The Windows File Articles -> Software Oct , 00:45 (UTC+0)
|
|
- Iris Maxwell
- 8 years ago
- Views:
Transcription
1 select a site 6 forums 6 juice: USS Cole Automatic network monitoring with GFI Network Server Monitor. Dld Free Trial! Main Exploits Links Forums Register features You're not registered and logged, please click here to register. login: password: The Windows File Articles -> Software Oct , 00:45 (UTC+0) nabiy writes: In this paper I will take a look at the current windows file system and explain the following in detail: the boot sector, the MFT, Files and their attributes, folders and the B+ Data Structure, and Possible Attacks on NTFS. login post news (SMS/Articles/Exploits) search files, exploits & links sections: search Article Themes 6 logged users active for last 5 minutes Regular user AniZ Standard user a_fazeli bobborisbob cerealkiller cypher_coded ghostface gr00ve mike33 neurastenix repulsest Saleeby registered users:86764 There are currently 11 registered users and 103 guests browsing the website. quotable quotes The Boot Sector The windows File system begins with the boot sector. This is made whenever you format an NTFS volume and is located in the first sector of your windows partition. The boot sector holds information about the drive, which is recorded in the BIOS parameter block (often referenced as BPB). The BPB details information about the hard disk such as its size, and the physical parameters of volume. The boot sector also contains code that points to the Master File Table and it's backup ($MFT and $MFTMirror). The MFT Backup ($MFTMirror) acts as a fault tolerance mechanism; it holds a mirror copy of the first four records or the first cluster of the Master File Table. If any records in the MFT are corrupt, NTFS will refer to the boot sector for the location of the mirror and use the mirror copy to not only get the correct information but to also repair the MFT. The Boot Sector is also the mechanism that is responsible for passing operations from the Master Boot Record to the NT loader program. The Boot process basically goes something like this: BIOS >> MBR >> Boot Sector >> the NT Loader (NTLDR) >> hardware detection >> Core OS loads (Ntoskrnl.exe) >> Services Start >> Logon. The Master File Table The MFT is the core component of the NTFS file system. Through the MFT the NTFS file system becomes a highly organized array of records containing information describing the content of your file system. Every instance of data on your hard disk is described within these records, from the boot sector to your plain text file. The first sixteen records of the MFT are dedicated to metadata files. The metadata files define the structure of the MFT and essentially make it a self-describing database. The use of metadata files in the MFT should not be surprising; every database uses some form of metadata to define it's data structure. The metadata files that are stored within the first sixteen records of the MFT are as follows: The MFT Rec. File Name Description 0 $Mft The Master File Table
2 Theres is alway more than one way to look at things online chat server: chat.box.sk chan: #neworder linking & backends Information about how to link to NewOrder. New Order news backend, a more advanced version or an RSS feed. featured download 1 $MftMirror The Master File Table Mirror 2 $LogFile A log file containing a list of transaction steps for NFTS recoverability. 3 $Volume Information about he volume. 4 $AttrDef Defines attributes (discussed later) 5. The root folder 6 $Bitmap Cluster bitmap representing the volume. 7 $Boot Boot sector (discussed above) 8 $BadClus Contains bad clusters for a volume 9 $Secure Contains security descriptors for all files within the volume. 10 $Upcase Converts lowercase characters to Unicode uppercase characters. 11 $Extend Used for various option extensions (Unique file Ids, Quota Information, Reparse point information, etc.) Reserved for future use. GFI LANguard Network Security Scanner: Scans your entire network, IP by IP, for possible security holes. Free for non commercial use. download here The location of these files is not fixed (save for the boot sector which must be located in the first sector of the partition. NTFS is a flexible file system, in windows XP, Microsoft moved the location of the $LogFile and $Bitmap metadata files to improve overall performance. In fact, nearly all of the system files described above can be moved if needed to avoid bad clusters. Microsoft stores every file or folder on your system as a record within the MFT starting at either record seventeen or record twenty-four. The reason I give two starting points here is because there are two different views on the subject. The Linux-NTFS project says that the MFT table doesn't use records seventeen through twenty-three, while ntfs.com says that file records begin at record seventeen. I have not seen Microsoft give a specific starting point for normal file records. Files and their Attributes In the MFT, normal records are made up of numerous fields called file attributes. A file attribute describes some aspect of the file that is contained within the MFT record. Going into more detail, a descriptive list of attributes are as follows: File Attributes Standard Information: Old school file attributes: read only, timestamp, link count etc. Attribute List: Almost like another metadata file. It gives locations of all attribute records that don't fit in the actual MFT. File name: The name of the file. The long name can be up to 255 Unicode characters while the short name follows the 8.3 old-school format. Additional names
