MiniTool Power Data Recovery Rocks

by Ed Tittel

In January of this year, I blogged about the MiniTool Partition Wizard. In response to my post, the software’s maker asked me to take a look at their sister product: MiniTool Power Data Recovery. I get a lot of requests like this, so I don’t always get around to using or writing about such products. In this case, I was headed in the same direction but then I shot myself in the foot. And indeed, that’s also what gave me cause to learn that MiniTool Power Data Recovery rocks at its appointed task. Let me explain…

Why say “MiniTool Power Data Recovery Rocks?”

Good question! Thereby hangs a tale: Because of research into mSATA SSDs about three years ago, I have half-a-dozen Samsung EVO 840 256 GB SSDs hanging around my hardware collection. In finding tools to put these drives to work, I’ve purchased a couple of Syba SD-ADA40107 2.5″ SATA 6G/USB 3.0 to Dual mSATA RAID Adapters ($26 from Newegg). Basically, these devices let you drop in a pair of mSATA SSDs and use them as a RAID 0 or RAID 1 array, or as JBOD (just a bunch of disks).

Pop a couple of mSATA SSDs into this card, and plug it in using SATA, and you’ve got a fast and capable 2X capacity RAID0 hard disk (500 GB my case).

My “shot to the foot” came from confusing my primary data drive (!) with my experimental drive. And alas, I ended up wiping the partitions on the data drive thinking I was working on the other drive. Ouch! I found a three-month-old backup that I was able to use to restore about 90% of the contents of the original drive, but I couldn’t find copies of the other 10%, some of which was important stuff I didn’t want to lose. Thus, if ever I was faced with a need for data recovery, this was it.

Recovery is not free, but it works well

That’s when I learned that the free version of MiniTool Power Data Recovery comes with a 1 GB data recovery limit. I needed to restore about 21 GB of data, so there was nothing to do except pony up the $69 fee for a personal license. The expenditure proved worth every penny, because the tool’s “Lost Partition Recovery” facility resuscitated about 99% of the data on the affected drive. Recovery coverage depends on how much data has been overwritten onto new partitions in finding and saving files and folders from previous “lost” partitions. In my case I was luck enough to recognize my mistake quickly, and did no writing to the drive other than what occurred when setting up the partitions and writing the entries necessary to set up NTFS on the volume.

The process was fairly slow, because over 210 GB worth of files were recovered. It ended up taking 2.7 hours to complete, on a fairly fast PC (i7 4770K on a Z97 chipset motherboard), but that’s probably because I had the drive plugged into a USB 3.0 drive caddy rather than a 6 Gbps SATA port. But MiniTool Power Data Recovery proved equal to the task, and paid for itself, IMHO, on its first use.

I’d learned about the program from, where the program gets accolades from many members. See, for example MiniTool Power Data Recovery to the Rescue and Good data recovery tool for deleted files?, among many others. It definitely did the job for me, and may come in handy for admins and power users in need of a capable first line of file/disk recovery software defense. That’s why I assert with some confidence that “MiniTool Power Data Recovery rocks!”


The article was originally written by Ed Tittel and published by IT Knowledge Exchange on May 15th, 2017. It is reproduced on this blog with an author’s permission.

Dear readers, hope you’ll find this post informative.

peace and blessings,


Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

What is Cryptography?

There are a number of terms associated with a cryptosystem. These include cryptology, cryptography, cryptanalysis, and steganography. Cryptology is the study of secure communications, which encompasses cryptography, cryptanalysis, and steganography. Cryptography is the branch of cryptology dealing with the design of algorithms for encryption and decryption. These algorithms are intended to ensure the secrecy and/or authenticity of messages and data. Cryptanalysis is the branch of cryptology dealing with the breaking of a cipher to recover information, or forging encrypted information that will be accepted as authentic. A cipher is an algorithm for encryption and decryption. A cipher replaces a piece of information with another object, with the intent of concealing meaning. Typically, a secret key governs a replacement rule. Lastly, steganography is a method of cryptology that hides the existence of a message. [Newman, 2002, p. 65-66]

Figure 1. Cryptography (SUPINFO International University, 2016)

The word “cryptography“ is derived from Greek and when literally translated, means “secret writing.” Before the advent of digital communications, cryptography was used primarily by the military for the purposes of espionage. With the advances in modern communication, technology has enabled businesses and individuals to transport information at a very low cost via public networks such as the Internet. This development comes at the cost of potentially exposing the data transmitted over such a medium. Therefore, it becomes imperative for businesses to make sure that sensitive data is transferred from one point to another in an airtight, secure manner over public networks. Cryptography can help us achieve this goal by making messages unintelligible to all but the intended recipient. [Atreya, n.d., ¶ 2]

Encryption refers to the transformation of data in “plaintext“ form into a form called “ciphertext,” which renders it almost impossible to read without the knowledge of a “key,” which can be used to reverse this transformation. The recovery of plaintext from the ciphertext requires the key, and this recovery process is known as decryption. This key is meant to be secret information and the privacy of the ciphertext depends on the cryptographic strength of the key. [Atreya, n.d., ¶ 3]

Figure 2. Encryption (Tectrade, 2015)

Cryptography is the study of “mathematical“ systems involving two kinds of security problems: privacy and authentication. A privacy system prevents the extraction information by unauthorized parties from messages transmitted over a public channel, thus assuring the sender of a message that it is being read only by the intended recipient. An authentication system prevents the unauthorized injection of messages into a public channel, assuring the receiver of a message of the legitimacy of its sender. [Diffie & Hellman, n.d.]

