UFS Explorer Professional Recovery
Available for: Icon Windows

UFS Explorer Technician

For specialists working on the most challenging cases
$840 per year

  • The widest range of supported storage technologies
  • Broadest file system coverage among data recovery products
  • Multi-pass disk imager with advanced processing of read defects
  • Support of forensic disk images of various formats
  • Configurable disk reading procedure
  • Integrated algorithms for disk and file decryption
  • Automatic recognition of metadata of hardware and software RAID
  • Versatile RAID Builder with an internal script handler
  • Multiple tools for work with SAN-class storages
  • Extensive reporting options, including files integrity control
  • Licensed only to business customers

Overview

UFS Explorer Technician is designed for our most demanding business customers facing the most complex tasks and rare data storage technologies. We have included the widest list of supported file systems in this product, even compared to products from other vendors. This also applies to the list of supported data storage systems.

When starting work on a task, you need to create disk images to prevent data corruption or hardware failure. UFS Explorer Technician not only allows you to quickly and accurately create disk images thanks to the presence of a multi-pass disk imager, but also supports hardware write blockers from various vendors that guarantee data integrity and protect it from damage. The program also supports the creation of "full" disk images for non-standard sector sizes, which allows you to apply post-processing of extended sector data (for example, for NetAPP). It is also possible to create images with integrity control (E01 format) for further work with them as digital evidence.

When the images are ready for processing, the program allows you to work with them in the same way as with the original disks: assemble data volumes, search for lost data, etc. Disk images created by programs from the UFS Explorer family as well as programs from other manufacturers, including competitors, are supported.

The program supports a large number of tools for assembling volumes created by various technologies: from simple volumes or RAID volumes to multi-tier, thin-provisioned volumes. When the required tool is not available, it can be added through the plugin mechanism. At the same time, it is not necessary that the plugin was developed by us: a simple and universal interaction mechanism allows you to develop your own plugins.

When the volume is assembled, you can immediately access the data of the file system: the program implements "reading" of all supported file systems. If you need to find lost data or reconstruct metadata after damage, the program supports several modes of volume analysis (scanning), including fast (indexing) and deep scanning.

If the data is encrypted, the program will be able to decrypt it by supporting a large number of popular encryption methods, including BitLocker, LUKS, Apple encryption and so on. Of course, this is only possible if you have the appropriate passwords or encryption keys.

Found data can be processed and sorted in the interface, supported file-level encryption can be decrypted and data can be copied to another medium. Moreover, data copying can be started both manually (file by file, directory by directory), and in automatic or batch modes. In any case, the program not only copies data, but also preserves file attributes. It also has extended support of reports, including file hashes report.

If you only need to assemble a volume for processing by other software, this is also quite easy to do: the program allows you to mount the assembled volume in the OS as a virtual SCSI disk.

UFS Explorer Technician has more strict licensing comparing to other UFS Explroer software to reduce the factor of software piracy. For this reasons the software is only licensed to business customers. The following options of the software activation are available:

Software activation options

letterSoftware Registration Code

A unique alphanumeric code issued on the basis of the submitted user’s System ID, which should be entered in the program’s interface.

flash driveHardware-based Access Key

A Sentinel HL key on a USB-device that enables running the software when physically connected to the computer.

  • Can be transferred between different machines

The details related to the usage of different types of Access Keys along with other licensing terms and conditions are available in the End-User License Agreement.

A demonstration license for the software is provided using a "Software Registration Code" upon request by a customer or a potential customer. A full license is granted after its payment for a certain time (from one to five years) and can be based on a "Software Registration Code" or devivered physically with a "Hardware-based Access Key". The second option requires an additional commission, but it is possible to transfer the license between workstations; renewal of such a license in the presence of a working token does not require an additional fee.

