We show you how you can recover recently deleted files on your PC, either through some tricks to put into practice, or through the use of data recovery software.
Who has not ever had the fact of having mistakenly deleted files or files from the computer that they later wanted to recover and it has not been possible or has not known how to do it.
Windows has the ‘Recycle Bin’, which acts as a security element to be able to rescue everything that goes into it. However, if you have deleted files in order to free up disk storage space, it may no longer appear here.
You should know that there are alternatives to recover files, although for this, you have to resort to the use of third-party software or data recovery programs. There are programs that, if you have previously installed, will save you some troubles.
Before showing you the options for recovering lost files, you should know that the longer it has been since they were deleted, the more difficult it will be to recover them. Things get tricky on SSD drives, where unused cells are regularly removed to free up space.
There are free and paid software options that can help you in the task of recovering deleted files, but you must be careful before installing and using them since they could overwrite the same files that you are trying to recover.
If one of the following methods is successful, we recommend making a backup copy of your files to avoid a similar situation in the future. Whether backed up to the cloud or an external drive, adopting good habits will save you from headaches.
Most file recovery disk utilities work in a similar way, although as we indicate in each explanation, the efficiency of one to the other may vary. Proceed as follows for recovery.
- Download the recovery software. Whenever possible, install the program on a different hard drive than the one containing the deleted files you want to recover.
- Select the disk containing the erased information to allow the software tool to scan for recently erased files.
- Select the files to recover.
- Choose a location to save what the tool has located and is recoverable. It should be a different location than the original disk.
Recover deleted files from Recycle Bin
Whenever you have deleted something that you later want to recover, the first thing you have to do is go to the Windows Recycle Bin. When you select a file and press the Delete key (or right-click and choose ‘Delete from the menu’), Windows passes it here.
The operating system moves it to the Recycle Bin, which has its own icon on the desktop. Restoring a file from the ‘Recycle Bin’ is simply double-clicking on the desktop icon to display the contents and then right-clicking on the file and selecting ‘Restore’.
If the Recycle Bin icon isn’t visible, look under ‘Show or Hide’ in the Start menu and you should see a shortcut to Settings where you can check the box next to the Recycle Bin to make it appear.
However, don’t always rely on the Recycle Bin as a safety net – it has a size limit and once you exceed it, old files will be permanently and automatically deleted.
The default size is suitable for most people, so there is a good chance that the files you want to restore are still present in the Recycle Bin. To check the capacity or modify it, right-click on the Recycle Bin and select ‘Properties’.
However, if you are in the habit of using the ‘Shift-Delete’ shortcut keys, they bypass the use of the Recycle Bin, thus permanently deleting the data. Also, if your files were on an SD card or USB drive, there is no Recycle Bin feature.
Before resorting to file recovery software, you should opt for some additional avenues. Have you shared the file or document by email? Have you saved or synced it with a cloud storage service? Or maybe you took a backup?
If the answer to all of these questions is no, you are ready to proceed with the option of using a file recovery tool or software program.
Free vs paid data recovery software
Here’s a list of freeware options. The most famous among users is usually Recuva from Piriform.
- Paragon Rescue Kit 14 free
- CGSecurity PhotoRec
- Minitool Partition Wizard Free Edition 9.1
- Kroll Ontrack EasyRecovery Free
- Stellar TestDisk
Sometimes a free tool is all you will need. But many of these programs have limited power to recover files, or are limited in the number of files or the amount of data that you can recover before paying for another more advanced version.
Often times, these premium versions can find and restore files that the free versions cannot. For example, if you format a hard drive (the long option, not the fast one), then you may find that free recovery software can still recover files.
Here are three of the best payment options, most of which offer a trial version or at least show the files available for recovery before you have to pay, which is quite a detail.
- Stellar Windows Data Recovery: From € 79
- Kroll Ontrack EasyRecovery Home: From € 45
- Disk Drill Pro: From € 97.76
Tips to recover deleted files
Act quickly! The sooner you realize you’ve accidentally deleted a file, the better your chances of recovering it. When you notice its loss, don’t save anything to disk and don’t even download or install a file recovery utility.
