• NO Processing Fee, No Diagnosis Fee, NO Data No Charge
05 Nov

Data Recovery Nairobi, Kenya Service

Data Recovery Nairobi, Kenya Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Nairobi, Kenya Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Kenya (Nairobi, Mombasa, Kisumu, Nakuru, Eldoret, Kitale, Lamu) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Nairobi, Kenya

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
05 Nov

Data Recovery Kampala, Uganda Service

Data Recovery Kampala, Uganda Service

Do you know before you dump the storage drive we probably can still save it for you?

Are you looking for Data Recovery Kampala, Uganda Service ? East African Data Handlers Ltd- Has the most successful data recovery rate in Africa as one of the best company.

Our reach

Have you Lost your Data? Are you in Uganda (Kampala, Nansana, Kira, Makindye/Ssabagabo, Mukono, Mbarara, Mukono, Gulu, Lugazi, Masaka, Kasese, Hoima, Lira, Mityana, Mubende, Masindi, Mbale, Jinja, Kitgum, Entebbe, Njeru ) and in any Country of East Africa. East African Data Handlers have you covered ,we are skilled in doing data recovery for all types of storage device;

East African Data Handlers Ltd is among world leader in data recovery services.

We have a team of the  most educated and skilled engineers with knowledge of advanced  tools used in Data recovery and have the highest level of expertise to recover data from any storage media exist in the world.

As a result, we have the highest success rate having a full recovery in the industry. You Can follow us

At East African Data Handlers Ltd – In our Data Recovery labs, we guarantee no -destructive data recovery services to your devices in using our  methods of recovery  hence you get your drive in the same condition it was received.

Our Policy of Charging:

-We offer

1) Free Evaluation on Data Recovery Service. : The fees are determined by

-the drive’s logical problem or physical  damage ,

-the time/expertise needed and the nature of the failure.

Please be assured our attempt is simple and cost-effective approaches before getting into the more involved procedures.

Hence we are Proud to offer you our services at Kampala

Data Recovery Kampala, Uganda

Our Guarantee

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

Share this
31 Oct

Raid Recovery in Uganda

RAID Recovery  in Uganda

Are you looking for Raid Recovery in Uganda,  Raid Recovery in Kenya, Raid Recovery in Tanzania, Raid Recovery in Rwanda  do not struggle  East African Data Handlers we Recovers all types of corrupted RAID arrays.

Allow our Team of Experts to Recover data from corrupted RAID arrays with sophisticated tools. Our tools automatically detect the type of original RAID array that you have during RAID Recovery while allowing for fully manual operation.

Our RAID Recovery engineering team recover from all types of RAID arrays, whether hardware or software.

We Reconstruct all types of arrays just as easily as a single hard disk. Our Team of Experts know and can recognizes all imaginable configurations of various types of arrays, including RAID 0, 1, 0+1, 1+0, 1E, RAID 4, RAID 5, 50, 5EE, 5R, RAID 6, 60 and JBOD, no matter whether they are connected to a RAID server, a dedicated RAID controller or a RAID-enabled motherboard from NVidia®, Intel®, or VIA®.

Apple®, Linux® (NAS), Microsof® software RAIDs (also called Dynamic Disks) are also supported, including JBOD (span), RAID 0, 1, and 5 configurations, QNAP RAID, mdamd RAID. Product works with Adaptec®, HP®, Dell®, MegaRAID®, Silicon® RAID Controllers and DDF compatible devices. ZFS with RAIDZ are also supported. RAID Recovery™ works only under Windows but restores RAID that is running Mac OS, Unix, etc.

Step one is to detect the right type of an array

Our Team ensure they do this for vital and correct recovery process to start. They study the DiskInternals during the RAID Recovery process both manual and with the use of our fully automatic detection tools for essential parameters such as a type of array, type of RAID controller, stripe size, and disk order.

Step two is to assemble RAID configurations manually

We assemble RAID configurations manually via a simple drag-and-drop operation. Our Raid Recovery Tools re-constructs any array from the available hard disks and detects the right type and size or the array as well as the order of the disks automatically.

Special technical skills are required during this process to recover broken RAID arrays.

Our RAID Recovery Team gives our customers the best and top of the art method of Raid Data Recovery as a way to ensure all the data is recovered and the integrity maintained.

Be at peace knowing that our RAID Recovery method use advanced search algorithms to allow recovering important files such as documents, pictures, and multimedia even if there is a missing disk in the array, or if the file system is missing or damaged.