Technical specifications

Supported host operating systems:
Microsoft Windows ®: Windows ® 7 with Service Pack 1 and later
Supported host computer architectures:
x86-64 (AMD64, Intel64)
Supported file systems:
Data access and advanced recovery:
General: FAT, FAT32, exFAT
Windows: NTFS, ReFS/ReFS3
macOS: HFS+, APFS
Linux: Ext2, Ext3, Ext4, XFS, Extended format XFS, JFS, ReiserFS, Btrfs, F2FS
BSD/Solaris: UFS, UFS2, Adaptec UFS, big-endian UFS, ZFS volumes
VMware: VMFS, VMFS6
Data access only:
QNAP QuTS hero: QZFS
NetAPP ONTAP: WAFL (versions 2 to 4)
macOS: HFS
Novell: NWFS, NSS, NSS64
IBM/Microsoft: HPFS
AIX: Legacy JFS1, JFS2 Current Unix.: VxFS4, VxFS6, VxFS7
Older Unix: EAFS, HTFS, DTFS
Urive: NxFS CD/DVD/media: ISO9660/Joliet, UDF
Recovery from complex RAID storages:
Automatic recognition of known RAID metadata, saving and editing RAID configurations
Automatic reconstruction of mdadm, LVM, Apple Software RAID, LVM2, NT LDM, APFS Fusion, JMicron (JMS561 etc.), OpenBSD BIO RAID, Intel Matrix, DDF1 (LSI, Dell, Intel etc.), Silicon Image, DDF2 (Adaptec etc.), Dell Equallogic, CAPI (HPE MSA, Dell PowerVault), NetAPP etc.
Support of most popular standard RAID patterns for RAID 0, RAID 1E, RAID 3, RAID 5, RAID 6, RAID 7, etc.
RAID-on-RAID support: RAID level 10, 50, 60 etc.
Support of custom RAID patterns via RDL or Runtime VIM
Support of "stripe"-volumes with ZFS and RAID-Z (RAID-Z, RAID-Z2, RAID-Z3)
Adaptive reconstruction of RAID 5, RAID 6, RAID 5E, RAID 1, RAID 10, RAID 0+1 and nested RAID (levels 50, 51, 60, 61, etc.) using maps of bad sectors and in case of presence of defects (reading errors)
RAID assembly from virtual disks
Support of Drobo BeyondRAID, Synology Hybrid RAID, Btrfs-RAID, Microsoft Storage Spaces, LVM thin-provisioned volumes
Recovery from Dell EqualLogic Storage Arrays with degraded RAID 5, RAID 10, etc. and up to double-degraded RAID 6, RAID 60; volume data recovery (using an external plugin)
Supported encryption techniques:
General full-disk encryption
LUKS/LUKS2 encryption
Apple FileVault 2 encryption
VeraCrypt (TrueCrypt) encryption
Encryption of Apple APFS volumes
BitLocker and BitLocker To Go encryption
OpenBSD BIO
Encrypted VMDK virtual disks
Encrypted macOS DMG and sparsebundle files
JMS561 bridge chip encryption (WD MyBook etc.)
Disks from older WD MyBook/MyPassport devices with Symwave SW6316, Initio 1607E, JMicron JMS538 and Oxford OXUF943SE bridge chips
File level encryption (eCryptFS)
Supported virtual disks and disk images:
Non-encrypted disk images created with specialized forensic tools (EnCase, FTK disk imager etc.) - E01, Ex01, AFF4 etc.
Simple disk images with no metadata
VMware VMDK (including seSparse snapshots), Hyper-V VHD/VHDX (including AVHD/AVHDX snapshots), QEMU/XEN QCOW/QCOW2, VirtualBox VDI, Apple DMG, Parallels HDD/HDS
Internal sparse format (SDLSP)
Support of a volume as a disk image (for XEN LVM virtual disks and similar)
Synology Sparse iSCSI
Opening a partition/file within a storage as a virtual disk
Support of DeepSpar DDI images (with the map)
Custom "virtual image" files of Runtime Software
R-Studio image files (RDR file format)
Work with disk images created by MRT and ACE Lab data recovery tools (sorting and combining file image chunks into an image file)
Supported technologies:
Automatic reconstruction:
Logical Disk Manager, Storage Spaces, Microsoft volume deduplication, Apple Core Storage, Apple Software RAID, LVM, mdadm, supported hardware and software RAID metadata.
Partition structure:
MBR, Apple Partition Map, BSD/Adaptec/Solaris/Unix Slice Map, GPT, Novel, RAID
Recognition and hinting for:
Providing a partition table, information about Spans and Stripes of AIX LVM, HP-UX LVM
Indication of Drobo volumes, HP EVA, HP LeftHand, Symphony SAN, HPE 3PAR etc.
Ways and means to work with damaged disks:
On-demand disk imaging: advanced reading of the required data with immediate transfer to the disk image. Re-reading only from the image.
Embedded multi-pass disk imager with settings for read method/timeout and parameters for skipping defects
Direct network access and processing of disks connected through DeepSpar Disk Imager, including imaging by a bitmap
Advanced “Open storage” procedure with drive reading configuration and with possibility to pass the disk directly to the disk imager (with no partition or file system search)
Production of a defects map during the imaging process
Optional production of a entropy map during the imaging process in low or high resolutions
Conversion of used file system space to a mask
Imaging of used space with the help of a file system map
Creating "dynamic" (pattern-based) maps of bad blocks for disk images
Use of disk images instead of original disks (including ones from third-party software)
Defining damaged regions using bad sector maps created by UFS Explorer or compatible third-party tools (DeepSpar DDI, ACE Lab data extractor, ddrescue and others)
Interaction with MRT Data Explorer, including the support of task files and control over disk imaging performed by MRT data recovery tools (imaging by a bitmap, choosing specific ranges, files/folders, etc.)
Supplementary features:
Tools for low-level data analysis:
Hexadecimal viewer for storages, partitions, files, file fragments
Field highlighting
Data interpreter
Parity calculator
Storage content comparison
Bitwise "exclusive OR" (XOR/Parity) function
Parallel search
Data allocation tracing through address translation
Tracing of data to files through reverse address translation
View of file fragments with virtual offsets and sizes
Tools for making changes to the binary content:
Hexadecimal editor for storages and partitions
Secure erasure of data from the storage (overwriting with zeroes, including with the help of an entropy map, SCSI format)
Auxiliary features facilitating storage access
Direct interaction with SCSI devices using raw SCSI commands
Direct interaction with (S)ATA devices using raw ATA commands with support of some USB bridge chips
SCSI commander tool to issue any custom SCSI command (unlock, format etc.)
Networking
Supports remote access to iSCSI targets created with UFS Explorer (Network RAID, Professional, Technician) and other third-party iSCSI targets.
Embedded iSCSI Target (server) can provide remote access to the assembled volumes to iSCSI clients (initiators).
Data sharing
Software can mount an assembled volume as a local virtual SCSI disk to share access to the data to OS or third-party software (using iSCSI).
Additional functions related to storage scan:
Pausing the scan
Previewing intermediate scan results
Saving scan state at any point as a "checkpoint" to return to
Saving scan results for further work
Full-range storage scan for all-at-once data recovery
Visualization of the scanning process
Five options for handling the existing file system
Options for work with partitions:
Automatic detection of lost partitions
Search for lost partitions
Defining partitions manually
Automated partition aligning
Reporting capabilities:
Interactive HTML report
Basic list of folders and files (HTML, CSV, XML)
Extended report on files and folders with the possibility of file integrity control (hash value, metadata test)
Report on file fragments
Recoverable data size with metadata test
Software events log
Minimal configuration:
64-bit edition of any of the supported operating systems
at least 30 MB of free space on the disk for the software executable files
at least 32 MB of free RAM
Recommended configuration:
over 1 GB of free space on the disk for the program and temporary files
at least 8 GB of RAM and 4 logical cores CPU
default web browser

