- Why can’t ordinary software tools restore files from RAID?
- How to take hard disks out of the NAS and connect them to a PC?
Why can’t ordinary software tools restore files from RAID?
Conventional hard disks keep user’s data by writing it to their surface in a consecutive way, and this is how an entire file is stored on a single hard disk. However, when data is written to a RAID system, a file is divided into several parts. Then these parts are written consecutively to all hard disks within such array. The size of such parts may range from 2 KB to 2 MB, so each file is stored on several hard disks at the same time.
Such approach helps to speed up read and write operations, and it is evident that saving two parts of a file having the size of 1 GB to two hard disks simultaneously is much faster than saving the same 1 GB of data to one hard disk. However, this peculiarity makes file recovery more complicated.
Various RAID levels store information in different ways. Additionally, manufacturers like Uniview also introduce some modifications to this process, and that is why data can be written to hard disk in a wide variety of ways.
Can remote access to NAS Uniview DE1848-V2 devices pose additional data loss risks?
Remote access to NAS Uniview DE1848-V2 devices can potentially pose additional data loss risks if proper security measures are not in place. Here are a few potential risks:
- Unauthorized access: If remote access is not properly secured with strong authentication and encryption, it can be vulnerable to unauthorized access. Hackers or malicious actors can exploit these vulnerabilities to gain access to the NAS device and potentially steal or delete data.
- Weak passwords: If weak passwords are used for remote access, it becomes easier for attackers to guess or crack them, granting them unauthorized access to the device and its data.
- Network vulnerabilities: If the network used for remote access is not properly secured, it can expose the NAS device to various network-based attacks, such as man-in-the-middle attacks or packet sniffing. These attacks can intercept and manipulate data, leading to potential data loss.
- Malware and ransomware: Remote access can provide an entry point for malware or ransomware attacks. If a remote user's device is infected, it can spread malware to the NAS device, potentially leading to data loss or encryption of data for ransom.
To mitigate these risks, it is important to follow best practices for securing remote access to NAS devices:
- Use strong, unique passwords for remote access accounts.
- Enable two-factor authentication for an extra layer of security.
- Ensure that remote access protocols, such as SSH or VPN, are properly configured and encrypted.
- Regularly update the NAS device's firmware and software to patch any security vulnerabilities.
- Implement network security measures, such as firewalls and intrusion detection systems, to protect against network-based attacks.
- Use antivirus and anti-malware software to detect and prevent malware infections.
- Regularly back up the data stored on the NAS device to an off-site location to mitigate the impact of data loss.
By following these security practices, the risks associated with remote access to NAS Uniview DE1848-V2 devices can be significantly reduced.
How to take hard disks out of the NAS and connect them to a PC?
Although NAS DE1848-V2 can be accessed over the network, you still need to take the hard disks out of the storage device and connect them to a Windows computer. Only in this case will the software be able to scan them properly. Here is what you should do:
-
Turn off the storage and disconnect it from the power supply.
WARNING! Before you start taking hard disks out of your NAS device, read the manual carefully. Incorrect actions may damage your network-attached storage and/or the hard disks within the RAID system.
-
Take the hard disks out of the NAS one by one, carefully removing them from their slots. Remember that the disks are extremely vulnerable: hitting or dropping them may result in serious physical damage.
-
Make sure to mark each hard disk in accordance with how they were installed inside the NAS.
-
Remove the hard disks and connect them to the computer. In this video, we have explored what ports are used to connect hard disks, and what to do if there are not enough ports or connectors.
Go to view
Restoring data with Hetman RAID Recovery
This program recovers data from damaged RAID arrays and is fully compatible with Uniview DE1848-V2. The hard disks that make up the RAID contain technical information about the algorithm used to save files. When launched, Hetman RAID Recovery reads this information and puts the damaged array together. Then you can open the disk and save your files. Also, you can recover the files accidentally deleted from the network drive.
DE1848-V2 has 48 HDD slots, and it supports the following array types:
- RAID 0;
- RAID 1;
- RAID 5;
- RAID 6;
- RAID 50;
- RAID 60;
- JBOD;
NAS supports:
- exFAT, VFAT, FAT 12 / 16 / 32;
- NTFS / ReFS;
- APFS / HFS+;
- Ext2 / 3 / 4 / ReiserFS / XFS / UFS / ZFS / Btrfs;
- VMFS / HikvisionFS;
Safe recovery from disk images
This utility lets you save an entire copy of the disk to file and then work with this image instead of the actual disk. Such feature helps to protect data on the disk from:
- Overwriting during the recovery process;
- Loss resulting from bad sectors;
- User mistakes.
To create an image, do the following:
-
Make sure that you have enough free space to save the image. The image file size usually equals the disk size.
-
Select the disk in the main window, and choose from the menu Tools – Save Disk. You can select multiple disks to be saved.
-
When the image creation wizard starts, you can choose to save the entire disk or select only a part of it. Specify the parameters and click Next.
-
At this stage, you need to choose a directory where to save the image. Choose any disk connected to this PC, or save the image by FTP.
Where are user’s files stored?
The Uniview DE1848-V2 network-attached storage keeps OS Linux operating system files on a separate RAID 1 (mirrored) array. Usually, all NAS systems create several volumes on every hard disk, and the first of them takes up to 2 Gb of space. This is where operating system files are stored. Other volumes are united into a RAID array where user’s data is written.
Comparison of software for RAID recovery
Product | Operating system | License type | RAID controller support | Supported file systems | Virtual RAID controller support | Data recovery from damaged RAID | File preview |
---|---|---|---|---|---|---|---|
Hetman RAID Recovery | Windows | Paid | Yes, over 100 controllers | FAT, NTFS, Ext2/3/4, HFS+ | Yes | Yes | Yes |
DiskInternals RAID Recovery | Windows | Paid | Yes, over 100 controllers | FAT, NTFS, Ext2/3/4, HFS+ | No | Yes | Yes |
R-Studio | Windows, Mac, Linux | Paid | Yes, over 200 controllers | FAT, NTFS, Ext2/3/4, HFS+ | Yes | Yes | Yes |
UFS Explorer RAID Recovery | Windows, Mac, Linux | Paid | Yes, over 1,000 controllers | FAT, NTFS, Ext2/3/4, HFS+ | Yes | Yes | Yes |
EaseUS Data Recovery | Windows | Paid | Yes, over 20 controllers | FAT, NTFS, Ext2/3/4, HFS+ | No | Yes | Yes |
ReclaiMe Free RAID Recovery | Windows | Free | Yes, over 100 controllers | FAT, NTFS, Ext2/3/4, HFS+ | Yes | Yes | Yes |
The success of data recovery from a water or fire damaged NAS Uniview DE1848-V2 device will depend on the extent of the damage. In general, water or fire damage can cause physical and electrical damage to the device, including the hard drives inside.
If the damage is minimal and limited to the external components of the device, it might be possible to recover the data by removing the hard drives and connecting them to a compatible computer or NAS device. However, if the hard drives are also damaged, the chances of successful data recovery decrease significantly.
In cases of severe water or fire damage, where the device or hard drives are completely destroyed, data recovery may not be possible at all. It is always recommended to consult with a professional data recovery service in such situations, as they have specialized tools and expertise to handle damaged devices and attempt data recovery.