Data Recovery

Our Data Recovery Specialist will take several careful steps to identify and attempt to retrieve possible data that may exist on a subject computer system:

  • Protects the subject computer system during the recovery examination from any possible alteration, damage, data corruption, or virus introduction.
  • Discovers all files on the subject system. This includes existing normal files,
  • deleted yet remaining files, hidden files, password-protected files, and encrypted files.
  • Recovers all (or as much as possible) of discovered deleted files
  • Reveals (to the extent possible) the contents of hidden files as well as temporary or swap files used by both the application programs and the operating system.
  • Accesses (if possible and if legally appropriate) the contents of protected or encrypted files
  • Analyzes all possibly relevant data found in special (and typically inaccessible) areas of a disk. This includes but is not limited to what is called ‘unallocated’ space on of a disk. This includes but is not limited to what is called ‘unallocated’ space on a disk (currently unused, but possibly the repository of previous data that is relevant evidence), as well as ‘slack’ space in a file (the remnant area at the end of a file, in the last assigned disk cluster, that is unused by current file data, but once again may be a possible site for previously created and relevant evidence).
  • Prints out an overall analysis of the subject computer system, as well as a listing of all possibly relevant files and discovered file data. Further, provides an opinion of the system layout, the file structures discovered, any discovered data and authorship information, any attempts to hide, delete, protect, encrypt information, and anything else that has been discovered and appears to be relevant to the overall computer system examination.

Apple’s iPhone is one of the most advanced mobile phone handsets available today. iPhones are pretty well locked down by design, which can make data recovery difficult, and in some cases impossible. There are however a number of scenarios where recovery is possible.

  • Blue screen of death.
  • Strange noises caused by hard drive
  • You can’t access your data

No matter what the physical or logical condition of your laptop may be, we at Infinity Forensics can fix it. We offer the highest Data Recovery rate in minimum time. The Data Recovery Services offered by us are one of its kind.

Operation System Infinity forensics can recover:

  • Windows 3.11, 95. 98, ME, 2000, XP, Windows 7,Vista32 bit & 64 bit
  • Linux
  • Unix
  • Mac
  • Custom operating systems and all other file systems

The Hard Drive Data Recovery is carried out at Mentari Setia quite efficiently. When it comes to Data Recovery then we leave no stone untouched. Hard drive can get corrupted due to many reasons including the following:

  • Natural calamities
  • Human error
  • Virus attack
  • Water or flood damage
  • Fire or heat or smoke damage
  • Drive platters with excessive bad sectors
  • Power leakage
  • Invalid system disk
  • Dropped or smashed external hard drive
  • Logical corruption to file system
  • Corrupted Master File Table
  • Corrupted File Allocation Table
  • Vandalism and Sabotage

No matter what the physical or logical condition of your Hard Disk Drive may be, we at Mentari Setia can fix it. We offer the highest Data Recovery rate in minimum time. The Data Recovery Services offered by us are one of its kind.
Operation System Mentari Setia can recover:

  • Windows 3.11, 95. 98, ME, 2000, XP, Windows 7,Vista32 bit & 64 bit
  • Linux
  • Unix
  • Mac
  • Custom operating systems and all other file systems

Mentari Setia data recovery labs will examine your storage media in our class clean room environment where an engineer assigned to your case will look closely at all components both internally and externally such as the hard drive PCB to the head stack assembly if required. If a failed component is discovered it is replaced then the hard drive is retested to functionality and moved to our cloning and imaging department where an image is created of the media from the beginning to the end of the user data area.

Our engineers can work directly with this raw image on a hex level byte by byte if required and repair any logical issues the image is then mounted and launched to check file integrity.

So if you have been the victim of data loss then have no fear as we are here to bring happiness back into your life, just count on us and contact us before the situation is out of control.

Mentari Setia Desktop Data Recovery can help clients for recovery from physical and logical damage laptops, due to mechanical and electrical failure, software corruption or human error.

How do you know your desktop is likely to experience data loss?

  • Blue screen of death.
  • Strange noises caused by hard drive
  • You can’t access your data

ANo matter what the physical or logical condition of your laptop may be, we at Mentari Setia can fix it. We offer the highest Data Recovery rate in minimum time. The Data Recovery Services offered by us are one of its kind.

Operation System Mentari Setia can recover:

  • Windows 3.11, 95. 98, ME, 2000, XP, Windows 7,Vista32 bit & 64 bit
  • Linux
  • Unix
  • Mac
  • Custom operating systems and all other file systems

Email recovery
Exchange Server edb stm recovery
Oracle recovery
Paradox
MySQL
Word Document recovery
Excel Spreadsheet
PowerPoint Presentation
Access MDB database
Microsoft Money File
Exchange Server database
Exchange Offline Storage File ost recovery
Outlook Mailbox pst recovery
Outlook Express dbx mailbox recovery
SQL Server database
Visual FoxPro DBF database
Zip Archive

Mentari Setia Server Recovery has the expertise and experience to recover lost data from all kinds of failed server hardware, running any modern or old operating system(Windows / Unix) We have the facilities to undertake the cloning and subsequent retrieval of data from small single disk servers and larger multiple drive systems. Problems that we resolve daily include:

Disk failure
Data corruption
Damage to the operating system
RAID array, multiple disk failure
Lost or deleted data
Exchange database recover
SQL and database recovery services

  • File servers
  • Application Servers
  • Web servers
  • Mail servers
  • Network attached storage

Mentari Setia Data Recovery has many years experience recovering data from USB flash drives suffering a wide range of symptoms, from physical distortion to simply not being recognized by the computer or device We can recover from USBs facing all kinds of problems, including:

  • Accidental file deletion
  • Appears unformatted
  • USB drive is snapped
  • USB drive is bent
  • Unusual sound
  • Producing smoke
  • Physically burnt
  • BIOS not detecting USB memory stick

Also known as IM (Skype, Yahoo messenger, Google Talk, Windows Live Messenger, etc.), instant messaging consists of sending real-time messages to another Internet user, much like text messaging on a cell phone; most popular among younger generations, IM is also commonly used in the workforce as a quick way for employees to communicate with each other. IM is comparable to chatting in a private chat room, but instead of anyone being able to join the conversation, IM includes only people whom the user has invited. There are some risks affiliated with IM such as a computer catching a virus, personal information being stolen, or sex predators seeking victims;. As with any online activity, caution should be exercised with messaging. It is not a good idea to add people to the invite list unless the user knows something about them. Children should be supervised carefully when instant messaging and should never add someone to their list or agree to be added to anyone else’s list without approval from their legal guardian. Predators have been known to use instant messaging as well as chat rooms to seek out victims, so while IM may seem safer, it is not without risks. It is also possible to obtain viruses, worms, and Trojan horses through messaging, so care should be taken when accepting any files. Also, don’t type anything that shouldn’t be shared with others, since instant messages can be captured and the text can be saved and passed on. Identity thefts can still get a hold of personal information through instant messages. Instant messaging can be a convenient way to communicate, but like anything else, it should be used with care. Mentari Setia use effective tools to recover deleted chat history files & folders from any corrupt, deleted or damage storage media

As a new technology the SSD (Solid State Disk) drive used instead of usual hard disk drive especially in laptops. Mentari Setia is able to provide data recovery services and retrieve lost data from any capacity SSD disk drive. Despite being far more reliable than traditional spinning platter magnetic hard drives, SSD devices can and do fail.

Some of the more common faults that we come across with SSD drives include:

  • Firmware microcode corruption
  • Unrecognised devices
  • Electronic faults with the SSD
  • Liquid and water damage to the electronics
  • Physically damaged devices and interfaces