3 (required to meet the POSIX standard), or hard links are stored here also as file name attributes. Data: This attribute contains the actual data (if it is a small file) or is the base file that points to the extent on the disk that contains the data. It is possible to have multiple data attributes per file. Object ID: A volume unique identifier. Used by the distributed link tracking service. Logged Tool Stream: Similar to a data stream, but operations are logged to the NTFS log files. This is used by EFS. Reparse Point: Used for Symbolic Links (yes NTFS does have this capability), Junction Points, Volume Mount Points, Remote Storage Server. Index Root: Used to implement folders and other indexes (to be explained below). Index Allocation: Used to implement the B-tree structure for large folders or other large indexes (to be explained below). Bitmap: Used to implement the B-tree structure for large folders and other large indexes. Volume Information: Used only in the $Volume system file. Contains the volume version. As mentioned, with small files (usually no more than 1kb), the data resides in the MFT record as a resident attribute. In most cases the file is too large to fit in the MFT record. In these instances, the data attribute contains the VCN-to-LCN mapping information which points to the extent on the disk where the data resides as a non-resident attribute (an extent or data run is where the data is actually held on your hard disk). Using this map, the MFT points to the physical location of the extent by referring to the Logical Cluster Number(the LCN is simply a numbered ordering of all clusters on the volume) and the length of the extent. Each extent must consist of contiguous set of clusters on the disk. NTFS organizes the extents of each file logically (even though they may not be physically contiguous) by the assignment of a Virtual Cluster Number (VCN). For example, I have file A that is too large to fit in the MFT. NTFS writes the data attribute of file A onto the hard disk starting at LCN 127. The length of the file takes up 5 clusters - but cluster number 130 is bad or occupied. The File on disk would look like: data data data another file data data. A VCN to LCN description for this file would be clusters 0, 1, 2, 4, 5 to 127, 128, 129, 131, 132. The MFT would point to LCN 127 as the start of the run, identify it as VCN 0 and count the length of the run (3 clusters). It would then point to LCN 131 continuing the run, identify it as VCN 4 and count the length of the run (2 clusters).
4 Folders and the B+ Tree Data Structure Directories under NTFS are indexes that contain the filename attribute, file reference, timestamp and file size for the files organized by that index. Indexing and sorting the files speed directory access, there is no need for NTFS to organize the data every time you list the contents of the directory. The duplicate attributes in the index also save time - as the NTFS doesn't need to look up that information in the MFT every time the directory is accessed. Also, because the index contains the file reference (a 64bit number identifying each file) there is no need to search through the MFT for the file. When a directory grows too large to fit into the limited space of the MFT it expands from it's entry onto the file system. NTFS creates child indexes on the disk - referenced by the parent index in the MFT. To expand the directory structure onto the disk NTFS implements a B+ Tree data structure, expanding 'out' rather than 'deep', allowing for fast retrieval times. Possible Attacks on NTFS Any unauthorized modification of file attributes is an attack on the integrity of the Windows File system. This could include the modification of the security descriptors or the timestamp for a certain file. Another exploit within the windows file system would be the abuse of alternate data streams for a quick way to hide data. The virus Win2k.Stream is an example of this kind of abuse, so is my hide program. Security Descriptors could also be completely bypassed by using another ntfs driver to read the file system. The oft referred to ntpasswd utility uses this method to circumvent permissions when accessing the SAM file on an NTFS drive. Is there a need to attack the NTFS or the MFT itself? Programs rarely touch the file system directly. Any requests that you issue will be passed into kernel and then to the NT I/O manager. The I/O manager then calls the NTFS File System Driver which in turn accesses the file system. Because of this approach an attack on the file system becomes unnecessary. The cleaner method of attack, and one that you'll see in rootkits is to intercept the I/O request before it reaches the file system by either hooking into dispatch functions of the driver or setting up a file system driver filter. nabiy --- tools & links of interest: read comments (3) / write comment views: 6167 printer-friendly version