Main functional differences to UFS Explorer Professional Recovery

UFS Explorer Professional Recovery
UFS Explorer Technician
Multiple platforms (Windows, macOS and Linux)
Windows installation only
Perpetual (lefetime) license with 1 year of updates
Limited-term license (1 year) assigned to a single seat or computer
Data access for NetAPP WAFL, QNAP QuTS hero QZFS, AIX (Legacy JFS1, JFS2), Older Unix (EAFS, HTFS, DTFS), Current Unix (VxFS4, VxFS6, VxFS7), Urive (NxFS)
Support for tiered storage of QNAP (Qtier technology)
Automated RAID assembly for Dell EqualLogic, IBM AIX (CAPI RAID), NetAPP etc.
Disk cleanup tool with filler procedure (including by using Entropy map) and SCSI format tool (including sector resize)
Comprehensive report on files and folders with optional hash value and metadata tests to verify the integrity of files
Extension of the program’s functionality via supplementary plugins (for data recovery from Dell Equallogic, HPE MSA and others)


Compatible additional components (plugins)

Data recovery plugin for Dell EqualLogic

Data recovery plugin for Dell EqualLogic is designed to automate the assembly and provide straightforward access to volumes on Dell EqualLogic Storage Arrays.

Data recovery plugin for Dell EqualLogic

Data recovery plugin for HP StorageWorks EVA facilitates data recovery operations on HP Enterprise Virtual Arrays (EVA) by automating the reconstruction of Vraid array configurations and providing prompt access to the virtual volume content.