If the file was on the hard drive of your PC or laptop, do not modify its current state, as a change could overwrite the same files that you are trying to recover.
Use the portable version. Some recovery programs can be run directly from a USB flash drive, but you must download them using a different computer.
Even browsing the Internet to find a recovery utility causes files to be overwritten on your drive, so use a different PC to download the software program or tool.
Free up some space. The recovery utilities only work reliably with sequential files. If your disk is reasonably full, Windows often has to divide the file into blocks around the disk.
Also, the drives use different file systems and any disk recovery utility will only work with certain types of file systems. Windows hard drives use the NTFS file system.
However, USB flash drives and memory cards generally use some variant of FAT (FAT16, FAT32, or exFAT) and you must select the software with the necessary support for all your media.
Can files be recovered from a bad SSD or hard drive?
Once we have clarified that the files do not have to be lost forever, we come to the greatest fear on the part of computer users: the appearance of a hard disk failure.
This could manifest itself in a number of ways, but in general, Windows won’t start, not even in ‘safe’ mode, and turning on your PC may be accompanied by unpleasant disk noises. You risk losing all the contents of the disc.
Some suggest that certain hard drives have been repaired by putting them in the freezer for a while. But this is like putting the wet mobile in a jar with rice grains to await their salvation, it only happens on certain occasions.
Often times it won’t work and trying it could be the last straw for the record to break down further. Our recommendation, therefore, is that you do not try this or any other repair associated with DIY.
In return, as soon as you suspect a hardware failure, you should immediately shut down your PC and contact a data recovery company like Kroll OnTrack. These companies have large stocks of replacement parts that they can exchange in their cleanroom to restore the failing part.
Once this is accomplished, they will copy all the data they can recover onto encrypted removable media such as a USB drive. This works for failures of disk parts such as electronic circuit boards, the motor, or the read/write head, but there is a limit.
In the case of mechanical discs, if it is the disc part or the head plates that are scratched, you usually end up with recovery options. Fortunately, these failures are rare.
As always, it is worth assessing which company we should use and whether it is a good idea to choose a company that diagnoses the problem or provides us with a budget since in most cases advanced recovery will cost us an arm and a leg.
Technicians can also use the latest techniques to recover data from a failing SSD drive. These services can cost around € 700 so it should be the last resort to turn to and only if the lost data is of great value to you.
How to recover deleted files
For our tests, we have used Diskdigger, but the process is similar to all recovery programs.
Step 1. Download DiskDigger. You don’t need to install it, just extract the contents of the .zip file and run the .exe file. Remember that if you have already accidentally deleted some files, you should not download DiskDigger to the disk that contains your lost files.
Step 2. Start DiskDigger. The main screen shows all discs. Select the one containing the deleted files and click ‘next’ three times. Now the disk will be scanned and all deleted files will be listed; this could take some time.
If the files you are looking for are listed, continue to the next step. If not, you could try altering some of the options on the previous screens and scanning again.
Step 3. DiskDigger will not be able to display the correct file names, so to help identify lost files, a preview option is provided. Select a file from the list on the left and choose the label ‘Preview’ (for photos) or ‘First few bytes’.
Also useful for photos is the ‘thumbnail’ option in the ‘view’ menu, which will show small images in the list.
Step 4. When you have identified your lost files, select them from the list on the left and click ‘Recover selected files …’. Next, select the device and folder where you want to restore your files (this should not be on the same physical drive as the lost file).
The rest of the files will be saved with automatically generated file names, so you will need to rename them to your original names.
How to show IDM on YouTube in Chrome
This is how to bring up IDM or Internet Download Manager on YouTube in the Google Chrome browser, follow every step, OK!
Surely you often experience it, when you want to download videos on YouTube but the IDM software doesn’t appear on Google Chrome.
Even though I have installed IDM correctly, but it still doesn’t appear, what’s the matter? If you have installed it correctly, there is one more thing that you must install on Chrome Guys.
Curious, what should you install? Let’s just see how to bring up IDM in Chrome, check this out!
SHOW IDM ON YOUTUBE IN CHROME
- Make sure you have IDM installed on your PC or laptop, guys.
- Then open the Chrome browser
- On the main Chrome page, you select Web Store.
