Solved

Software Utilities Recover Corrupted Deleted Files Any Type

Posted on 2011-02-10
5
385 Views
Last Modified: 2012-05-11
What is most effective software to recover any and all files haing been deleted or corrupted, Windows XP.
0
Comment
Question by:DrJLFinefrock
5 Comments
 

Expert Comment

by:ednor
ID: 34867557
You can use recovermyfiles or filerecoveryangel
0
 
LVL 35

Accepted Solution

by:
torimar earned 84 total points
ID: 34867782
These are some of the most used and recommended tools:

http:/www.piriform.com/recuva
http://www.pcinspector.de/default.htm?Language=1
http://www.runtime.org/data-recovery-software.htm
http://www.data-recovery-software.net/
http://www.r-undelete.com/

The first 2 are free, the others have demo versions available which will help you see what files they would recover if bought.
0
 
LVL 35

Assisted Solution

by:torimar
torimar earned 84 total points
ID: 34867789
If you are interested in only one recommendation for most effective/successful in long term surveys:
it would have to be GetDataBack by Runtime. See link number 3 above.
0
 
LVL 38

Assisted Solution

by:Aaron Tomosky
Aaron Tomosky earned 41 total points
ID: 34868487
Another vote for recuva. Best free program. Better than a lot of paid programs.
0
 
LVL 13

Expert Comment

by:John Tsioumpris
ID: 34868496
Well i have done some tests recently and i can say for sure that nothing beats GetDataBack
http://www.runtime.org/
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question