deployment techniques. The list includes some recognizable names, such as Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga, and Matrix.

SUDDEN RISE OF ATTACKS THIS MONTH.

According to a report released late Friday night 3rd May 2019, MegaCortex was first spotted back in late January, when someone uploaded a sample on malware scanning service VirusTotal.

Since then, the number of attacks has been growing, but they spiked mid last week when the firm says it detected 47 attacks – accounting for two-thirds of all the 76 MegaCortex attacks the company has seen all year.

The firm says it blocked the attacks it detected, which originated from enterprise networks located in the United States, Canada, the Netherlands, Ireland, Italy, and France. However, other megacortex attacks might have occurred in other places where the UK antivirus vendor had no coverage.

 

 

Share this
15 May

Facebook Messenger Spam and scam is targeting its victims via a video link malware

Facebook Messenger Spam & Scam Spreading Malicious Chrome Extensions, Adware

Beware Facebook Messenger users, as cybercriminals are targeting victims by spreading malware through links sent by their friends.

The malware campaign was discovered by David Jacoby, a senior security researcher in the global research and analysis team at Kaspersky Lab, who was himself targeted after a Facebook friend with whom he rarely interacts, sent a link to a purported video file in Messenger.

After just a few minutes analyzing the message, I understood that I was just peeking at the top of this iceberg. This malware was spreading via Facebook Messenger, serving multi platform malware/adware, using tons of domains to prevent tracking, and earning clicks,” David said.

So, how does this malware spread? Apparently, the malicious message containing a bit.ly or t.cn link and the name of the user plus the word “Video” arrives through one of your friends account on Messenger to make the potential victims believe that it is a legitimate video link. When the victim clicks on the link, it will take the user to a Google Docs page that has a screenshot photo of that Facebook friend. The message is made to look like a playable movie.

But when clicked on that video, the victim is redirected to external sites depending on their browser, location and operating system that ultimately attempt to lure them into installing the malware. This malicious software, if downloaded, will cause the victim to spread the virus to their contacts on Facebook Messenger.

By doing this, it basically moves your browser through a set of websites and, using tracking cookies, monitors your activity, displays certain ads for you and even, in some cases, social engineers you to click on links,” Jacoby writes.

 

facebook_messenger_malware

For example, a Google Chrome user is redirected to a fake YouTube page with a fake error message designed to push the user in downloading a malicious Chrome extension.

Meanwhile, on Firefox, the users get directed to a website displaying a fake Flash Update notice, which attempts to run a Windows executable to deliver the adware. Since this malware is cross-platform, it affects MacOS Safari too and offers the download of a .dmg file, which is also adware.

It is unclear how the malware spreads via Messenger.

The initial spreading mechanism seems to be Facebook Messenger, but how it actually spreads via Messenger is still unknown. It may be from stolen credentials, hijacked browsers or clickjacking,” David speculated.

The people behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts,” said David.

We know that clicking on unknown links is not recommended, but through this technique they basically force you to do so.

Please make sure that you don’t click on these links, and please update your antivirus!,” added David.

When ZDNet got in touch with Facebook regarding the matter, a spokesperson for the social media giant said: “We maintain a number of automated systems to help stop harmful links and files from appearing on Facebook.

“If we suspect your computer is infected with malware, we will provide you with a free antivirus scan from our trusted partners. We share tips on how to stay secure and links to these scanners on facebook.com/help.

Source: ZDNet

Share this
17 Oct

Should you leave your smartphone plugged into the charger overnight? We asked an expert

 

 

 

 

 

 

 

 

chargingaphone

Should you leave your smartphone plugged into the charger overnight?

It’s an issue that has plagued humanity since the dawn of the mobile phone. We use our trusty pocket computers so much that they rarely get through a day with any power left. Many of us plug them in at night and fall asleep, content in the knowledge that we’ll wake up to a fully charged device.

But is it really safe to leave our phones plugged into the charger once they’re fully charged? Is it damaging the battery — or shortening its lifespan?

There are lots of myths and questionable ideas on this topic. You’ll find the Internet awash with opinions masquerading as facts. What’s the truth? We’ve got some answers for you.

Should you leave your phone plugged into the charger overnight?

“Leaving your phone plugged in overnight is okay to do, it will not drastically harm your device,” says Shane Broesky, co-founder of Farbe Technik, a company that makes charging accessories. “Your phone is very smart. Once it’s fully charged, it knows when to stop the current from coming in to protect your phone from overcharging.”

Eventually the battery is going to noticeably degrade.

So far so good, but there are situations when leaving that smartphone plugged in overnight can slowly reduce the lifespan of your battery.

“Lithium-ion batteries can react poorly if your phone experiences elevated temperatures, leading to a damaging effect,” explains Shane. “If you have a case on your device that does not allow heat to escape, this heat will increase the temperature of the battery and will cause cell oxidation, which will shrink the capacity and shorten the lifespan.”

Make sure you take your phone case off at night if you’re going to leave your phone plugged in and charging, in other words.