- When you enter the main page of the Web Store, you can immediately search for the IDM Integration Module in the search field.
- If you have found it, you click the Add to Chrome button.
- Wait until the download process is complete.
- Later a dialog box will appear asking for approval and just select Add extension.
- Close and reopen your Chrome browser.
Now go to YouTube and see IDM will appear when opening the video.
Also read: How to Delete Windows Applications, Guaranteed to Clean!
So that’s it, how to bring up IDM on YouTube in the Chrome browser. How easy is it? Now just pop up your IDM and download all the videos on YouTube!
How to Prevent Pegasus Spyware Attacks on Personal Cellphones, Must Try
In the last few days, the internet world is being enlivened with the emergence of spyware Pegasus latest version.
Reportedly, spyware Pegasus is used by the governments of various countries to spy on the cellphones of a number of parties.
A number of names are said to have been targeted, from French President Emmanuel Macron, Telegram CEO Pavel Duvrov, to PSG football club owner Nasser Al-Khelaifi on the list.
They immediately took several actions to avoid being attacked by spyware Pegasus.
Currently, the main targets are important figures.
However, it is possible that Pegasus spyware also attacks ordinary people.
For that, we want to share how to prevent Pegasus spyware attacks on personal cellphones.
Want to know what it’s like? Continue to the next page!
Pegasus spyware can attack via messaging applications such as WhatsApp and iMessage.
If the device has been attacked, then the access on it can be said to have been taken over.
With Pegasus spyware, someone can remotely read incoming messages, emails, photos in the gallery, tap phones, track locations, and record voices.
The way to prevent Pegasus spyware attacks on personal cellphones can be said to be “hard and easy”.
University of Surrey cybersecurity professor Alan Woodward said in theory the Pegasus spyware could be removed from the device.
However, it is difficult to know whether a cellphone has been attacked by the pegasus spyware or not.
For this reason, he suggested that users routinely restart their cellphones.
In addition, users can also install anti-malware software to strengthen security.
“If you are someone who is at risk, you should install some anti-malware software on your phone,” he said as quoted by Kompas.com.
Furthermore, another way to prevent Pegasus spyware attacks is with the help of security applications.
This application can consist of a password manager or authenticator. Morning Context co-author Advait Palepu has shared his recommendations.
Through his Twitter account @advait_px, he created a thread containing recommendations for software and applications that can be used to prevent Pegasus spyware attacks.
Some popular software names such as Bitwarden and Google Authenticator are included in the list.
In addition, there are other ways that can also be done to avoid Pegasus spyware attacks.
Launching The Washington Post, users must be diligent in updating software.
Because with software updates, automatically the security system used is also updated and stronger.
To make it easier, users can set after the device to automatic update to make it more practical.
However, the automatic update can be set specifically if the device is connected to WiFi only.
The reason is, to update the software takes a lot of quotas and a strong signal.
Then users who are still using cellphones that are more than 5 years old are also highly recommended to replace them.
Especially if the cellphone has not received the latest operating system update from the developer.
Well, those are some ways that can be done to prevent attacks spyware Pegasus.
6 Tips for Keeping Twitter Accounts Safe So You Can Avoid Hackers
Twitter has many users, some of whom expect to avoid hackers who aim to account for bad things.
For users who want to avoid hackers can follow 6 tips to keep a safe Twitter account.
Of course, the tips for maintaining this account are done directly in the application Twitter, or his website version.
Twitter has become a fun place to find inspiration from diverse content, participate in conversations to find useful new hobbies.
Not infrequently from this platform we often find interesting things that become trending.
The experience of using Twitter will be more comfortable if everyone stays alert and takes steps to improve security.
In an effort related to security and privacy, Twitter said it always reminds people to be responsible for managing their respective Twitter accounts.
These 6 tips to keep your Twitter account safe were also given directly by the company, let’s take a look at the next page!
1. Use a unique password
Make sure you create a strong Twitter account password using a minimum of 10 characters with a combination of uppercase, lowercase, numbers, and symbols.
Try to use a different password for each website you visit.
Consider using password management software that can keep all of your login information safe.
In addition, you can go to the Password reset protection menu located in the Twitter account settings.
