Our Data Recovery Specialist will take several careful steps to identify and attempt to retrieve possible data that may exist on a subject computer system:
Apple’s iPhone is one of the most advanced mobile phone handsets available today. iPhones are pretty well locked down by design, which can make data recovery difficult, and in some cases impossible. There are however a number of scenarios where recovery is possible.
No matter what the physical or logical condition of your laptop may be, we at Infinity Forensics can fix it. We offer the highest Data Recovery rate in minimum time. The Data Recovery Services offered by us are one of its kind.
Operation System Infinity forensics can recover:
The Hard Drive Data Recovery is carried out at Mentari Setia quite efficiently. When it comes to Data Recovery then we leave no stone untouched. Hard drive can get corrupted due to many reasons including the following:
No matter what the physical or logical condition of your Hard Disk Drive may be, we at Mentari Setia can fix it. We offer the highest Data Recovery rate in minimum time. The Data Recovery Services offered by us are one of its kind.
Operation System Mentari Setia can recover:
Mentari Setia data recovery labs will examine your storage media in our class clean room environment where an engineer assigned to your case will look closely at all components both internally and externally such as the hard drive PCB to the head stack assembly if required. If a failed component is discovered it is replaced then the hard drive is retested to functionality and moved to our cloning and imaging department where an image is created of the media from the beginning to the end of the user data area.
Our engineers can work directly with this raw image on a hex level byte by byte if required and repair any logical issues the image is then mounted and launched to check file integrity.
So if you have been the victim of data loss then have no fear as we are here to bring happiness back into your life, just count on us and contact us before the situation is out of control.
Mentari Setia Desktop Data Recovery can help clients for recovery from physical and logical damage laptops, due to mechanical and electrical failure, software corruption or human error.
How do you know your desktop is likely to experience data loss?
ANo matter what the physical or logical condition of your laptop may be, we at Mentari Setia can fix it. We offer the highest Data Recovery rate in minimum time. The Data Recovery Services offered by us are one of its kind.
Operation System Mentari Setia can recover:
Email recovery
Exchange Server edb stm recovery
Oracle recovery
Paradox
MySQL
Word Document recovery
Excel Spreadsheet
PowerPoint Presentation
Access MDB database
Microsoft Money File
Exchange Server database
Exchange Offline Storage File ost recovery
Outlook Mailbox pst recovery
Outlook Express dbx mailbox recovery
SQL Server database
Visual FoxPro DBF database
Zip Archive
Mentari Setia Server Recovery has the expertise and experience to recover lost data from all kinds of failed server hardware, running any modern or old operating system(Windows / Unix) We have the facilities to undertake the cloning and subsequent retrieval of data from small single disk servers and larger multiple drive systems. Problems that we resolve daily include:
Disk failure
Data corruption
Damage to the operating system
RAID array, multiple disk failure
Lost or deleted data
Exchange database recover
SQL and database recovery services
Mentari Setia Data Recovery has many years experience recovering data from USB flash drives suffering a wide range of symptoms, from physical distortion to simply not being recognized by the computer or device We can recover from USBs facing all kinds of problems, including:
Also known as IM (Skype, Yahoo messenger, Google Talk, Windows Live Messenger, etc.), instant messaging consists of sending real-time messages to another Internet user, much like text messaging on a cell phone; most popular among younger generations, IM is also commonly used in the workforce as a quick way for employees to communicate with each other. IM is comparable to chatting in a private chat room, but instead of anyone being able to join the conversation, IM includes only people whom the user has invited. There are some risks affiliated with IM such as a computer catching a virus, personal information being stolen, or sex predators seeking victims;. As with any online activity, caution should be exercised with messaging. It is not a good idea to add people to the invite list unless the user knows something about them. Children should be supervised carefully when instant messaging and should never add someone to their list or agree to be added to anyone else’s list without approval from their legal guardian. Predators have been known to use instant messaging as well as chat rooms to seek out victims, so while IM may seem safer, it is not without risks. It is also possible to obtain viruses, worms, and Trojan horses through messaging, so care should be taken when accepting any files. Also, don’t type anything that shouldn’t be shared with others, since instant messages can be captured and the text can be saved and passed on. Identity thefts can still get a hold of personal information through instant messages. Instant messaging can be a convenient way to communicate, but like anything else, it should be used with care. Mentari Setia use effective tools to recover deleted chat history files & folders from any corrupt, deleted or damage storage media
As a new technology the SSD (Solid State Disk) drive used instead of usual hard disk drive especially in laptops. Mentari Setia is able to provide data recovery services and retrieve lost data from any capacity SSD disk drive. Despite being far more reliable than traditional spinning platter magnetic hard drives, SSD devices can and do fail.