 

So if you are Located in Uganda we offer Uganda Raid Data Recovery.

Charges and Diagnosis

East African Data Handlers ltd  Follows no data – no charge policy meaning  you owe us nothing if we are unable to recover your critical files. We understand that no Data is Lost and our team of engineers know how to retrieve it back. Our network reach in the whole of East Africa.  Following Devices; Hard DrivesLaptopsDesktopsRaid SystemsRAID / NAS / SAN , ServersMemory Cards, Flash Drives, DatabasesSSD Drives etc

Call 0711 051 000.

 

 

Share this
08 May

Surge of MegaCortex Ransomware attacks detected

Surge of MegaCortex Ransomware attacks detected

A new strain named MegaCortex.

A cyber-security firm in the UK has reported detecting a spike in ransomware attacks at the end of last week from a new strain named MegaCortex. The firm said the MegaCortex ransomware appears to have been designed to target large enterprise networks as part of carefully planned targeted intrusions – a tactic that is known as “big-game hunting.” The modus operandi is not new and has been the preferred method of delivering ransomware for almost half a year.

MegaCortex now joins an ever-growing list of ransomware strains that cyber-criminal groups are using only in targeted attacks, rather than with spam or other mass deployment techniques. The list includes some recognizable names, such as Ryuk, Bitpaymer, Dharma, SamSam, LockerGoga, and Matrix.

SUDDEN RISE OF ATTACKS THIS MONTH.

According to a report released late Friday night 3rd May 2019, MegaCortex was first spotted back in late January, when someone uploaded a sample on malware scanning service VirusTotal.

Since then, the number of attacks has been growing, but they spiked mid last week when the firm says it detected 47 attacks – accounting for two-thirds of all the 76 MegaCortex attacks the company has seen all year.

The firm says it blocked the attacks it detected, which originated from enterprise networks located in the United States, Canada, the Netherlands, Ireland, Italy, and France. However, other megacortex attacks might have occurred in other places where the UK antivirus vendor had no coverage.

 

 

Share this
15 May

Facebook Messenger Spam and scam is targeting its victims via a video link malware

Facebook Messenger Spam & Scam Spreading Malicious Chrome Extensions, Adware

Beware Facebook Messenger users, as cybercriminals are targeting victims by spreading malware through links sent by their friends.

The malware campaign was discovered by David Jacoby, a senior security researcher in the global research and analysis team at Kaspersky Lab, who was himself targeted after a Facebook friend with whom he rarely interacts, sent a link to a purported video file in Messenger.

After just a few minutes analyzing the message, I understood that I was just peeking at the top of this iceberg. This malware was spreading via Facebook Messenger, serving multi platform malware/adware, using tons of domains to prevent tracking, and earning clicks,” David said.

So, how does this malware spread? Apparently, the malicious message containing a bit.ly or t.cn link and the name of the user plus the word “Video” arrives through one of your friends account on Messenger to make the potential victims believe that it is a legitimate video link. When the victim clicks on the link, it will take the user to a Google Docs page that has a screenshot photo of that Facebook friend. The message is made to look like a playable movie.

But when clicked on that video, the victim is redirected to external sites depending on their browser, location and operating system that ultimately attempt to lure them into installing the malware. This malicious software, if downloaded, will cause the victim to spread the virus to their contacts on Facebook Messenger.

By doing this, it basically moves your browser through a set of websites and, using tracking cookies, monitors your activity, displays certain ads for you and even, in some cases, social engineers you to click on links,” Jacoby writes.

 

facebook_messenger_malware

For example, a Google Chrome user is redirected to a fake YouTube page with a fake error message designed to push the user in downloading a malicious Chrome extension.

Meanwhile, on Firefox, the users get directed to a website displaying a fake Flash Update notice, which attempts to run a Windows executable to deliver the adware. Since this malware is cross-platform, it affects MacOS Safari too and offers the download of a .dmg file, which is also adware.

It is unclear how the malware spreads via Messenger.

The initial spreading mechanism seems to be Facebook Messenger, but how it actually spreads via Messenger is still unknown. It may be from stolen credentials, hijacked browsers or clickjacking,” David speculated.

The people behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts,” said David.

We know that clicking on unknown links is not recommended, but through this technique they basically force you to do so.

