How Do Hard Drives Die?

by | Sep 7, 2015 | Uncategorized

There are normal things that happen to hard drives and individual, occasionally unusual things that clients have managed to do over the three decades we’ve been recovering data for them.

The usual suspects:

Dust, fur, heat, electrical spikes, bumps, loose cables.

People’s cats & dogs create a nice fur blanket that often overwhelms the cooling system for computers, laptops and external drives. See if you can put the computer in a less attractive spot.

Having a computer on a carpeted floor is another surefire way to drag heat-inducing fuzzdust into the box. Better to have it on a hard surface that is elevated a couple of inches off the floor, as heat is one of the main killers of hard drives.

Having an operating device in a sunny spot is another way to kill it with heat. Better to have it made in the shade.

Vacuums, power tools, and some kitchen appliances will often cause a device-disabling power spike. If the lights flicker, your computer and associated peripherals are suffering and in danger. Getting an uninterrupted power supply (not just a power strip) is a good cure for electrical spikes.

Computers and devices are often on side tables, subject to bumping or being knocked over, or on desks with drawers subject to being slammed. These kinds of impacts are unhealthy for hard drives. Besides the impact itself, poorly seated cables can wiggle and provide intermittent power or signal, or become disconnected. These are sudden, sometimes deadly events for hard drives. Make sure all your cables and connectors are secure, and have a stable base for that computer, away from foot traffic and other physical impacts.

The individual / unusual:

People do occasionally throw their laptops, external hard drives (and most definitely their iPhones) against the wall. We recommend against this particular form of emotional outlet.

We have recovered data from laptops and external devices that have had cat urine (a homeowner), people urine (an unpopular professor), a latte (a sleepy client), a martini (a too-awake client?), and any number of glasses of water.

We once had a laptop that burned up in a school library fire to recover data from and ones that have been flooded, others that have had been covered with fire retardant foam from putting out a house fire.

As the author writes this article, we’re recovering data from a laptop that was run over by a truck.

Lots of flash drives have gone through the washer and dryer. My experience is that they give up the ghost in the machine after about three washings.

We’ve had flash drives that have been “accidentally” hammered, and ones that were inadvertently bent up from the side of a laptop and broken (I’ve personally had the transmitters for 2 Bluetooth mice broken that way.)

One sorry client’s wife thought he had his little black book on his desktop PC. She took it out back to the children’s sandbox, shoveled sand into it, and then had at it… with a sledgehammer! He said that the computer contained only a stamp collection database. Unfortunately, his stamps were cancelled – with bent internal platters, this is one from which we didn’t manage to recover much useful data.

Sports: when my energetic kids were little, a Nerf ball against a hard disk was enough to knock it out. And then there are the occasions of the aforementioned use of laptops as basketballs with walls as the backboard…

In the meanwhile, we hope you’ve enjoyed this sampling from the disk drive graveyards.

And if it comes to it, we hope you remember to use Burgess Consulting for your data recovery needs.

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Pin It on Pinterest

Share This