Founded in 1991, Future Quest Technologies was created based on a fresh consumer need: on-site technology delivery. Future Quest Tech strove to be, and successfully became, a woman-owned trusted provider of Information Technology products, services and support. For 20+ yrs now, I've focused on financial crimes and digital investigations. My aim is to guide other FinCrime Investigators to be the best investigators they can be.
Thursday, November 26, 2009
WHAT IS A POWER EVENT?
Sags, surges, noise, spikes, blackouts…what really happens to connected devices when they experience a power anomaly? A lightning strike is a frequent example, although it is just one of countless problems that can strike your equipment. Imagine lightning has just struck a nearby transformer. If the surge was powerful enough, it travelled instantaneously through wiring (AC, network, serial, phone lines and more) with the electrical equivalent force of a tidal wave. For PC users, the surge could have traveled into your computer via the AC outlet or phone lines. The first casualty is usually a modem or motherboard. Chips go next, and data is lost. Lightning Facts The utility responds to overvoltages by disconnecting the grid. This creates brownouts and blackouts. If the voltage drops low enough, or blacks out, hard disks in computing machinery may crash, destroying the data stored on the disks. In all cases, work-in-progress stored in cache is instantly lost. In the worst case, password protection on the hard drives can be jumbled, or the file allocation tables may be upset, rendering the hard disks useless. Are you protected? Call today for an evaluation: 815-345-4930
Subscribe to:
Post Comments (Atom)
-
Missing evidence is not the same as missed evidence or evidence that is lost. When I speak of missed evidence it relates to evidence that...
-
Romance and Pig Butchering Scams: History, Impact, and Prevention By Eina JL Schroeder, CAMS/CFCS Romance Scams Imagine your single, read...
-
It’s a little more complicated than just copying data By Barbara Krasnoff Sep 2, 2020, 4:35pm EDT Two-factor authentication (2FA) is ...
No comments:
Post a Comment