Every day we offer FREE licensed software you’d have to buy otherwise.

Erelive Data Recovery 6.6.0 for Windows  Giveaway
$49.99
EXPIRED

Giveaway of the day — Erelive Data Recovery 6.6.0 for Windows

Recover all types of lost or deleted files including photos, documents, videos
$49.99 EXPIRED
User rating: 115 (80%) 28 (20%) 49 comments

Erelive Data Recovery 6.6.0 for Windows was available as a giveaway on November 29, 2020!

Today Giveaway of the Day
$24.95
free today
Professional screen recording software.

Erelive Data Recovery can recover lost or deleted photos, music, video, document, archive etc from Windows or laptops Hard Drives including recyle bin, external hard disk, flash drives, memory cards,cameras and camcorders etc.

It can recover deleted files from all kinds of media storage devices, including recover lost date from Windows computer or tablets hard drive, SSD, USB drive, camera or camcorder memory, SD card, MP3 player, MP4 player, game box etc.

Supported files types:

- Recover Photos and Images like JPG, TIFF/TIF, PNG, BMP, GIF, PSD, CRW, CR2, NEF, ORF, RAF, SR2, MRW, DCR , WMF, DNG, ERF, RAW, etc.
- Restore Audio, Music format like M4A, MP3, WAV, WMA, FLAC, AIFF, DTS, MID, MIDI, OGG, AAC, QCP, AMR, etc.
- Relive Videos, Movies like AVI, MOV, MP4, M4V, MKV, AVCHD, MTS, M2TS, MXF, XAVC, H.265, 3GP, 3G2, WMV, ASF, FLV, SWF, MPG, RM/RMVB, etc.
- Retrieve Documents like Word DOC/DOCX, Excel XLS/XLSX, PowerPoint PPT etc
- Recover Archives like RAR, ZIP, BZip2, 7z, SIT, SITX, SYS, LIB, DLL, 7ZIP, GZIP etc
- Recover other lost files like Email content, EML, PST, EMLX, MSG, DBX, EDB, BMS, NSF, BKL, BKS, PAB

System Requirements:

Windows XP/ Vista/ 7/ 8/ 10

Publisher:

Erelive

Homepage:

https://www.erelive.com/data-recovery/

File Size:

11.2 MB

Licence details:

Lifetime, no updates

Price:

$49.99

GIVEAWAY download basket

Developed by Informer Technologies, Inc.
Create videos and snapshots using your webcam camera.
Developed by IObit
Transfer data between your computer and Garmin devices.

Comments on Erelive Data Recovery 6.6.0 for Windows

Thank you for voting!
Please add a comment explaining the reason behind your vote.
#13

I downloaded this file. (attempted to) My MS security would not allow it to be load (opened) unless it is over ridden by operator. I clicked on more information and it told me that the creator was not disclosed and that there was no certificates. I elected not to down load it, based on this warning form my MS - which is not may security program - that runs constantly. It does not act until the file is actually downloaded or possibly even until actually installed.
Any program from an unknown source with no certificate (not even an expired one) should be downloaded and activated without much serious thought and research of it's source and history.

Reply   |   Comment by ALLEN Peyton  –  10 months ago  –  Did you find this comment useful? yes | no (-2)
#12

It is easy to use and powerful. Thank you for your giveaway and it helps me to recovered my photos and videos from my camcorder. All the files are important to me.

Reply   |   Comment by James  –  10 months ago  –  Did you find this comment useful? yes | no (-5)
#11

I have bought the 1 year license before and it did a great job to recover my lost photos and other files.
I have not met any safety issue during or after I used it.
Now I will buy the lifetime license with the 70% off discount. It is the biggest discount I could find. It is even cheaper than the 1 year license.

Reply   |   Comment by Joseph  –  10 months ago  –  Did you find this comment useful? yes | no (-5)
#10

Use Recuva - its much better !!!