What’s the optimum way to charge your phone?

“The sweet spot for lithium-ion batteries is to keep them charged between 50 and 80 percent. This allows for the charged ions to continue to work and protect the life of your battery,” says Shane. “Charging your device in short spurts throughout the day will give these ions just enough energy to keep them going.”

So frequent top-ups, rather than one daily charge up, is healthier for your battery. It’s not convenient, but that’s the optimal way to charge your smartphone if you want to ensure the longest life possible.

What to avoid

“The major threat to your battery is charge cycles,” Shane explains. “A charge cycle is where your battery goes from empty or near-empty to full — and every phone battery has a limited number of charge cycles before the end of its life.”

leaving-your-phone-charging-2

Denys Prykhodov/Shutterstock

You may have a high number of charge cycles before that limit is reached, but eventually the battery is going to noticeably degrade. When it does, you’ll find that it lasts only a very short amount of time, or it will simply not turn on at all.

“Try to avoid going from 0 to 100 percent whenever possible, this will start to break down your battery and give your device a shorter lifespan.” Shane suggests.

Use quality accessories

There’s one other factor to consider when charging your smartphone and it concerns the quality of the accessories you use. It’s always best to use the charger and cable that shipped with your smartphone. Failing that, you can buy another official charger and cable.

Cheap counterfeits are not built with safety in mind and can be very dangerous.

Sometimes official chargers and cables are eye-wateringly expensive. But you can find reputable alternatives. Manufacturers like Farbe Technik produce safe accessories that are fully tested, certified by the likes of Apple and Samsung, and compliant with legislation. If you are going to buy a charger from a third-party just make sure to stick to big brand names.

It’s also important to ensure that the charger and cable you buy has the correct rating. Cross-check the amp or watt rating with your phone’s specifications.

 

The real risks are found at the cheap end of the market. Cheap counterfeits are not built with safety in mind and can be very dangerous. They often don’t meet safety standards. The London Fire Brigade released a report last year warning about the dangers of electrocution, burns, and even house fires after a number of incidents caused by counterfeit iPhone chargers. The report also offers some advice on how to spot fakes.

Quick recap

You can leave your phone plugged into the charger overnight without too much risk, provided it’s not a counterfeit charger, and you don’t let your phone overheat. For best results with your smartphone charging, here’s what to remember:

  • Always use official chargers and cables, or certified alternatives from reputable brands and retailers.
  • Don’t let your phone get too hot. Remove the case when charging overnight.
  • For the longest battery life possible, try to keep your battery between 50 and 80 percent.
  • Avoid letting phone battery completely discharge, and don’t charge it from 0 percent up to 100 percent too often.

 

Courtesy of  DIGITRENDS

Contact us now

If you’ve lost valuable, irreplaceable mobile data   or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this
20 Jun

Top 5 Causes of Android Data loss –

Top 5 Causes of Android Data Loss – Android Data Recovery

Android smart phone is one of the most marvelous handheld devices on the planet. It takes pictures, surfs the net and keeps you in touch with all your friends and acquaintances. But, what happens if your marvelous wonder machine loses all your data? Phone numbers that no one bothers to remember anymore or the pictures you just tool of your child’s first steps. It can all be gone in an instant and today we will talk about top 5 causes of Android data loss how you can lost everything.

Cause 1: Upgrade

Many people today are upgrading their Android device

es to the latest Android OS version. Unfortunately, in a number of instances all the personal information is erased after the OS update. This means you have to re-enter everything by hand all over again. This can take many hours and often you will not be able to put it all back as most don’t keep their contacts and phone lists up to date in hard copy.

Cause 2: Theft

You can lose your Android device through a number of mishaps such as dropping it into a lake, river or pond. It could be stolen or it just may fall out of your pocket at the train station, bus stop and checkout counter at your local supermarket.

Cause 3: Human error

Sorry to say most data is lost by accident when someone deletes it by mistake. You mean to delete one item and you chose the wrong one in error. Now you are missing a vital phone number or a special picture that is very precious to you and your memories. This is probably the most common occurrence that cases Android data loss.

Cause 4: Jailbreak

Some attempt to get more out of their Android and they go to see their local Android teachs. These individuals can unlock features that you might never have been aware of before you visit them. However, one of the side effects is that all your data can vanish as a result.

Cause 5: Replacing the battery

Believe it or not, a simple thing such as replacing your battery can cause your Android phone to lose all of your personal information and you have to start all over again as in some instances it resets the Android back to its original factory settings.
Then, what if you lose important data from your Android phone? East African Data Handlers are capable of recovering your lost data no matter how you lost it. Our  available technology is able to solve the Android data recovery problem as easy as pie. We will assist you to recover not only photos and videos, but also text messages and contacts from Android phone or tablet. We use our Android data recovery technology directly to recover lost files from Android device, or even can also restore formatted or deleted data from the SD card on your Android mobile.

No matter how your Android data was lost or deleted, our technology can scan and recover them for you without any hassle.

