Solved

Seagate Momentus - Recovering Data from Notebook SATA drives

Posted on 2006-10-19
3
365 Views
Last Modified: 2010-04-26
We have had a lot of success with recovering data from failed notebook IDE hard drives by using a USB external drive enclosure and hooking them up to another machine.

Our latest standard notebook has a 60GB SATA HDD ( the momentus 7200.1 from Seagate).
What sort of device do I need to hook one of these puppies up to another machine ?
0
Comment
Question by:Conchial
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 69

Expert Comment

by:Callandor
ID: 17767107
You can connect them directly to a machine with SATA connectors on the motherboard, but you will have to open up the case.  Some machines have external SATA connectors right next to the USB connector, but those are fairly new.  You will also need an SATA power connector; fortunately, those adapters are cheap: http://www.newegg.com/Product/Product.asp?Item=N82E16812104652
0
 
LVL 30

Accepted Solution

by:
pgm554 earned 500 total points
ID: 17767286
0
 
LVL 69

Expert Comment

by:Callandor
ID: 17767430
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question