Reply   |   Comment by mort  –  10 months ago  –  Did you find this comment useful? yes | no (-2)
#9

I've never had Windows 6.6.0 & why would I want to recover it if I did?
(That's a joke "Son" )

Reply   |   Comment by Ron Dunn  –  10 months ago  –  Did you find this comment useful? yes | no (+1)
#8

EULA does not exists in China nor it is allowed to be used. Any vendor from China has integral rights to ravage your computer data at will, unknown to the user and in background, it is normal behavior to them. All, I repeat, All software in China is controlled by the government, be careful.

Reply   |   Comment by kerry  –  10 months ago  –  Did you find this comment useful? yes | no (+51)

kerry, Hmmm I smell FAKE NEWS. MANY China devloped programs contain an EULA and it is part of Chinese law that companies trading in other nations must obey local laws. The problem comes in enforcing our local laws upon Chinese entities. Did you know Q was a Russian agent?

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+4)

kerry, It is totally wrong. If it is controlled by the government, why products from China are popular all of the world.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-3)

kerry, Please provide the evidence that it can ravage your computer data, please firstly prove it before saying it.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-3)

kerry, This is the reason I don't download any chinese softwares. This is the reason the Indian government has banned more than 150 chinese apps and games.

Reply   |   Comment by Chirag  –  10 months ago  –  Did you find this comment useful? yes | no (+4)

kerry, You know this how exactly? Sounds like propaganda.
This said, unless someone can show me a link between proxydoctor.com and the military industrial complex or US or British intelligence, I think that based on the information there, I have to pass.

Reply   |   Comment by Jake  –  10 months ago  –  Did you find this comment useful? yes | no (-1)
#7

Thanks to everyone on this thread for your detective work. I won't be downloading this one.

Reply   |   Comment by Ava  –  10 months ago  –  Did you find this comment useful? yes | no (+17)

Ava, Ava, It is safe to use. Those who said it is not safe, there is no evidence to prove it, it is hostile attack.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-2)

Ava, check Recuva as an alternative: https://www.ccleaner.com/recuva
It is free and as far as I know it does not send data to its maker.

Always install this kind of software on another partition than the files to be recovered.

Reply   |   Comment by krypteller  –  10 months ago  –  Did you find this comment useful? yes | no (+7)

krypteller, Great recommendation. I have used Recuva before. Thank you.

Reply   |   Comment by Ava  –  10 months ago  –  Did you find this comment useful? yes | no (0)

Helen, That makes me feel so much better. Still not downloading it.

Reply   |   Comment by Ava  –  10 months ago  –  Did you find this comment useful? yes | no (-1)
#6

Thanks TK for the IP. Here is where it traces to:

inetnum: 123.112.0.0 - 123.127.255.255
netname: UNICOM-BJ
descr: China Unicom Beijing province network
descr: China Unicom
country: CN

Sorry, I won't install an app that hides their Chinese company info.
On their website, the lines at the bottom of the page should link to some statements about copyright or privacy. There is no links... not good!

Copyright 2020 Erelive All Rights Reserved Privacy

Reply   |   Comment by JackieK  –  10 months ago  –  Did you find this comment useful? yes | no (+62)
#5

It would be helpful if you let us know where these software companies are located. Are they located in Russia, China, etc?

Reply   |   Comment by Jay  –  10 months ago  –  Did you find this comment useful? yes | no (+34)

Jay, In this case, China

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+1)

TK, smells like xenophobia.

Reply   |   Comment by Jake  –  10 months ago  –  Did you find this comment useful? yes | no (-1)
#4

It is only possible to recover from the hard drive, files that were deleted 3 years ago - if you do not use the PC for the past 3 years since deletion of those files.
Otherwise, the hard drive sectors would be over-written. It would not be possible to recover the files in that case.

Being a shill requires expertise. Otherwise it is easily exposed.