Data recovery plugin for HPE MSA

Data recovery plugin for HPE MSA assists in retrieving lost data from HPE Modular Storage Arrays (MSA), eliminating the manual effort required to assemble the storage pool configuration and obtain access to the available virtual volumes.



Key features

Work with an exceptional diversity of storage formats Work with an exceptional diversity of storage formats
UFS Explorer Technician provides direct access to the intact content and allows recovering the missing data from an entire range of file systems employed by Windows (FAT/FAT32/exFAT, NTFS and ReFS/ReFS3), macOS (HFS+, APFS), Linux (Ext2, Ext3, Ext4, SGI XFS, JFS, ReiserFS, Sun ZFS, Btrfs, F2FS), BSD/Solaris (ZFS), VMware (VMFS, VMFS6), together with the possibility to read volumes of Novell NetWare (NWFS), Novell Storage Services (NWFS, NSS, NSS 64), IBM/Microsoft (HPFS), AIX (Legacy JFS1, JFS2), Xinous OpenServer (EAFS, HTFS, DTFS), Veritas Storage Foundation (VxFS4, VxFS6, VxFS7) and Urive (NxFS).
Support for forensic and other disk images Support for forensic and other disk images
Along with ordinary disk images created with various utilities, UFS Explorer Technician is capable of working with ones produced by professional forensic tools, like EnCase Imager and FTK Imager, and specialized data recovery solutions, like DeepSpar DDI, MRT DE, R-Studio and others. The software makes it possible to open and browse the content of an image created for a particular drive, volume or file and allows scanning it for lost information as if it was a conventional physical storage device.
The possibility to prove the forensic reliability of data The possibility to prove the forensic reliability of data
The software provides an extended report on the available/recovered data with the information about the processed storage, its content, various details about each file, like its size, time of its creation, last access and modification, the state of its metadata and others. The integrity of the content of files can be easily controlled with the help of checksums – even a change of a single byte will become evident after a simple visual comparison of the file's hash values in several reports. A wide set of hashing algorithms can be used for the calculation, including MD5, SHA1, SHA256, SHA512 and others.
Plenty of other reporting options Plenty of other reporting options
The utility also allows creating a report with an interactive representation of the file system content that can be easily transferred to third parties and viewed in any standard web-browser. Besides, the program offers many other report types, like one on the size of the data with files/folders metadata integrity check, a basic list of folders and files in various formats, a log of the most important software events with their details, a list of file fragments with both physical and virtual offsets, etc.
Wide spectrum of supported storage technologies Wide spectrum of supported storage technologies
UFS Explorer Technician delivers efficient means for handling a broad range of technologies applied in modern storage devices. These include Windows Dynamic Disks and Storage Spaces, Apple Software RAID, Core Storage and Time Machine, Linux mdadm, LVM with Thin Provisioning, Btrfs-RAID, ZFS RAID-Z, Drobo's BeyondRAID, Synology's Hybrid RAID, QNAP's Qtier and other specific implementations. The application also supports the technology of Microsoft data deduplication (Windows Server), making it possible to restore data lost from deduplicated volumes with NTFS and ReFS.
Instant unlocking of encrypted volumes Instant unlocking of encrypted volumes
The program recognizes most common encryption technologies, including LUKS, VeraCrypt (TrueCrypt), BitLocker, FileVault 2, APFS encryption and eCryptFS, enabling access to the available files and recovery of lost data from encrypted volumes or directories, provided that the user knows a password/encryption key. It is not necessary to enter the operating system and decrypt the drive – you can simply input the password/key in the software interface, and it will use it to decode the storage for further manipulations.
Access to RAID files and effective data recovery Access to RAID files and effective data recovery
The software is able to automatically reconstruct different RAID patterns, including non-redundant RAID level 0 and JBOD, 1 and 1E mirrors, levels 3 and 4 with dedicated and 5 and 6 with distributed parity as well as nested RAID setups. A special syntax allows defining custom RAID configurations with various data distribution algorithms. The utility can also adaptively restore a defective RAID set using parity (for RAID 5 and RAID 6) or a copy of data (for RAID 1). RAID can be also reconstructed using disk images with the emulation of bad sectors with the help of bad sector maps.
Work with modern virtualization systems Work with modern virtualization systems
UFS Explorer Technician supports virtual disks used by popular virtual machines, including VMware, Hyper-V, VirtualBox, QEMU and XEN, works with them as if they were just physical devices and makes it possible to navigate them or recover data even when they are stored on RAID or on another virtual machine. For example, the user can build RAID storing a VMware ESX virtual machine (VMFS file system), open a virtual disk directly from VMFS and restore files directly from the virtual machine without the need to retrieve the virtual disk first.
Controlled disk reading procedure Controlled disk reading procedure
UFS Explorer Technician makes it possible to select the method of data access and choose an I/O timeout for cases when reading is not successful due to an I/O disk error. A "read-once" feature allows avoiding excessive read requests to the same location on the storage and save the processed information to a sparse image file, eliminating the load on failing devices and keeping them from the imminent breakdown.