Contact us now

If you’ve lost valuable, irreplaceable mobile data   or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this
07 Jun

How to prevent Locky ransomware

How to prevent Locky ransomware

Remember that preventing Locky and extortion-ware like it is simply a matter of user discipline and an awareness of how malware can be contracted. The first consideration for stopping infections is to maintain an up-to-date system. This includes operating system security patches and ensuring that you’re using the latest version of your browser; place browser settings to their highest that still allow access required and warn of hazardous ‘site content. Disallow all add-ons, plugins and extensions. Install a good firewall that will cover ALL routes – including remote and networking connections; set this to disallow communication on Tor and I2P networks (so that if a trojan does gain entry, it cannot communicate and execute), block unauthorized port use. Get the best security software possible that will carry out in-depth scans. For good measure, make backups as regularly as possible to external storage.

lockyvirus

The next consideration is settings, or privilege. On a network of any size – family or business – do not use the Administrator log-in for general use, or stay logged-in for longer than necessary in this capacity. It’s safer to give the username/password to everyone who may need it with the instructions to log-off when a task is completed. Allow strictest Admin privileges that still enable the network to function (see the Microsoft website for more detail on this).

lockyvirus2

The easiest element of prevention is good working practice – though perhaps this is sometimes the most difficult to enforce or adhere to. Bear in mind the delivery routes mentioned above. In the case of the e-mail delivery threat, depending on a system, set ‘mail to highest security. Ensure that all users are aware of the risks of opening unsolicited ‘mail. Disallow ActiveX (macro) function for all Microsoft Office applications. Find a method to filter incoming containing attachments and preview if neccessary by left-clicking and viewing Source in Properties which will supply the body of the text and display any hidden attachments without actually opening the file (DO NOT preview in Print Preview, as this can execute some malware).
Stay organized and up-to-date – don’t let this current threat know your business!

macroslocky

Contact us now

If you’ve lost valuable, irreplaceable data   or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this
17 Mar

Data Disaster Recovery Plan

Data Disaster Recovery Plan

Did you know that no organization looks forward to the day they implement their Data Disaster Recovery Plan. But like any good insurance policy, Data Disaster Recovery Plan is an essential component of business continuity and preservation.

Am sure most people understand that much or have an idea. Where organizations often fall short, however, is the details and preparation. The only thing worse than having no plan at all is not going through the proper research and review prior to the event that takes you offline.

Point of advice , don’t find yourself stuck like the character ” Kamau” as illustrated in the image. Get your facts right! and start the process now while keeping in mind these six, baseline items:

1 – Identify and plan for your most critical assets.

Because of the high resource requirements of a good Data Disaster Recovery Plan, focus only on the processes and applications that are most crucial to your business while you restore normal operations. For many companies, those may be customer-facing applications and systems like e-commerce sites or portals. Applications like email, while important, may take a secondary position, and systems for internal use only – like HR or accounting applications – may fill out a third tier.

2 – Determine RPO/RTO.

The Recovery Point Objective (RPO) is the maximum amount of time your business can tolerate between data backups. If your RPO is one day, that means you can survive losing one day’s worth of data, but no more. Your Recovery Time Objective (RTO), on the other hand, is the target for restoring regular service after the disaster strikes. Neither metric is arbitrary, and you’ll likely have to crunch a lot of numbers and coordinate with virtually every business unit to determine the most accurate objectives.

3 – Scope out the technical mechanics.

The hybrid era of IT, for all its benefits, only makes Data Disaster Recovery Plan planning more difficult. Critical business processes and applications exist in a complex web of interdependencies. You’ll have to map relationships across server, storage and network infrastructure and develop accurate scripts to ensure apps function like they’re supposed to in the recovery environment.

4 – Select an appropriate failover site.

Traditional Data Disaster Recovery Plan requires redundant infrastructure in which to failover. Not only is this pricey, you have to choose a site that makes sense geographically (i.e. – low odds of being affected by same event) and offers an SLA that’s up to your current standards.

5 – Take advantage of the cloud.

For many organizations, designing a robust Data Disaster Recovery Plan is significantly impeded due to extremely high cost and resource requirements. Data Disaster Recovery Plan as a Service (DRaaS), however, is a cloud-based solution that eliminates the heavy capital expense, putting Disaster Recovery within reach of companies unable to acquire the redundant infrastructure needed to restore service. EADH offers a comprehensive DRaaS solution for hosted private cloud customers that includes seamless failover and failback, an RPO within seconds, and an RTO within minutes.

6 – Document, Test, Refine.

This is the hat trick of ensuring effective execution. Each of these components is critical. Your plan needs to be specific and detailed. Plans, procedures, responsibilities and check lists should be clearly documented. You want your team to have clear marching orders and leave little to interpretation in the middle of a crisis.

Call us now and dont be a victim of disaster like Kamau and you are hit when least expecting with a huge cost waiting for you only if he had a Data Disaster Recovery Plan.

Contact us now

If you’ve lost valuable, irreplaceable data   or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this

© 2015  East African Data Handlers. All rights reserved.