In this article, we look at the scene where the OS crashes, thereby compromising the Access data stored on it. We also look at specialized tools for extracting the Access files.