Advanced disk imaging possibilities Advanced disk imaging possibilities
The program allows creating a full clone of a disk or modifying the imaged area either by defining ranges on the storage or by choosing a set of files to be copied. The in-built disk imaging tool also offers configurable parameters, like reading timeout, block size, direction, protocol and settings for processing of defective areas after failed reading attempts. The faulty blocks encountered during the procedure are presented in a map file and a log of reading errors can be saved as a report.
Defining damaged sectors Defining damaged sectors
UFS Explorer Technician creates maps of defects in the process of disk imaging and works with ones produced by other compatible software or hardware systems. The utility can use such a map to emulate bad sectors on the storage or identify damaged blocks dynamically by looking for a given content template. Furthermore, it is possible to set up a mask with imitation of defects from the occupied or "free" file system space and utilize this mask for disk imaging, scanning and other operations. The masked areas can also be filled with a specified pattern.
Multiple types of scanning Multiple types of scanning
The program has several scanning options, including a quick scan for specific types of file systems, longer in-depth search for lost data by known content with the possibility to load custom IntelliRAW rules, scanning of the space occupied by the file system or just the "free space" areas. The scanning process can be paused for the review or saving of intermediate results and the final result can also be saved for further usage.
Sector size mutation Sector size mutation
While a sector size of a usual hard drive is 512 bytes, some systems, like NetApp, EMC, HP, etc. employ proprietary block formats, preventing access to data on their storage devices without specialized hardware. UFS Explorer Technician works with SCSI and SAS drives of non-standard sector sizes (520 bytes, 524 bytes, 528 bytes and others) and carries out automatic sector conversion in the typical size of 512 bytes through metadata truncation for access to files or subsequent data recovery operations.
Support of DeepSpar Disk Imager Support of DeepSpar Disk Imager
UFS Explorer Technician enables direct access via network and allows recovering data from drives connected to a DeepSpar Disk Imager device with the possibility to define the read timeout, block size and other settings for maximum safety and efficiency of the procedure. The imaging can also be performed by DDI on a basis of a bitmap loaded into the software. Furthermore, the program supports "split" disk images created by DDI.
Interaction with MRT data recovery systems Interaction with MRT data recovery systems
The application is compatible with MRT Data Explorer, supports task files created by this software along with defects maps associated with them and provides control over disk imaging carried out by MRT Express/Ultra, including the opportunity to image by a bitmap, choose specific ranges, files/folders, etc. Also, UFS Explorer Technician allows loading file image chunks from an MRT task, sorts them automatically and fills them with the necessary spacers for further work.
Broad set of tools for efficient data analysis Broad set of tools for efficient data analysis
UFS Explorer Technician comprises all the instruments required for effortless work with the binary content of storages, partitions, files or their fragments in a hexadecimal mode. A multifunctional hexadecimal viewer with a raw data inspector, position bookmarks, structure templates, reverse data address translation, parallel search, data comparison and other features considerably assists in data parsing while a hexadecimal editor with a variety of helpful options enables it convenient manual editing.
Direct communication with SCSI devices
The software allows users to issue specific SCSI commands and thus communicate with SCSI-based storage devices, like enterprise-grade hard drives, RAID sets and other media that support the SCSI protocol, at the lowest level. A special SCSI command tool embedded into UFS Explorer Technician makes it possible to go beyond standard operating system interactions in order to obtain the necessary control and diagnostic capabilities, especially useful when performing operations on problematic storages.
Means for secure data disposal
The program incorporates a dedicated wiping tool that allows overwriting all the data available on the selected drive with zeroes in order to be sure that it no longer holds any recoverable information. The process of erasure can also be accelerated by skipping the "unused" areas with the help of an entropy map generated from a previously captured disk image or clone. Such a possibility makes it simple to clear the storage and prepare it for further use, reducing the risk of potential disclosure of the data related to a previous case or accidental contamination of the new one, without the need for separate third-party utilities.
Expandability via additional plugins
The capabilities of UFS Explorer Technician can be enhanced through additional plugins created to address the unique data recovery requirements of particular storage systems, like Dell EqualLogic SAN and others. Once downloaded and activated, a compatible plugin seamlessly integrates into the software and becomes accessible from the list of available plugins as if it was an integral part of the program’s data recovery toolkit. Users can easily handle the plugins offered for the utility and thus tailor its functionality according to their individual demands.