5 powered by The content and design of this site is 2004 by particular authors, the New Order team and Box Network ltd. For more informations about New Order contact Marek The privacy policy statement for box network
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
More informationFile System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
More informationFAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000 Table of Contents List of Figures... iv Introduction...1 The Physical Disk...1 File System Basics...3 File
More informationWindows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
More informationOutline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
More informationA Forensic Comparison of NTFS and FAT32 File Systems
MARSHALL UNIVERSITY FORENSIC SCIENCE CENTER & FBI, HEART OF AMERICA REGIONAL COMPUTER FORENSICS LABORATORY A Forensic Comparison of NTFS and FAT32 File Systems Summer 2012 Kelsey Laine Rusbarsky #901-60-8173
More informationOperating Systems CS-384. File Systems. NTFS and FAT32. Submitted To: Dr. Chris Taylor. Submitted By: Aditya Sitani
Operating Systems CS-384 File Systems NTFS and FAT32 Submitted To: Dr. Chris Taylor Submitted By: Aditya Sitani Date: 02/3/2003 Table of Contents Introduction... 0 Physical Disk... 1 Files... 2 Files concept...
More informationWindows OS File Systems
Windows OS File Systems MS-DOS and Windows 95/98/NT/2000/XP allow use of FAT-16 or FAT-32. Windows NT/2000/XP uses NTFS (NT File System) File Allocation Table (FAT) Not used so much, but look at as a contrast
More informationNSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
More informationSecurity Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
More informationIT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationREPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
More informationInstalling a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
More informationChapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationNTFS Undelete User Manual
NTFS Undelete User Manual What is NTFS Undelete? NTFS Undelete is a small utility that scans your hard drive for all files that can be undeleted and attempts to recover them for you. Sounds like magic?
More informationChapter 12 File Management
Operating Systems: Internals and Design Principles Chapter 12 File Management Eighth Edition By William Stallings Files Data collections created by users The File System is one of the most important parts
More informationStellar Phoenix. SQL Database Repair 6.0. Installation Guide
Stellar Phoenix SQL Database Repair 6.0 Installation Guide Overview Stellar Phoenix SQL Database Repair software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server
More informationReview NTFS Basics. Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh. Bardsir Branch, Islamic Azad University, Bardsir, Iran
Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University,
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationOperating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
More informationRecover Data for Windows Software
Recover Data for Windows Software Recover Data for Windows Recover Data for FAT & NTFS software recovers the lost, damaged, or formatted partitions of the OS. It retrieves the deleted or corrupted files
More informationInstalling GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /
More informationCHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
More informationAxCMS.net on Network Load Balancing (NLB) Environment
AxCMS.net on Network Load Balancing (NLB) Environment This article contains step-by-step instructions on how to install AxCMS.net PremiumSample on a demo NLB cluster using IIS7. For installing on older
More informationHelp System. Table of Contents
Help System Table of Contents 1 INTRODUCTION...1 2 GETTING STARTED!... 2 2.1 Installation...2 2.2 Wizard...3 2.3 Browse Method:...7 2.4 Search Method:...7 2.5 Surface Scan Method:... 8 3 RECOVERING DELETED
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More information11.7 THE WINDOWS 2000 FILE SYSTEM
830 CASE STUDY 2: WINDOWS 2000 CHAP. 11 11.7 THE WINDOWS 2000 FILE SYSTEM Windows 2000 supports several file systems, the most important of which are FAT-16, FAT-32, and NTFS (NT File System). FAT-16 is
More informationWindows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
More informationAns.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
More informationFile Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
More informationK-Backup: Automatic Network Backup solution
K-Backup: Automatic Network Backup solution Monday, November 4, 2013 KernSafe Technologies,Inc www.kernsafe.com Copyright KernSafe Technologies 2006-2013.All right reserved. Table of contents Overview...