Reply   |   Comment by ricohflex  –  10 months ago  –  Did you find this comment useful? yes | no (-5)

ricohflex, I think it can be recovered

Reply   |   Comment by Rajesh Pabari  –  10 months ago  –  Did you find this comment useful? yes | no (-1)

ricohflex, not strictly true. Dependant upon the file system and write frequency and volume it is quite possible for deleted files from multiple years ago as certain file systems do not imediatly reuse reallocated to free clusters imediatly and allocate virgin free clusters first, and will not overwrite previously used data until the rest of the free space has been used in an effort to reduce file fragmentation. Being a shill exposer requires certain levels of knowledge and industry wide experience. The advice to do least possible writes to a drive one wants to recover deleted files from stems from the days when FAT file systems in all its guises was in common use and NTFS was solely used by corporate entities using WIndows NT. It is less relevent to NTFS based file systems and completely irrelevant to systems using SSD with an operating supporting and using TRIM on each original file deletion since that practically erases or makes the deleted data completely inaccessible even if you make no further writes to the SSD thereafter!

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+3)

Rajesh Pabari, it is not correct, the files that were deleted 4 year also can be recovered, just times it

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-1)
#3

Gold nuggets for sale in +27719992769

We are the leading sellers of the following mineral Gold bars and Gold Nuggets 99.67% purity 24 carats of Congo origin (DRC) South Africa (Gold Nuggets).on good price. We can supply Gold up to 100 kilograms or even More at a generally low price to meet the buyers resell value for his money, Buyer is free to come down for inspection and viewing of the goods. Kindly contact us if you are interested,

Reply   |   Comment by balaya palaso  –  10 months ago  –  Did you find this comment useful? yes | no (-122)
#2

Some undesirable un notified background communications from this program AFTER registering using the key provided in the readme.txt file and a pseudo email address... My firewall blocked an outbound EMAIL SMTP connection giving me an option to permit it in the future or not. I choose NOT.

"C:\Program Files\Erelive\Erelive Data Recovery\Erelive Data Recovery.exe"

"29/11/2020 09:38:27 PF has blocked outgoing TCP (6) [S] packet from 192.168.1.65:48713 to 123.126.97.1:25 (smtp)"

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+95)

TK, Chinaunicorn company known for malicious network attacks through many Android and windows apps. Also harvest private information. Lookup IP 123.126.97.1 and see for yourself.

Reply   |   Comment by Burt  –  10 months ago  –  Did you find this comment useful? yes | no (+60)

TK, Could you please send the screenshot that shows this issue to support@erelive.com?

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-15)

TK, having blocked that email home I was unable to packet sniff the contents of the email sent... I did not make a screenshot of the firewall alert but a simple search for the 163.com domain, which forms part of the mail servers RDNS, in the executable indicated in the previous comment results in some strings used to produce the email. They are:

"smtp.163.com
fileRecovery@163.com
louis19841027
E Data Recovery
5.2.0 E Data Recovery Registration
The Bat! (v3.02) Professional
New E Data Recovery V5.2.0 Successful Registration. >>>>>>>>>>>"

So none of this will come as any surprise to Erelive developers!

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+36)

TK,
thanks.
Even when downloading directly from the producer ( I tryed just to rename the program ), Windows warns that something suspicious is going on and asks for aprooval to continue.
mario from Brasil

Reply   |   Comment by mario  –  10 months ago  –  Did you find this comment useful? yes | no (+23)

TK, According to several lookups I just did, that IP is a search engine spider located in China. It is blacklisted on one list for phishing.

Reply   |   Comment by Charles Lewis  –  10 months ago  –  Did you find this comment useful? yes | no (+43)

TK, Though it is strange that SMTP protocol is used instead of HTTP(S), there is nothing really alarming in the data tranmitted. Captured by a network sniffer (WIT freeware: What Is Transmitted), here is what is sent:

New E Data Recovery V5.2.0 Successful Registration. >>>>>>>>>>>
04:30:43 11/29/20
anonymous@mail.com 00-D8-60-45-7F-70

The address 123.126.97.1 is part of the 1&1 Webmail network.
I'm not sure if the data sent is even collected. there isn't any TCP response from the server.
00-D8-60-45-7F-70 is the MAC address of the network adapter: strange that this has to be sent. I don't see the need for that.
The address 123.126.97.1 is part of the legit 1&1 Webmail network.