2. Use the two-factor authentication method
Actually, we have heard this second method quite often on various platforms including Twitter.
However, for those of you who have just discovered these tips, see how and their benefits on the next page.
Two-factor authentication (2FA) is an extra layer for your Twitter account to be secure.
In addition, to ensure that only you can access your own Twitter account.
That way only people who have access to your password and mobile number (or security key) can log in.
Starting in late June 2021, Twitter users have the option to use a security key as the only form of two-factor authentication (2FA), which is the most effective way to keep Twitter accounts secure.
3. Make sure you are logged in via the official Twitter site
Phishing will always lurk for personal information if people visit fake sites.
A Phishing web interface similar to the Twitter log-in page is very vulnerable to deceive users.
So Twitter provides tips to double-check the links you open, both from email and Direct Messages before providing your personal data including passwords.
Furthermore, to be even more secure, you can do something that you can see on the next page.
That is, those of you who are affected by phishing can change your password as soon as possible and read the guide at this link.
4. Be wary of those who act in the name of Twitter
These tips are given because there are parties who are not responsible on behalf of Twitter.
So you need to always be vigilant if there are parties claiming to be Twitter representatives who contact and ask for personal data.
Twitter says it never asks users for passwords via email, Direct Messages, or replies.
That way users are expected not to open attachments or links if they receive a message to install any software, as it’s not from Twitter.
5. Be alert for suspicious login alerts
Twitter will usually send notifications via email or push notifications if it detects suspicious activity or when you log into your Twitter account from a new device for the first time. You can check the benefits of this notification on the next page.
Incoming alert notifications usually include a location that is an approximate IP address used to access Twitter.
Through this notification, you can verify whether the person who actually entered through the device is you or not.
Otherwise, we recommend following the steps listed in the notification to secure your account, starting with changing your password.
6. Check existing links on Twitter (especially if they are shortened with bit.ly)
As a place for conversation to occur, people on Twitter share a lot of interesting information, and many share links to other sites, either through Tweets or Direct Messages.
If you see a link using a URL shortener, such as bit.ly or TinyURL, be sure to check the direction of the link before opening it.
Or you can use a free plug-in from Chrome or Firefox to show an extended URL without having to click it first.
Of 6 tips to keep a safe Twitter account, which do you think is very important?
How to find a TikTok user – Sync friends from social networks
SHARE How to find a TikTok user:- Since its launch, TikTok has gained a lot of popularity among various groups...
How to Lock a Document in Microsoft Word
SHARE In this lesson, we will learn how to lock a document in Microsoft Word with a password. Well, for...
How to Edit PDF to Word Using Microsoft Word
SHARE The easiest way to edit PDF files is with Microsoft Word, usually, this is needed to tidy up the...
How to Give Password in Excel Document
SHARE Giving a password to an Excel document is really something you need to do, especially if the document you...
How to Generate Random Numbers in Microsoft Excel
SHARE How to make random numbers or random will be easiest when you use Microsoft Excel. Make no mistake, there...
How to Save a Small Document in Microsoft Word
SHARE Discusses how to save small documents in Microsoft Word, which some people may need. This is possible for Microsoft...
How to Print Documents of Certain Pages in Microsoft Word
SHARE This time we will discuss how to print certain page documents in Microsoft Word. Printing one page may already...
How to Randomize Names in Microsoft Excel
SHARE If We have previously discussed how to generate random numbers, this time we will share how to randomize names...
How to Cross Out Specific Data in Microsoft Excel
SHARE Microsoft Excel also provides a feature that allows you to cross out or give a line based on certain...
How to Quickly Change Case in Microsoft Word
SHARE You can quickly change the case of letters in Microsoft Word with the following keyboard combinations or shortcuts, let’s...
Phones2 years ago
Apple iPhone 11 (2019) – Release, Info, Leaks, Rumors
Phones2 years ago
Huawei’s New Operating System is HarmonyOS [ Officially ]
Tech2 years ago
Levi’s Bluetooth Jacket Lets You Control Your Smartphone
News2 years ago
Belle Delphine bath water – Instagram Model Sells Used Bathwater For 30$ To Their Loyal Followers