More informationCopyright 2014 http://itfreetraining.com
This video looks at the four file systems supported by Windows. These are ReFS, NTFS, FAT and exfat. The video looks at what each file system is capable of and its limitations. Resilient File System (ReFS)
More information3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch
3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration
More informationActive@ Password Changer for DOS User Guide
Active@ Password Changer for DOS User Guide 1 Active@ Password Changer Guide Copyright 1999-2014, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form
More informationWindows Server Password Recovery Techniques Courtesy of Daniel Petri http://www.petri.co.il
The LOGON.SCR Trick To successfully reset the local administrator's password on Windows NT and some versions of Windows 2000 follow these steps: 1. Install an alternate copy of Windows NT or Windows 2000.
More informationWindows Host Utilities 6.0.2 Installation and Setup Guide
Windows Host Utilities 6.0.2 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
More informationInstalling Active Directory
Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.
More informationUsing Windows Administrative Tools on VNX
EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -
More informationInstalling GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
More informationStarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright
More informationConfiguring ThinkServer RAID 100 on the TS140 and TS440
Configuring ThinkServer RAID 100 on the TS140 and TS440 Lenovo ThinkServer TS Series Servers Lenovo Enterprise Product Group Version 1.0 September 17, 2013 2013 Lenovo. All rights reserved. LENOVO PROVIDES
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationChapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
More informationAMD RAID Installation Guide
AMD RAID Installation Guide 1. AMD BIOS RAID Installation Guide.. 2 1.1 Introduction to RAID.. 2 1.2 RAID Configurations Precautions 3 1.3 Installing Windows XP / XP 64-bit / Vista / Vista 64-bit With
More informationMaintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
More information1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer
1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts
More informationDISK DEFRAG Professional
auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling
More informationWindows clustering glossary
Windows clustering glossary To configure the Microsoft Cluster Service with Windows 2000 Advanced Server, you need to have a solid grounding in the various terms that are used with the Cluster Service.
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationCase Study: Quick data recovery using HOT SWAP trick in Data Compass
Case Study: Quick data recovery using HOT SWAP trick in Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition Loss File loss or destruction Virus attack Accidental
More informationApplication Note 116: Gauntlet System High Availability Using Replication
Customer Service: 425-487-1515 Technical Support: 425-951-3390 Fax: 425-487-2288 Email: info@teltone.com support@teltone.com Website: www.teltone.com Application Note 116: Gauntlet System High Availability
More informationLegal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationGeneral DBA Best Practices
General DBA Best Practices An Accelerated Technology Laboratories, Inc. White Paper 496 Holly Grove School Road West End, NC 27376 1 (800) 565-LIMS (5467) / 1 (910) 673-8165 1 (910) 673-8166 (FAX) E-mail:
More informationPowerSchool Student Information System
Oracle ODBC Configuration and Client Installation Guide PowerSchool Student Information System Released July 9, 2008 Document Owner: Documentation Services This edition applies to Release 5.2 of the PowerSchool
More informationXerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
More informationAMD RAID Installation Guide
AMD RAID Installation Guide 1. AMD BIOS RAID Installation Guide.. 2 1.1 Introduction to RAID.. 2 1.2 RAID Configurations Precautions 3 1.3 Installing Windows 7 / 7 64-bit / Vista / Vista 64-bit / XP /
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationMANAGING DISK STORAGE
1 Chapter 12 MANAGING DISK STORAGE Chapter 12: MANAGING DISK STORAGE 2 CHAPTER OVERVIEW Understand disk-storage concepts and terminology Distinguish between basic and dynamic storage Identify the types
More informationRECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
More informationIntroduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More informationUser Guide. Version 3.0
Kaseya Backup and Disaster Recovery User Guide Version 3.0 October 12, 2009 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT
More informationActivity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
More informationChapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
More informationQUICK RECOVERY FOR RAID
Quick Recovery for RAID Features File Systems Supported Who suffers most Recovery Modes De-Stripper File Recovery Frequently Asked Questions QUICK RECOVERY FOR RAID Quick Recovery for RAID 0, RAID 5. Quick