When to use UFS Explorer Technician

screen
Get access to files or cope with data loss from common storage media: hard disk drives, USB sticks, memory cards, etc.

The utility effectively works with various linear storage devices, including internal as well as external hard disk drives, USB flash drives, memory cards and many others, thus serving as an essential data recovery tool for handling most typical cases of data loss, like accidental deletion of files, storage formatting, malware attack, hardware or software malfunction, etc.

screen
Recover data from complex storage systems: RAID and RAID-based devices

UFS Explorer Technician is an efficient solution for restoring data from RAID of different complexity, both software and hardware, and various RAID-based storages, like DAS, NAS and SAN. Moreover, the software makes it possible to perform data recovery from systems that apply specific RAID configurations, like Drobo BeyondRAID, Synology Hybrid RAID, Btrfs-RAID, ZFS RAID-Z, Dell EqualLogic and HP MSA with diagonal XOR.

screen
Work with devices implementing specific technologies: Apple Core Storage, LVM with thin provisioning, Storage Spaces, etc.

The software is enhanced with wide support of modern storage technologies employed in different environments. It allows processing composite volumes, including Apple Core Storage, LVM with thin provisioning, MS Storage Spaces and Dynamic Disks, deduplicated NTFS and ReFS partitions, SCSI/SAS-drives with non-standard sector sizes, QNAP NAS with enabled automated tiering (Qtier technology), etc. which significantly expands the list of target devices it can be applied to.

screen
Access or restore files from encrypted storages: LUKS, FileVault 2, BitLocker, APFS, etc.

The application is able to decrypt volumes and directories for data recovery and data access purposes (if the encryption key is known). The list of supported methods includes LUKS, VeraCrypt (TrueCrypt), FileVault 2, BitLocker, encryption of Apple APFS volumes and eCryptFS.

screen
Create forensic reports on the retrieved data

The program is able to generate an extended report on the data which may be particularly beneficial for forensic experts. Such a report contains the list of available files, their properties, checksums calculated for them using the chosen hashing algorithm together with the information about the scanned storage, the date of the scan and the time when the report was created.

screen
Retrieve files from defective disks

The application gives the possibility to recover data from storages that have damaged sectors or other hardware issues with maximum efficiency. Not only it offers highly configurable disk reading and imaging procedures, but also generates a map of bad blocks during the imaging process. In addition, virtual bad blocks can be defined dynamically on disk images by recognizing a given pattern or by reading bad sectors maps created by other compatible solutions. The software also allows converting the used or free file system space to a mask with emulation of defects and use it for imaging/scanning. Bitmap-based imaging via DeepSpar DDI is supported by the program as well.

screen
Open or recover data stored in virtual machines: VMware, Hyper-V, VirtualBox, etc.

UFS Explorer Technician effectively deals with disk images and virtual disks created by major virtualization software, like VMware, Microsoft Hyper-V, VirtualBox, QEMU, XEN, etc. and successfully copes with data recovery from such storages as though they were ordinary physical devices.

screen
Work with "disk-on-disk" storages of any hierarchy

The software is capable of imitating work of virtualization software and consequently provides access and restores files from multi-level virtual storages with no additional operations required. For example, the user can scan a virtual disk stored inside another virtual disk and promptly retrieve files that were lost or deleted from it.

screen
Reconstruct damaged file systems: Windows, macOS, Linux

A set of tools integrated into the software allow effectively solving practically any case of logical data loss, including the most severe ones. The program will either simply read file system metadata or conduct its detailed analysis and predict the allocation of files based on the file system specifics, allocation of other files or file content analysis to produce the best possible data recovery result.

We appreciate your interest to UFS Explorer. Join us on social media to get regular updates about the software.