The program is only connecting to Internet ONCE, just after the registration, not unlike A LOT of other programs that call "home" (with HTTP) EVERY TIME you launch them, even if an update check is disabled.

That was my 2 cents...

Reply   |   Comment by Poisson Rouge  –  10 months ago  –  Did you find this comment useful? yes | no (+22)

TK, You are correct, under their privacy disclaimer (there is none), after installing their software, they, in essence own your computer, because under EULA, there is no disclaimer from them and that nullifies any agreements between YOU and their servers. In other words, they can upload and download anything they want from your computer once permission granted or not, background door is always opened to them if you do not give them permission.

Reply   |   Comment by bob  –  10 months ago  –  Did you find this comment useful? yes | no (+30)

Poisson Rouge, anything sent out of your computer it is ALARMING, do not get complicit, any vendor in China must send the data to CCP for review, that includes your recovered DOC files.

Reply   |   Comment by kerry  –  10 months ago  –  Did you find this comment useful? yes | no (+7)

kerry, So when it's Microsoft or Google spying on you (or the US Secret Services), it's fine, but everything from China is bad?

Ok, that makes sense… Or not.

Just block it with your Firewall (Comodo for example)and you will sleep peacefully. :-)

Nobody's safe without a good firewall.

Reply   |   Comment by Poisson Rouge  –  10 months ago  –  Did you find this comment useful? yes | no (+3)

Bonjour Poisson Rouge,

Could you please provide more info on the freeware network sniffer you used ?
I may lack wit but I couldn't find any sniffer with that name...
Thanks

Reply   |   Comment by eb235  –  10 months ago  –  Did you find this comment useful? yes | no (0)

For those interested in the software I mentioned, to capture and analyse data that is sent and received over the network by your computer, it can be found at Softpedia (What Is Transferring 1.0).

It's old but it's free, small, portable, requires no additional installation (no WinPcap), works on Windows 10 and has the basic features. Please note that it has to be launched as admin in order to process the capture.

Reply   |   Comment by Poisson Rouge  –  10 months ago  –  Did you find this comment useful? yes | no (+5)

Helen, no I can't, I never took a screen shot when it happened, but I did copy and paste the pertinent data in the comment and added more in a reply comment to myself with proof of what it was. who the to: address was and what basic information was included by examining the programs executable.

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+2)

Poisson Rouge, point 1: unsolicited and un notified outbound SMTP connection to an unknown 3rd party SMTP server by a new third parties progtram upon installation is and always should be a cause for concern even if it is "legitimate" or intended by a non-malicious developer for multiple reasons.
SMTP on port 25 is usually insecure so ALL data transefered by that medium is visible to anyone on the same network under certain common circumstances. Also any executable making unwarranted and SMTP connections is a sign of trojan behaviour and the potential initialisation of a spam network node.

It is NOT a reliable method of communication since port 25 is often blanket blocked by many domestic Internet Service Providers to reduce spam botnets from being able to send spam via their networks. And in this case at least the SMTP server they are using has a strong anti-spam engine and likely won't even pass this vendors sneaking emailing to their 123.com account.

Since the activation of this product does NOT require a network connection I recommend that all outbound internet connections from this program are blocked forever. It may mean the about and help and all other links in the drop down menu may not be able to access the site, I think that is a worthwhile price to pay.
I note that this program is unlikely to ever be used in earnest by me to recover anything since it does not have any unique selling points like the ability to create an image file of a damaged drive onto a known good drive and then process the image file and not the damaged of failing drive thereafter.
Just because some other programs use SSL to check for updates on start up does not mean a developer collecting registration stats in an insecure and unreliable and concerning way should be acceptable.
I block unecesary outbound connections in all programs I have on my systems as a matter of course which is why my systems firewalls notify me about unapproved outbound connection attempts and ask me what to do about them.

