Data Recovery

Posted on 2006-05-23
Last Modified: 2013-12-01
I have a Maxtor HardDrive that has died, and I am unable to recovery data from it.
The HDD shows in the BIOS, but it will not display in Windows when I run it as a slave drive.
I have also tried the Easy Recovery Program, and tried to use an emergency boot disk.

Any ideas?
Question by:oceaneleven
    LVL 69

    Expert Comment

    Give GetDataBack from a try - it is one of the best data recovery programs.  If it detects your files and you want to save them, you will have to pay a small fee to purchase it.
    LVL 87

    Expert Comment

    You can try booting the PC with a knoppix CD and the try to mount the drive and copy the data off it. If that doesn't work also try getdataback from If neither helps, you can try putting the disk into an airtight plastic back and putting it into a freezer for up to an hour, then connect it to the PC again and try the above mentioned tools to recover the data. If that doesn't help either, you are left with a datarecovery agency, of which the best is probably gillware.
    LVL 2

    Accepted Solution

    do forensic drive examinations for a living.  For Windows, there is only one program that I like to use, and that's Recover My Files.

    If you haven't already, immediately cease using the D drive, or you risk overwriting the previous files to a point where they become unrecoverable and/or damaged.  There is a likelihood that may have already occured, so understand that you may be fighting a losing battle to start.

    Here are some other sites with recovery software for Windows:

    Or, you can search Google for a ton more:

    Good luck!


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    Title # Comments Views Activity
    Valere unit 6 46
    good comptia a+ teacher? 4 51
    Restore Profiles after system factory reset. 4 27
    Hard disk behaving strangely 29 129
    Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
    The viewer will learn how to download and install Comodo Backup on Windows 7. Comodo Backup is another solution for backing up your computer. It is free for local backup and online backup has differing amounts depending on storage required. In my op…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now