The second one has been around for years. Don't make a typo though, you might end up on a phishing site.
The first one you mentioned looks like an imposter: both the guy's name and the site's name seem to be created to make you think it's the real deal.
I contacted David but got no answer from Dave so far. Not sure what happened.
You keep confusing who's who too.
If you open the .dat files with windows notepad, both seem completely unreadable.
It's not supposed to be clear text.
1. Rescan with Pywallet + passphrase
That's a good start
2. Raw partition search for keys or key fragments (I can't do that myself)
I have no idea how likely this is to find anything useful when keys are encrypted. And I don't think it's very likely to find a part of a key still intact, while the rest is overwritten.
3. Forensic data recovery lab. But I don't even know what to tell them. They probably don't know so much about private keys and stuff
Add the fact that you're not even sure if there's any value left on the disk, and you may end up with an expensive disappointment.
@HCP: out of the 11764 possible encrypted keys, how many of those are duplicates?