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+3)

Burt, It is safe to use.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-2)

TK, which email is blocked? What you need is put your email address, it can be a newly registered one or any ramdom one.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (0)

mario, It is safe to use. You can recover your deleted files without network connect.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-2)

Burt, Where did you get the IP? Why we use IP?

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-1)

kerry, The deleted files can be recovered without network connection, it is safe to use. It has helped many of the users to recovered the deleted files. There is no feedback about the privacy and safety issue.

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-1)

Burt, We are not Chinaunicorn company. Don't say things you're not sure

Reply   |   Comment by Helen  –  10 months ago  –  Did you find this comment useful? yes | no (-1)

Poisson Rouge,
But...but...it is god forbid in China and...and...that EULA is not there. But all are connected 24/7 with their phone and everyone is fine with Google, apple, homeland security and social media harvesting their information, written or verbal, makes no difference.

Reply   |   Comment by Name1  –  10 months ago  –  Did you find this comment useful? yes | no (+3)

kerry, You know this how exactly?

Reply   |   Comment by Jake  –  10 months ago  –  Did you find this comment useful? yes | no (0)

Helen, the email my software firewall blocked is the unauthorised one sent by the giveaway software AFTER activation/registration is completed because it was blocked by my firewall I cannot say the precise contents of the email but have posted in comment

https://www.giveawayoftheday.com/erelive-data-recovery/#comment-666315

If further data is programatically inserted into the attempted email home I cannot say as I did not fully reverse engineer the mail home function. I just know from decades of computing security that plain text SMTP is not secure, not an ensured delivery process and is often blocked by Internet service providers as is used by illegal SPAM botnets on cracked computers.
It should never be used to signal back to the developer events such as registration events as it may succeed or it may just as easily fails like it did with mine. I notice the strings posted which look suspiciously like SMTP relay login data which should never be stored as plain text within an executable.... if it was login credentials that is plain crazy naive programming!

Reply   |   Comment by TK  –  10 months ago  –  Did you find this comment useful? yes | no (+1)
#1

Thank you for sharing this giveaway, just test it and it helps to recovered my deleted music, video and word files 3 years ago, it is really powerful.

Reply   |   Comment by Emily  –  10 months ago  –  Did you find this comment useful? yes | no (-49)
Add a comment

iPhone app giveaways »

Heads Up! Charades for Kids Giveaway
Give clues to help your teammate guess the picture that’s on their head before time runs out.
$4.99 ➞ free today
KungFu King:Martialist Giveaway
Ancient RPG Kung Fu game "KungFu King:Martialist" hurricane hit!
$0.99 ➞ free today
Rainbow Countdown Giveaway
Rainbow countdown, Rainbow~ a minimalist high appearance level cute countdown App.
$0.99 ➞ free today
LOL Booth Pro Giveaway
Instantly transform your face into a hilarious work of art.
$2.99 ➞ free today
Monsterz Minigames Deluxe Giveaway
Survive an avalanche of minigames!
$2.99 ➞ free today

Android app giveaways »

Audio Recorder Giveaway
Audio capture and processing assistant.
$0.99 ➞ free today
Falling Flowers Red - Live Wallpaper Giveaway
Make yourself feel pleasure when open your phone with Falling flowers live wallpaper.
$0.99 ➞ free today
Word Search Champion PRO Giveaway
Choose a board of letters to play with and combine them into words.
$1.49 ➞ free today
Spelling Gaps PRO Giveaway
How good are your English spelling skills and knowledge of English words?
$0.99 ➞ free today
Windsurfing Track Analyzer Giveaway
This is a tool for analysis of Windsurf GPS tracks.
$8.49 ➞ free today