Figure 3. Privacy (Cosmos Auto Repair, 2014)

A channel is considered public if its security is inadequate for the needs of its users. A channel such as a telephone line may therefore be considered private by some users and public by others. Any channel may be threatened with eavesdropping or injection or both, depending on its use. In telephone communication, the threat of injection is paramount, since the called party cannot determine which phone is calling. Eavesdropping, which requires the use of a wiretap, is technically more difficult and legally hazardous. In radio, by comparison, the situation is reversed. Eavesdropping is passive and involves no legal hazard, while injection exposes the illegitimate transmitter to discovery and prosecution. [Diffie & Hellman, n.d.]


Atreya, Mohan.  “Introduction to Cryptography.”  Retrieved on May 25th, 2017 from URL:

Diffie, Whitfield & Martin E. Hellman, n.d.  “New Directions in Cryptography.”  Retrieved on May 25th, 2017 from URL:

Newman, C. Robert.  “Enterprise Security 2nd Ed.”  Pearson Education 2003, New Jersey.

Hope you’ll find this post informative.

peace and blessings,


Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

Free online courses from Microsoft

Be passionate and bold. Always keep learning. You stop doing useful things if you don’t learn.” – Satya Nadella, CEO, Microsoft

We live in a mobile-first and cloud-first world. Computing is ubiquitous, and experiences span devices and exhibit ambient intelligence. Billions of sensors, screens and devices – in conference rooms, living rooms, cities, cars, phones, PCs – are forming a vast network and streams of data that simply disappear into the background of our lives. This computing power will digitize nearly everything around us, and will derive insights from all of the data being generated by interactions among people and between people and machines. We are moving from a world where computing power was scarce to a place where it now is almost limitless, and where the true scarce commodity is increasingly human attention.

In this new connected world, we believe technology creates opportunity, and our edX courses are designed to provide you with the core development skills needed to be successful in the cloud-first, mobile-first world.

Our edX courses, taught by Microsoft experts, let you learn through hands-on experience with broad reach, cutting-edge technologies in areas including cloud services, mobile development, and data sciences. Whether you’re a student or a seasoned technologist, we can empower you to build innovative applications, services, and experiences on the Microsoft platform that will help you make a meaningful impact in today’s interconnected world.

Welcome to the world of Microsoft technology – choose a path and make your mark.

This website is a part of the edX network, an online learning destination and MOOC provider, offering high-quality courses from the world’s best universities and institutions to learners everywhere.

Hope you’ll find this post informative.

peace and blessings,


Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

Study Cisco CCNA for Free @GeekUniversity

Welcome to, a free CCNA tutorial site where you can study CCNA

Welcome to website, a free CCNA tutorial site that closely follows the Cisco CCNA curriculum. The site was designed to help you pass the CCNA exam (640-802), but it can also be used as a reference site for anything networking related. Here you can find all materials needed to study for your CCNA exam.

On the left side you will find a list of articles. The articles on this site are divided by chapters. The first couple of chapters describe some basic networking terms and devices. The later chapters go a little bit in depth. You can start reading the articles from the beginning, or you can find a specific article that interest you.

So, what are you waiting for? Choose a topic on the left and start learning! We wish you luck!

This website is a part of the Geek University network, a free web portal covering many aspects of IT system administration.

Hope you’ll find this post informative.

peace and blessings,


Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store

Is Microsoft Edge safer than Google Chrome or Mozilla Firefox?

“Chrome set the bar high. Firefox couldn’t match it. Edge jumped right over it.” – VentureBeat

“…unlike Chrome, Edge doesn’t hog so much of computer’s power. On a Web-browsing battery test, the Dell XPS 13 lasted an hour longer with Edge than with Chrome. When streaming Netflix, it lasted two full hours longer.” – Wall Street Journal

According to NSS Labs. Microsoft Edge blocks more phishing sites and socially engineered malware than Google Chrome or Mozilla Firefox. See details here

Not only is Microsoft Edge safer, it’s faster. See more

Source: My Browser

Hope you’ll find this post informative.

peace and blessings,


Bekim Dauti’s Blog | Bekim Dauti’s Vlog | e-Books @Amazon Kindle Store