Some of the more common faults that we come across with SSD drives include:
Toyota Land Cruiser 200 VIP version Armored in B6 class according to the CEN standards
This is prepared with the best quality materials and fabricated by skilled technicians.
This protection is to European B6 level and is certified to defeat the following ammunition:
7.62 x 51 RG L2A2 at 843 m/s 7.62 x 39 PS 1943 ball at 709 m/s 5.56 x 45 RG L2A2 at 931 m/s FNB SS109 at 942 m/s and lesser threats
Armouring: Sides – plates thickness 6 mm ARMOX T 500/5 mm ARMOX T 600 Floor – plates thickness 4 mm ARMOX T 500 – protection against two DM51 hand grenades Roof – plates thickness 4 mm ARMOX T 500 Glass – thickness 38 mm
Multi-Layer-Application tactical system that interrogates and identifies any GSM/UMTS mobile handset from the air.
Product versions:
All versions available in various modes of operation:
Operational Applications:
Operational benefits:
Can be connected to:
Our products for Law Enforcement
Simple stand-alone single-line „personal recorder”. Can be connected to:
Market: Law Enforcement
Requirements/applications:
Multi-channel call recorder. Can be connected to:
All recordings are stored on internal HDD or NAS. Max. 32 channels/PC
Multi-channel call recorder. Can be connected to:
Standard analogue telephone lines
Radiotelephones
Digital PBX telephone lines
ISDN (E1/30B+D or U/S0/2B+D) lines
VoIP
All recordings are stored on internal HDD or NAS. Max. 512 channels/PC.
Audio recording may be used in the court as evidence, but sometime the recording may have loud background noise that cause the recording to be useless.
At Mentari Setia, we have specialist for audio enhancement. His job is to remove static background noise and improve overall audio clarity and intelligibility.
The purpose of the mobile jammer is to ensure protection against radio-controlled bombs. It can protect single or group moving objects, groups of people, cars and/or other small area targets the security of the working personnel is guaranteed according to the standards BDS17137-90, European Union standard SAR and the NATO standard STANAG 2345
The purpose of portable jammer is to ensure protection against radio-controlled bomb. It can protect single or group moving objects, groups of people, cars or any other small object
List of jammed devices
The purpose of Manpack Jammer is to ensure protection against radio-controlled bomb. It can protect single or group moving objects, groups of people, cars or any other small object
<p>Passwords can be forgotten through lack of use or from auto generated changes. Or they can simply cease to work for no apparent reason. This may prohibit the user from using the computer, but in other cases it may require thousands of password protected files to be deleted if the overriding password cannot be determined. Where special encryption has also been involved, the task becomes even more difficult.
we are experts at cracking password protected files and systems. Using our extensive library of software, techniques and cracking resources we may be a critical resource when crucial files are encrypted. We can also perform security analysis and provide un-crackable encryption software and state of the art firewalls and network security software for those who value privacy and want to be sure their data is secure.</p>
Audio Forensics / Voice Investigation / Voice Forensics is the field of forensic science relating to the acquisition, analysis, and evaluation of sound recordings that may ultimately be presented as admissible evidence in a court of law or some other official venue
The primary aspects of audio forensics are:
As an Audio Forensic Expert and Expert Witness, Mentari Setia has analyzed hundreds of audio recordings for authentication, clarification and voice identification in both analogue and digital formats.
The following list describes types of forensic services Mentari Setia offer as an expert witness:
Disk cloning is the process of copying the contents of one computer hard disk to another disk or to an “image” file. This may be done straight from one disk to another, but more often, the contents of the first disk are written to an image file as an intermediate step, then the second disk is loaded with the contents of the image. Typically, this is done for archiving purposes, to restore lost or damaged data, or to move wanted data into a new disk, though other reasons also exist.
Unlike standard copying functions, disk cloning involves copying hidden and in-use files, and thus presents special challenges, as those types of files are typically not available for copying. Additional complications arise when the process is used for networked computers, as the network must be able to distinguish between different computers.
Anti Forensics</b> is simply a breaking tool and a growing methods and collection of tools used to prevent or against the application of science to those criminal and civil laws that are enforced by criminal justice system
Goals of Anti-Forensics: