NIST Mobile Forensics Workshop and Webcast. Mobile Device Forensics: A Z
|
|
|
- Stewart Garrett
- 10 years ago
- Views:
Transcription
1 NIST Mobile Forensics Workshop and Webcast Mobile Device Forensics: A Z June 2014 Disclaimer: Certain commercial entities, equipment, or materials may be identified in this presentation. Such identification is not intended to imply recommendation nor endorsement by myself nor my employer, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. I have NO financial nor commercial interest in any of the products I will be discussing today! Presenter s Name June 17,
2 Mobile Forensic Tool Classification Micro Read Chip-Off Hex Dumping/JTAG Logical Extraction Manual Extraction Presenter s Name June 17, How Mobile Forensic Tools Actually Work 1. The broken tool story 2. Proposed Changes 3. Tool Leveling System Presenter s Name June 17,
3 But first, the broken tool story Part I Presenter s Name June 17, The broken tool story Purchased tool X from company Y. 8PM on Saturday evening I hit the get data button and then Presenter s Name June 17,
4 Presenter s Name June 17, Options: A. encrypted debug logs to company Y support for analysis B. Try different combinations till it works C. Try another tool D. Quit and become a pro card counter E. Figure out why the tool is broken myself! Presenter s Name June 17,
5 And I I took the road less traveled Presenter s Name June 17, A methodical approach: Wearing my Malware Analysis hat I read* that running PortMon for Windows would allow a diagnostic view of the data. Voila! Presenter s Name June 17,
6 NOTE: This idea came from: NIST Special Publication: Guidelines on Cell Phone Forensics Serial Sniffing: PortMon (Now called: Process Monitor ) ( USB Sniffing: USB Monitor ( Presenter s Name June 17, Tweaking portmon s settings: Select ONLY the port you want to capture Capture Ports <Your Port> Change Max Output Bytes to 2048 Edit Max Output Bytes 2048 Apply Presenter s Name June 17,
7 Things that make you go hmm.. You can use this to: Compare different tools How protocols work. Application error checking. See what data is NOT reported to you by the tool. Observe the tool communication in real time. Presenter s Name June 17, Lots of options Part II Presenter s Name June 17,
8 Think about it Many tools still use a Serial Port, you may use this method to log all I/O during data collection: 1. Tool validation 2. Error Checking 3. Legal Proceedings 4. Tool Comparison 5. Free 6. Other tools work nearly the same for direct USB communication (USBSnoop) Presenter s Name June 17, What was next In communicating this concept to fellow peers, it occurred to me Presenter s Name June 17,
9 Mobile Forensic Tool Classification A common method/framework to describe HOW data is extracted from digital devices (e.g., Phones and GPS) Provides a common ground for all Mobile Examiners Vendors could classify tools Presenter s Name June 17, Mobile Forensic Tool Classification System Part III Presenter s Name June 17,
10 5- Levels of Mobile Forensic Tool Classification: 1.Manual Extraction 2.Logical Extraction 3.Physical Analysis (Hex/JTAG) 4.Physical Analysis (Chip-Off) 5.Physical Analysis (Micro Read) Presenter s Name June 17, Tool Classification Pyramid Micro Read Chip-Off Hex Dumping/JTAG Logical Extraction Manual Extraction Presenter s Name June 17,
11 Tool Classification Pyramid Going Up More technical Longer analysis times More training required More invasive Micro Read Chip- Off Hex/JTAG Logical Extraction Manual Extraction *Products may exist at more than one level Presenter s Name June 17, Tool Classification Pyramid Going Down Less technical Shorter analysis times Less training required Less invasive Micro Read Chip- Off Hex/JTAG Logical Extraction Manual Extraction *Cost is not proportional Presenter s Name June 17,
12 Level 1: Manual Extraction Manual Extraction: Process: Review phone documentation, and browse the using device buttons to view and record data by hand. Pros: Fast Will work on nearly every device No cables required Easy to use Tools available: Ramsey s STE3000FAV Eclipse ZRT Project-A-Phone Notes: Popular with local PD Hand Jamming NOT fun! Cons: Will not get to ALL data Prone to errors Foreign language barrier Booby traps Broken buttons/device No Deleted Files Time consuming Presenter s Name June 17, Level 2: Logical Extraction Logical Extraction: Process: Connect data cable to the handset. Extract data using AT, BREW, etc. commands in client/server architecture. Tools available: Paraben s Device Seizure Susteen s Data Pilot Notes: Many cell phone tools fit in this category. Some GPS tools exist at this level Pros: Fast Easy to use Lots of research Lots of info available Foreign Language support Standard report format Repeatable Cons: May change data (e.g., Unread SMS) Log file access (minimal) End user understanding Lots-o- Cables Deleted files Presenter s Name June 17,
13 Level 3: Physical Extraction Hex Dumping/JTAG Process: Push Boot Loader into phone and dump memory. Includes using JTAG for data extraction Tools available: CelleBrite s UFED Touch Ultimate MSAB s XRY Complete RIFF Box Notes: Fastest growing segment in the marketplace. Thanks to: Mike Harrington s Hex Dumping Primer I and II Pros: Deleted Data Extract data hidden from device menus Password Bypass - YMMV! Cons: Requires data conversion Inconsistent report formats Some tools came out of hacker community Difficult to operate Custom Cables Source code not available Limited to specific manufacturers Presenter s Name June 17, Level 4: Physical Extraction Chip-Off Process: Remove memory from the device and read in either second device or EEprom reader. Tools available: UP-828 SD Flash Doctor Custom Tools/Scripts CheekyMonkeyForensics Notes: This includes de-soldering More tools now available to reverse wear-leveling! Pros: Able to extract ALL data from device memory Better picture of what is going on holistically in the device Training now available! Cons: Data is not contiguous! No single report format Difficult to use May damage chip on extraction. Source code not available Custom cable harnesses needed JTAG may a better option! Presenter s Name June 17,
14 Level 5: Physical Extraction Micro Read Process: Use a high-power microscope to view state of memory. Tools available: High-Power Microscope Notes: This method would be reserved for high value devices or damaged memory chips. Pros: Able to extract and verify all data from device memory Best picture of what is going on holistically in the device Cons: Most time consuming Hard to interpret/convert No report format VERY Expensive Highly technical Presenter s Name June 17, Leveling System Examples: ZRT2 Level 1 Data Pilot Level 2 UFED Touch Ultimate Level 3 UP-828 Level 4 Hitachi S-450 SEM Level 5 Level 1 Level 2 Level 3 Level 4 Level 5 Presenter s Name June 17,
15 Standard, Mini, Micro & Nano Presenter s Name June 17, CSIM s/ruim s C-SIM = CDMA Subscriber Identity Module For CDMA handsets to extend a GSM SIM card for CDMA phones and networks. UICC may have: C-SIM, GSM and U-SIM partitions/application! Only commercial tool I know of right now is: SIMIS (3g Forensics Lester Wilson) Presenter s Name June 17,
16 Level 1 Tools: Presenter s Name June 17, Level 2 Tools: (Basic) Presenter s Name June 17,
17 Level 2/3 Tools: (Basic) Presenter s Name June 17, Level 3 Tools: (Advanced) Presenter s Name June 17,
18 Level 4 Tools: (Chip Off) Presenter s Name June 17, Pieces and Parts 1. Remove Chip A. IRSA IR 550 Plus ~$20,000 B. Heat Gun ~$75 C. Soldering Iron ~$ Read Chip A. FlashPak III ~$10,000 B. NAND Socket Module ~$1,500 Cost: $32,000 USD Presenter s Name June 17,
19 Pieces and Parts 3. Reassembling data (e.g. 512K chunks) a) DDF (Free) b) SalvationData ($1500) 4. Translating the data a) DDF (Free) b) SalvationData ($1500) Presenter s Name June 17, 2003 Level 4 Analysis Tool Examples: UFED s Physical Analyzer AccesData s MPE+ MicroSystemation s XRY Complete SQLite s SQLite3 and SQLiteAnalyzier NaviCAT s Navicat for SQLite (Good for visual joins of multiple tables)! Custom Scripts (e.g. CheekyMonkeyForensics) Presenter s Name June 17,
