|

Playing the Hero

After a trip to the Franklin Park Conservatory this afternoon, followed by a nice lunch, we came home and my wife proceeded to head up to the office to work on uploading some of her photos. Not 10 minutes later, I hear her calling for me to come help her.

Somehow, the CF card she was using had become unreadable to her Mac. She had switched on the PC, which would read it, but didn’t show anything on it. Obviously, this is not good.

Now, the software I had loaded on that machine that I had used one other time in a similar situation didn’t read the card either, so I went out to grab a copy of PC Inspector Smart Recovery, which I had used numerous times in the past. Unfortunately, that program hasn’t been updated since 2004, and trying to run it on Vista resulted in an error. This is not good either.

So, I stepped up to Google and found Recovery Manager 1.5 from VAIOSoft. That program doesn’t list Vista as a supported OS either, but I took a chance and installed it, and it worked like a charm. The wife has her photos back, and I have her admiration, at least until the next time I do something dumb. 😉

What do you all use for this sort of recovery, and more importantly, when this happens to me while traveling and I only have my Macbook, what Mac utilities are available for this sort of situation? Or am I better off starting up the Vista virtual machine and use this anyway?

Tags: RecoveryManager, MediaCards, FileRecovery

Similar Posts

  • So far, so good

    Looks like the patching for DST has worked out well for our office. Of course, we won’t really know until tomorrow morning when those folks who never restarted their PC’s to get patched, despite numerous requests to do just that since we made the patches part of an AD startup script, show up and freak…

  • Twitter Hackers Were Smart, But Hardly Genius

    Smart enough to get in, not smart enough to cover their tracks when getting paid. That doesn’t seem so smart. Which goes to show, that security around Twitter could have been a lot better, and people who work there maybe should have been a little less careless. That doesn’t bode well for the rest of us when even a big tech company can’t get this right. How many of us have people on staff who might fall for this kind of phone-based attack?

    What should we think of the complicated, super-smart hackers who also manage to be so easily identifiable? Should we accept that the hardest thing about any conspiracy, and this goes for all the conspiracy theories out there, is making sure one person doesn’t do something stupid and give it all away? That. actually, is nearly impossible, and is the one thing that makes most theories unbelievable to me. This hack proves to be a perfect example.

  • | |

    Blue Wall Preserve

    One of the great joys of living near the mountains, and also in the mild climate of South Carolina, is the chance to simply take any random Saturday, grab the camera gear and do a little hiking/photowalking/exploring around the area, even in the middle of January. Back before my work traveling got crazy, and I…

  • Naming names…

    Geek News Central has a post about unsubscribing to a handful of feeds that are both partial feeds, and filled with Google Ads. He was nice enough not to name names but I’m sure that any of you who subscribe to said feeds (Cough, cough, Lockergnome, cough cough..)know exactly who he’s talking about. Seriously, with…

  • Bumping up the numbers

    I’m sure that most of you who blog and pay attention to the number of subscribers your RSS feed has saw a nice little bump in those numbers now that Google is reporting subscriber counts for Google Reader and Personalized start pages. Today in my Feeburner stats I saw Google go from “fetching the feed”…

  • Interested in Mobile Forensics?

    Pardon me for a moment while I shill for the company I work for. Actually, no I’m not really shilling, I’m promoting a free resource that is being offered up by our mobile forensics division, a podcast that is all about mobile forensics. Join Lee Reiber as he discusses Today’s approach, and tomorrow’s data from…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)