Skip to main content

五款最佳的免费数据恢复工具

lifehacker列出如下五个用于数据恢复的工具,关键的是它们都是免费

1.TestDisk(Windows/Mac/Linux)
开源命令行程序,无GUI,它不仅能在FAT,NTFS,ext2等文件系统上进行误删除的回滚操作,还有许多附加功能。包括从备份中回复引导扇区,修复MFT,找出ext2/ext3的备份超级块,将删除的文件从分区拷贝至恢复媒介以及找回丢失的磁盘分区。

2. Recuva (Windows)
界面友好型,资源节约型windows工具。既可通过它的恢复向导来进行恢复操作亦可人肉点击。当你确定数据已经丢失了却不清楚它丢到了哪或不知如何去找回它可用前者,向导会提示它能涵盖各种文件类型如图片,音乐,文档,A片,触及任何区域如我的文档,可移动硬盘,回收站或其他你指定的地方。如果你对文件操作很自信可以人肉自定义进行。Recuva有红绿黄三个灯来标示文件被恢复的可能性大小,一旦可被恢复将提供文件恢复后的预览图。此外还提供艳照等不可见人文件的彻底粉碎功能。

3. PhotoRec (Windows/Mac/Linux)
PhotoRec是TestDisk的咖啡伴侣,和TestDisk一样也是命令行程序,在此单列的原因是当我们无需深度磁盘恢复操作时,PhotoRec是一个更安全的工具。它既不搞乱你的磁盘分区也不重建你的主引导记录,它只安全的深深潜入你的磁盘,不管分区,不管文件系统,而且带着只读模式决不留下不留下的液体。千万别以名取人,它决不仅仅只恢复被你误删除了的前女友清纯照。

4. Restoration (Windows)
Restoration是一款小巧(仅406k),不流氓,可随身携带的恢复工具,支持所有问抖死版本和文件系统,除拥有以上几个的基本功能外还可进行基于文件名的搜索,依据文件参数如大小,文件名来对文件进行排序。

5. Undelete Plus (Windows)
Undelete Plus曾为商业软件,和Recuva类似,依据文件被损坏程度标明可被恢复的可能性。


此外,原文还进行了一个感官的调查:

    TestDisk 17% (219 votes)
    Recuva 51% (674 votes)
    PhotoRec 7% (87 votes)
    Restoration 6% (73 votes)
    Undelete Plus 6% (76 votes)
    Other 14% (185 votes)

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...