Please make sure that you don’t click on these links, and please update your antivirus!,” added David.

When ZDNet got in touch with Facebook regarding the matter, a spokesperson for the social media giant said: “We maintain a number of automated systems to help stop harmful links and files from appearing on Facebook.

“If we suspect your computer is infected with malware, we will provide you with a free antivirus scan from our trusted partners. We share tips on how to stay secure and links to these scanners on facebook.com/help.

Source: ZDNet

Share this
17 Oct

Should you leave your smartphone plugged into the charger overnight? We asked an expert

 

 

 

 

 

 

 

 

chargingaphone

Should you leave your smartphone plugged into the charger overnight?

It’s an issue that has plagued humanity since the dawn of the mobile phone. We use our trusty pocket computers so much that they rarely get through a day with any power left. Many of us plug them in at night and fall asleep, content in the knowledge that we’ll wake up to a fully charged device.

But is it really safe to leave our phones plugged into the charger once they’re fully charged? Is it damaging the battery — or shortening its lifespan?

There are lots of myths and questionable ideas on this topic. You’ll find the Internet awash with opinions masquerading as facts. What’s the truth? We’ve got some answers for you.

Should you leave your phone plugged into the charger overnight?

“Leaving your phone plugged in overnight is okay to do, it will not drastically harm your device,” says Shane Broesky, co-founder of Farbe Technik, a company that makes charging accessories. “Your phone is very smart. Once it’s fully charged, it knows when to stop the current from coming in to protect your phone from overcharging.”

Eventually the battery is going to noticeably degrade.

So far so good, but there are situations when leaving that smartphone plugged in overnight can slowly reduce the lifespan of your battery.

“Lithium-ion batteries can react poorly if your phone experiences elevated temperatures, leading to a damaging effect,” explains Shane. “If you have a case on your device that does not allow heat to escape, this heat will increase the temperature of the battery and will cause cell oxidation, which will shrink the capacity and shorten the lifespan.”

Make sure you take your phone case off at night if you’re going to leave your phone plugged in and charging, in other words.

What’s the optimum way to charge your phone?

“The sweet spot for lithium-ion batteries is to keep them charged between 50 and 80 percent. This allows for the charged ions to continue to work and protect the life of your battery,” says Shane. “Charging your device in short spurts throughout the day will give these ions just enough energy to keep them going.”

So frequent top-ups, rather than one daily charge up, is healthier for your battery. It’s not convenient, but that’s the optimal way to charge your smartphone if you want to ensure the longest life possible.

What to avoid

“The major threat to your battery is charge cycles,” Shane explains. “A charge cycle is where your battery goes from empty or near-empty to full — and every phone battery has a limited number of charge cycles before the end of its life.”

leaving-your-phone-charging-2

Denys Prykhodov/Shutterstock

You may have a high number of charge cycles before that limit is reached, but eventually the battery is going to noticeably degrade. When it does, you’ll find that it lasts only a very short amount of time, or it will simply not turn on at all.

“Try to avoid going from 0 to 100 percent whenever possible, this will start to break down your battery and give your device a shorter lifespan.” Shane suggests.

Use quality accessories

There’s one other factor to consider when charging your smartphone and it concerns the quality of the accessories you use. It’s always best to use the charger and cable that shipped with your smartphone. Failing that, you can buy another official charger and cable.

Cheap counterfeits are not built with safety in mind and can be very dangerous.

Sometimes official chargers and cables are eye-wateringly expensive. But you can find reputable alternatives. Manufacturers like Farbe Technik produce safe accessories that are fully tested, certified by the likes of Apple and Samsung, and compliant with legislation. If you are going to buy a charger from a third-party just make sure to stick to big brand names.

It’s also important to ensure that the charger and cable you buy has the correct rating. Cross-check the amp or watt rating with your phone’s specifications.

 

The real risks are found at the cheap end of the market. Cheap counterfeits are not built with safety in mind and can be very dangerous. They often don’t meet safety standards. The London Fire Brigade released a report last year warning about the dangers of electrocution, burns, and even house fires after a number of incidents caused by counterfeit iPhone chargers. The report also offers some advice on how to spot fakes.

Quick recap

You can leave your phone plugged into the charger overnight without too much risk, provided it’s not a counterfeit charger, and you don’t let your phone overheat. For best results with your smartphone charging, here’s what to remember:

  • Always use official chargers and cables, or certified alternatives from reputable brands and retailers.
  • Don’t let your phone get too hot. Remove the case when charging overnight.
  • For the longest battery life possible, try to keep your battery between 50 and 80 percent.
  • Avoid letting phone battery completely discharge, and don’t charge it from 0 percent up to 100 percent too often.

 

Courtesy of  DIGITRENDS

Contact us now

If you’ve lost valuable, irreplaceable mobile data   or need Data Recovery Plan for your Oraganisation or business— We can save it! Call us now at +254 711 051 000 or visit our offices Chiromo Court 3rd Floor Westlands, Kenya. Best of it, we have distributed offices all over East Africa and can easily get your device brought to us from anywhere in East Africa.

Also  we have other services in data recovery for various  devices; Hard Drives, Laptops, Desktops, Raid SystemsRAID / NAS / SAN , Servers, Memory Cards, Flash Drives, Databases, SSD Drives etc

East African Data Handlers ltd  no data – no charge policy means you owe us nothing if we are unable to recover your critical files.

Share this
13 Oct
15 Aug

9 Ways to Lose Your Data

9 Ways to Lose Your Data

Every time I hear this , “Hey the database is almost crashing – and please we can’t have our data lost or the downtime affected,” I just smile and shake my head because to a layman  honestly,  technology is seriously difficult.

Ok to illustrate, here’s a collection of client stories i happen to get from the internet

1) The DBCC CHECKDB job ran every week just like it was supposed to – but it failed due to corruption every week. No one got email alerts because the SQL Agent mail was no longer valid – internal email server changes meant the mail was just piling up in SQL Server. CHECKDB had been failing for three years, longer than the backups were kept. Data was permanently lost.
2)  The DBA configured his backups to write to a file share. The sysadmins never understood they were supposed to back up that file share. When the DBA asked for a restore, he was surprised to find there were no backups.
3) Three SQL Servers were all replicating data to each other. When I asked the DBA where the backups were run, he looked at one server, then another, then the third. He sheepishly admitted – in front of his manager – that there were no backups done anywhere.
4) The DBA set up full backups daily, plus log backups of all databases in full recovery mode. Later, she put a few databases into simple recovery mode in order to fix an issue. She forgot to put them back into full recovery mode. When problems struck and she needed to recover a database, she lost all data back to the prior full backup.
5) The SQL Server ran out of space on the C drive. During emergency troubleshooting, someone deleted a bunch of BAK files. The server started up, but databases were offline and corrupt. Turned out the user databases were on the C drive, as were all of the backups – the very backups that were just deleted to free up space.
6) The DBA started getting odd corruption errors on one of his servers, then more, and quickly all of them. The SAN admin had flashed the storage with new firmware – which had a bug. The DBA was writing his backups to that same SAN, and sure enough, some of the corrupt databases had corrupt backups too.
7) The admin wanted to restore the production databases onto another server. He tried, but it kept saying the files were in use. He stopped the SQL Server service, deleted the files, started it again, and finally his restore worked – but his phone lit up. Turned out he’d remote desk topped into the wrong server – he was on production.
8) The developer did a deployment on Friday afternoon, tested it, and went home. However, the deployment had an UPDATE script that wrote invalid data to a percentage of the rows in a critical table. Over the weekend, people worked in that table, putting in valid data and changing some invalid data. On Monday, by the time the team figured out what had happened, the data in the table was a total mess – with real valuable data that shouldn’t be restored over.
9) The team built a complex Always Availability Groups infrastructure for really reliable databases, and full backups every night, and log backups every 4 hours. When someone accidentally issued a delete statement, that delete was instantly replicated across to the other replica. They could still recover back to a point in time – but it meant serious downtime for the AG since you can’t restore databases in an AG. While they debated what to do, more valid data went into their production database – meaning they could no longer simply do a point-in-time restore.

Each of these teams thought their data was safe.

They were wrong.

Kendra says: OK, I’ve got to admit it– I’ve been part of teams where we’ve fallen victim to more than one of these scenarios. And I work on teams with smart people! This can happen to you, look at these stories and your own environment slowly and carefully.

So if you are like me, a little precaution when it comes to saving your data is important: Things you must have on your phone record:

  • Disaster Data Rescue team ( You can count on us East African Data handlers )
  • Capital for Data recovery services ( This is like an insurance to safeguard your data )
Share this

© 2015  East African Data Handlers. All rights reserved.