More informationDate: March 2006. Reference No. RTS-CB 018
Customer Bulletin Product Model Name: CS3102 and FS3102 subsystems Date: March 2006 Reference No. RTS-CB 018 SUBJECT: Volumes greater than 2TB on Windows OS Overview This document explores how different
More informationExam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4
Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of
More informationInstalling DNS On Windows 2003
Page 1 of 6 Admin KnowledgeBase Articles & Tutorials Authors Hardware Links Message Boards Newsletters Software No time to check all NT/2000 event logs... network-wide? Dld LANguard Admin KnowledgeBase
More informationFalconStor Recovery Agents User Guide
FalconStor Recovery Agents User Guide FalconStor Software, Inc. 2 Huntington Quadrangle Melville, NY 11747 Phone: 631-777-5188 Fax: 631-501-7633 Web site: www.falconstor.com Copyright 2007-2009 FalconStor
More informationSATARAID5 Serial ATA RAID5 Management Software
SATARAID5 Serial ATA RAID5 Management Software Home Edition Preliminary Draft Subject to Change Without Notice 05/7/04 Silicon Image, Inc. 1060 East Arques Ave. Sunnyvale CA 94085 (408) 616-4000 www.siliconimage.com
More informationScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
More informationDirect Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
More information2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationManaging Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
More informationVoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationWindows 2000 Security Configuration Guide
Windows 2000 Security Configuration Guide Version 1.0 October 4, 2002 Prepared For: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA 98052-6399 Prepared By: Science Applications
More informationA+ Practical Applications Solution Key
A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available
More informationMicrosoft s SBS 2003 Best Practice Guide
Microsoft s SBS 2003 Best Practice Guide For use with StorageCraft ShadowProtect Disclaimer This guide is for End Users and Resellers to provide some guidance when building an SBS 2003 Server for best
More informationIntroduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials
Preface p. xvii Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials p. 3 A Brief Word on Windows Scripting
More informationStarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the
More information3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
More informationHome and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows
Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationActive @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
More informationBULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
More informationUser Guide Win7Zilla
User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main
More informationSafeGuard Enterprise Tools guide
SafeGuard Enterprise Tools guide Product version: 5.60 Document date: April 2011 Contents 1 About this guide...3 2 Displaying the system status with SGNState...3 3 Reverting an unsuccessful installation
More informationHP StorageWorks Automated Storage Manager User Guide
HP StorageWorks Automated Storage Manager User Guide Part Number: 5697 0422 First edition: June 2010 Legal and notice information Copyright 2010, 2010 Hewlett-Packard Development Company, L.P. Confidential
More informationNTFS Documentation. Richard Russon Yuval Fledel
NTFS Documentation Richard Russon Yuval Fledel NTFS Documentation by Richard Russon and Yuval Fledel Abstract This is technical documentation, created to help the programmer. It was originally written
More informationAcronis Disk Director 11 Home. User's Guide
Acronis Disk Director 11 Home User's Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone", Acronis
More informationActive Data Recovery Software. User Guide. Version Number 2.1
Active Data Recovery Software User Guide Version Number 2.1 Active@ Partition Recovery END-USER LICENSE AGREEMENT Copyright 1998-2002 Active Data Recovery Software. All rights reserved. IMPORTANT-READ
More informationK-Backup: Network automatic backup data to free iscsi SAN
K-Backup: Network automatic backup data to free iscsi SAN Monday, November 4, 2013 KernSafe Technologies,Inc www.kernsafe.com Copyright KernSafe Technologies 2006-2013.All right reserved. Table of Contents
More informationAvira System Speedup. HowTo
Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1
More informationFile Server Migration
2 June 2014, HAPPIEST MINDS TECHNOLOGIES File Server Migration Author Suresh Elumalai SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright Information This document is an
More informationOmtool Server Monitor administrator guide
Omtool Server Monitor administrator guide May 29, 2008 (4.0342-AA) Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the US: +1/1 800 886 7845 Fax: +1/1 978 659 1300
More information