• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
09 Oct

Swahili words

Swahili words you definitely didn’t Know!!!

  1. Password – Nywila
  2. Juice – Sharubati
  3. PhD – Uzamifu
  4. Masters – Uzamili
  5. Degree – Shahada
  6. Certificate- Astashahada
  7. Keyboard – Kicharazio
  8. Scanner – Mdaki
  9. Flash Disk – Diski Mweko
  10. Floppy disk – Diski tepetevu
  11. Computer Virus – Mtaliga
  12. ATM – Kiotamotela
  13. Business card – Kadikazi
  14. Scratch card – kadihela
  15. Simcard – kadiwia/mkamimo
  16. Memeory card – Kadi sakima
  17. Laptop – Kipakatarishi
  18. Power saw – Msumeno oto.
  19. Duplicating Maschine – Kirufu.
  20. Photocopier – Kinukuzi
  21. Calcualtor – Kikokotoo
  22. Toothpick – Kichokonoo
Share this
10 Sep

DIGITAL FORENSICS AND IT SECURITY

DIGITAL FORENSICS AND IT SECURITY


SEPTEMBER 30TH & 1TH OCTOBER  2015 PRIDE INN WESTLANDS NAIROBI
       East African Data Handlers is organizing an IT Security and Digital Forensics Training. This workshop will describes how IT Security controls will be implemented in the Organization and also aims to provide practical knowledge which will help in the security of computers, networks and its application. The workshop will go further and assist the trainees acquire skills on carrying out digital forensics cases.TO BOOK THIS TRAINING  ONLINE CLICK HERE

TRAINING DETAILS

DATE SEPTEMBER  30TH  & 1ST OCTOBER 2015
VENUE PRIDE INN WESTLANDS NAIROBI
TIME 8:30AM TO 4:30PM
FEES $600  PER PARTICIPANT

WHO SHOULD ATTEND

·         IT Managers

·         IT students

·         Fraud Examiners

·         Insurance fraud investigators

·         Bank examiners

·         Forensic accountants

·         Law enforcement personnel

·         Private Investigators

TO BOOK THIS TRAINING  ONLINE CLICK HERE

DETAILED COURSE CONTENT

Topics to be Covered·

  • Computer Forensics·
  •  Mobile Forensics
  • Evidence Seizure and preservance
  • Cryptography and
  • Steganography GRC (Governance,
  • Risk and compliance)
  • Basic threat intelligence
  • Basic incident response
  • Vulnerability assessment
  • Penetration testing
  • Hands-on session
Program

Day 1 

  • Computer Forensics
  • Mobile Forensics
  • Evidence Seizure and preservance
  •  Cryptography and Steganography
  • GRC (Governance, Risk and compliance)
  •  Q&A

Day 2

  • Basic threat intelligence
  • Basic incident response
  • Vulnerability assessment
  • Penetration testing
  • Hands-on

EAST AFRICAN DATA HANDLERS (K) Ltd

3rd Floor, Chiromo Court, Chiromo Road. Westlands. Nairobi
(-Tel: +254 (20) 3751400 |2 | 7 | CELL: +254 711 051000 7-Fax: +254 (20) 3751407
+-P.O. Box 42547 | 00100 GPO | Nairobi | KENYA
E-mail : info@datarecovery.co.ke  WEBSITE: www.eadatahandlers.co.ke

Share this
01 Sep

# 10 Tips to Treat your External Hard drive

# 10 Tips to Threat your External Hard drive – Currently, external hard disk have been increasingly used for portable data storage solution. However, not many users of external hard disk that knows how to treat external hard disk that is not quickly broken. Here are 10 tips to treat external hard disk is correctly

read more
Share this
27 Aug

3 Reasons Not to Sleep With Your Phone

Ever fall asleep while Insta-scrolling on your smartphone—or purposely leave it on your bed while you snooze? You’re not alone: 44% of cell phone owners have snoozed with their phone next to their bed to make sure they didn’t miss any crucial calls or texts, according to the Pew Internet Project. But while you may have good intentions, snuggling up to your phone could be hazardous to your health. Here’s why:

read more
Share this
26 Aug
25 Aug

Data Recovery Tanzania

Data Recovery Tanzania

East African Data Handlers  handles Any Type of Server, Any Type of Raid Level Data … tools and have the highest level of expertise to recover data from any storage .East African Data Handlers has a branch in Tanzania ” Data Handlers Africa Group” which  is also Africa’s No 1 in data recovery  in Tanzania  with Data recovery solutions and as a provider; they pride themselves to providing services that are unrivaled in the entire continent with over 5 years, experience, Data Handlers Africa Group have  been pioneering data recovery services for all types of media and systems. With a team of over 100 qualified engineers working in our different branches, we are uniquely positioned to provide you with a tailored solution for your data needs.Data Handlers Africa Group offers data recovery and data management software and services to clients in a wide range of sectors and circumstances, from commercial organisations, governments, charities and the public sector, through to home users. At Data Handlers Africa Group, they understand how important and valuable electronic data can be and we are dedicated to providing the best solutions available for tasks including data recovery, data destruction, archiving and analysis.As one of the most advanced and most experienced providers of data recovery and management products, Data Handlers Africa Group has a vast range of tools and knowledge to help businesses and consumers effectively recover, restore, erase and manage information on devices ranging from computers and servers, through to storage devices, disks and tapes or any complex environment of data recovery  in Tanzania Data Handlers Africa Group Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Most major Operating Systems are supported including Windows, Macintosh, UNIX, Linux, and Novell. Additional data recovery solutions include recovery from CD-ROM’s, Digital Media Recovery (such as digital pictures or music files), and E-mail recovery. Data Handlers Africa Group  also provides data protection, data backup, and data eraser software.So whether you’re a multinational corporation with loads of critical data that needs protection, or a home user who has lost some precious photos, Data Handlers Africa Group  as data recovery company  in Tanzania will be happy to help find a solution.Data Handlers Africa Group has over 1,000,000 satisfied customers across 7 countries in AfricaQuick path to  Data Recovery Services:

Media Type Data Type System Type
Hard Drive Data Recovery Email Data Recovery NAS & SAN Data Recovery
Tape Data Recovery Database Recovery RAID Data Recovery
SSD Data Recovery Digital Photo Recovery Operating System Recovery
Flash Drive Data Recovery Server Recovery Laptop Data Recovery
Mobile Device Data Recovery Desktop Data Recovery

You Can Visit them at www.datarecovery.co.tz

Online Help & Quote Request or call +255 689 646 652

Email: info@datarecovery.co.tz

Share this
25 Aug

Hacking of a Site Causes Death

Suicide of two people after Dating Site Hacking done!

Courtesy of (Alastair Sharp) (a Yahoo News Uk Writer )

TORONTO (Reuters) – At least two people may have committed suicide following the hacking of the Ashley Madison cheating website, Toronto police said on Monday, warning of a ripple effect that includes scams and extortion of clients desperate to stop the exposure of their infidelity.

Avid Life Media Inc, the parent company of the website, is offering a C$500,000 ($379,132) reward to catch the hackers.

In addition to the exposure of the Ashley Madison accounts of as many as 37 million users, the attack on the dating website for married people has sparked extortion attempts and at least two unconfirmed suicides, Toronto Police Acting Staff Superintendent Bryce Evans told a news conference.

The data dump contained email addresses of U.S. government officials, UK civil servants, and workers at European and North American corporations, taking already deep-seated fears about Internet security and data protection to a new level.

“Your actions are illegal and will not be tolerated. This is your wake-up call,” Evans said, addressing the so-called “Impact Team” hackers directly during the news conference.

“To the hacking community who engage in discussions on the dark web and who no doubt have information that could assist this investigation, we’re also appealing to you to do the right thing,” Evans said. “You know the Impact Team has crossed the line. Do the right thing and reach out to us.”

Police declined to provide any more details on the apparent suicides, saying they received unconfirmed reports on Monday morning.

“The social impact behind this (hacking) – we’re talking about families. We’re talking about their children, we’re talking about their wives, we’re talking about their male partners,” Evans told reporters.

“It’s going to have impacts on their lives. We’re now going to have hate crimes that are a result of this. There are so many things that are happening. The reality is … this is not the fun and games that has been portrayed.”

The investigation into the hacking has broadened to include international law enforcement, with the U.S. Department of Homeland Security joining last week. The U.S. Federal Bureau of Investigation and Canadian federal and provincial police are also assisting.

Evans also said the hacking has spawned online scams that fraudulently claim to be able to protect Ashley Madison clients’ data for a fee.

People are also attempting to extort Ashley Madison clients by threatening to send evidence of their membership directly to friends, family or colleagues, Evans said.

In a sign of Ashley Madison’s deepening woes following the breach, lawyers last week launched a class-action lawsuit seeking some $760 million in damages on behalf of Canadians whose information was leaked.

Evans said Avid Life first became aware of the breach on July 12, when several employees booted up their computers and received a message from the infiltrators accompanied by the playing of rock group AC/DC’s “Thunderstruck.”

The company went to police several days later, he said, while the hackers went public on July 20.

(Reporting by Alastair Sharp and Andrea Hopkins; Editing by Jeffrey Benkoe)

Share this
24 Aug

Windows 10 updates

Microsoft , the leader in PC operating system market , recently released windows 10. This new improved OS , is built from a blend of existing and old operating systems. Read this block to know truth about data recovery on this new OS.

read more
Share this
24 Aug

Digital Photo Recovery in Nairobi

Let your Loss be Recovered

The digital photography lets us capture one-time photo memories made to last a lifetime.Just as quickly as photos are captured, they can be gone in an instant. many professional photographers and digital camera users trust East African Data handlers  Data Recovery pro  services for their digital photo recovery and image recovery needs

  • Digital Photo Recovery Services offered;
    East African Data handlers Data Recovery engineers can  and usually recover lost, deleted, damaged, or inaccessible digital images immediately from a variety of storage locations such as digital cameras, computer hard drives, mobile phones, USB drives or other storage media.Our Engineers can also recover deleted photos, lost photos and images from a variety of data loss situations, including:Damaged digital cameras
    Damaged computer or hard drives
    Corrupt photo files
    Accidentally deleted photos
    Reformatted memory cards or hard drives
    Fire, water or other physical damage to
    media and storage devices

So don’t suffer  with your failed SD Card and look at how your captured memory is just going away from you

 

 

Share this
22 Aug

Database Recovery Process

The Database Recovery Process: Basic Concepts

Reconstructing the contents of all or part of a database from a backup typically involves two phases: retrieving a copy of the datafile from a backup, and reapplying changes to the file since the backup from the archived and online redo logs, to bring the database to a desired SCN since the backup (usually, the present).

To restore a datafile or control file from backup is to retrieve the file onto disk from a backup location on tape, disk or other media, and make it available to the database server.

To recover a datafile (also called performing recovery on a datafile), is to take a restored copy of the datafile and apply to it changes recorded in the database’s redo logs. To recover a whole database is to perform recovery on each of its datafiles.

Illustration of the Database Recovery Process:

Oracle Sample Figure Below illustrates the basic principle of backing up, restoring, and recovering a database. Most of the data recovery procedures supported by the Oracle database are variations on the process described here.

Restoring and Recovering a Database

databaserecoveryprocess

databaserecovery

Description of “Figure 1-1 Restoring and Recovering a Database  Courtesy of Oracle “

In this example a full backup of a database (copies of its datafiles and control file) is taken at SCN 100. Redo logs generated during the operation of the database capture all changes that occur between SCN 100 and SCN 500. Along the way, some logs fill and are archived. At SCN 500, the datafiles of the database are lost due to a media failure. The database is then returned to its transaction-consistent state at SCN 500, by restoring the datafiles from the backup taken at SCN 100, then applying the transactions captured in the archived and online redo logs and undoing the uncomitted transactions.

Share this

© 2015  East African Data Handlers. All rights reserved.