On Sun, Dec 4, 2016 at 11:28 AM, Jerry Jensen wrote:
> Just one additional level of warning - if you keep Dropbox or Google Drive
> online,
> malware can get there too. Usually the baddies just trash your directory, but
> if
> they encrypt everything you have accessible online, Dropbox and Googl
your drive was probably at some time used as a Torrent server source.
Yes definitely delete all porn, don't even bother seeing if it contains
illegal porn. Chances of child porn are very likely in a Torrent folder,
and one has no idea where's it's from or been.
In the US the son of a friend of min
Thanks, one-and-all, for the kind and informative messages about backing
up and so forth.
I have retrieved as much as I am likely to from my zonked Linux box, and
am now putting the
thing back together.
HOWEVER, before that:
1. Retrieved from one of my hard drives was a "rather intriguing" s
I use Time Machine for hourly backups, mirror my LC stacks folder on Dropbox
(so every change is also saved in the cloud), then in addition I have a
peripheral hard drive at work where I back up my work stacks every time I close
down for the day. I once lost over 2 weeks of notes due to a disk c
“Diskwarrior" is a good tool to use in addition to “Data Rescue”.
If you have to go as far as using “Disk Rescue” you have had
some major problem and may not have been doing your
backups routinely enough.
If you already have a safe-deposit box at a bank, you may want to
consider using that as your
Just one additional level of warning - if you keep Dropbox or Google Drive
online, malware can get there too. Usually the baddies just trash your
directory, but if they encrypt everything you have accessible online, Dropbox
and Google Drive won’t help you. Offline backup is essential, offsite is
Hi Richmond,
Glad to hear that you've been able to rescue most of your files. The
Data Rescue programme I use is imaginatively called 'Data Rescue' by
Prosoft. I don't think it would help in your case as I don't think the
Mac version can recover non-Mac HDs. The reason I mention it is that
it has
That sounds great, but I wonder exactly how I should look for the file
headers.
Richmond.
On 12/3/16 7:42 pm, Stephen Barncard wrote:
On Sat, Dec 3, 2016 at 7:58 AM, Richmond Mathewson <
richmondmathew...@gmail.com> wrote:
files, and NOT .rev and .livecode files I wonder if anyone has any br
On Sat, Dec 3, 2016 at 9:42 AM, Stephen Barncard
wrote:
> Look for the file header text at the beginning of every stack:
>
> like
> REVO7000
> REVO5500
>
There should also be a file termination character(s)
--
Stephen Barncard - Sebastopol Ca. USA -
mixstream.org
___
On Sat, Dec 3, 2016 at 7:58 AM, Richmond Mathewson <
richmondmathew...@gmail.com> wrote:
> files, and NOT .rev and .livecode files I wonder if anyone has any bright
> suggestions how one might
> go about looking for them.
>
Look for the file header text at the beginning of every stack:
like
REVO
Aa all forensic software for digging in blanked hard drives seems to
find the most obvious
files, and NOT .rev and .livecode files I wonder if anyone has any
bright suggestions how one might
go about looking for them.
Richmond.
___
use-livecode maili
11 matches
Mail list logo