20 Pieces and Parts Level 4 Training: Level 4 Research (2010 DFRWS Challenge): NAND Flash Memories and Programming NAND Flash Memories Using ELNEC Device Programmers: Forensic Data Recovery from Flash Memory: Presenter s Name June 17, Level 5 Tools: (Micro Read) Presenter s Name June 17,
21 High-Power Microscope 1. Use chemical process to remove top layer of chip 2. Use microscope to read gates manually. 3. Translate binary to hex 4. Translate hex to data Presenter s Name June 17, 2003 Level 5 Tools: (Micro Read) Design Principles for Tamper-Resistant Smartcard Processors Physical NAND Flash Security: Preventing Recovery of Deleted Data edings/2011/ _preconf_fsam_abraham.pdf Presenter s Name June 17,
22 Other Links: NIST: Computer Forensics Tool Testing (CFTT) of Mobile Devices: Includes: Smart Phones, GSM and Non-GSM Phones Tool Specifications Test Assertions Test Plans Test Results Presenter s Name June 17, Contact Info: [email protected] Phone: (703) Presenter s Name June 17,
23 23
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
Cellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
Mobile Device Forensics. Rick Ayers
Mobile Device Forensics Rick Ayers Disclaimer Certain commercial entities, equipment, or materials may be identified in this presentation in order to describe an experimental procedure or concept adequately.
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
Table of Contents. Introduction to MSAB Training Department... 01. Training Services Overview... 02. XRY Certification training...
Training Courses Table of Contents Introduction to MSAB Training Department... 01 Training Services Overview... 02 XRY Certification training... 03 XRY Intermediate training... 04 Advanced Acquisition
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY
CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Digital forensic examiners have seen a remarkable increase in
Android Physical Extraction - FAQ
Android Physical Extraction - FAQ Nadav Horesh June, 2012 1 Table of Contents Introduction... 3 Android Debugging Bridge (ADB)... 4 Q: What does ADB stand for and how does it work?...4 Q: So can ADB be
C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY
C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Recently, digital forensic examiners have
Developing Process for Mobile Device Forensics
Developing Process for Mobile Device Forensics Det. Cynthia A. Murphy Abstract With the growing demand for examination of cellular phones and other mobile devices, a need has also developed for the development
Validating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
Overview of the LTC2978 Configuration EEPROM (NVM) Revision 1.0
Overview of the LTC2978 Configuration EEPROM (NVM) Revision 1.0 Author: Mike Holloway, Rob Chiacchia, Linear Technology Date: 11/11/2010 Revision History: 1.0 Added Arrow Contact Information 0.9 Added
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Retrieving Data from Apple ios Devices Using XRY
Retrieving Data from Apple ios Devices Using XRY 175 Lakeside Ave, Room 300A Phone: (802)865-5744 Fax: (802)865-6446 http://www.lcdi.champlain.edu 12/ /2014 The following is a step-by-step walkthrough
Into The Droid. Gaining Access to Android User Data DEF CON 20
Into The Droid Gaining Access to Android User Data DEF CON 20 Introduction Why this talk is useful Defend access / gain access Device seizure, loss, border crossing, stop and search, espionage... The company
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013 FORENSIC ACQUISITION.BEFORE STARTING When we are dealing with the forensics acquisition of an ios device
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
A universal forensic solution to read memory chips developed by the Netherlands Forensic Institute. The NFI Memory Toolkit II
A universal forensic solution to read memory chips developed by the Netherlands Forensic Institute The NFI Memory Toolkit II The NFI Memory Toolkit II The NFI Memory Toolkit II is a universal forensic
Security Principles. Related to. Handset Theft
Security Principles Related to Handset Theft Table of Contents TABLE OF CONTENTS...2 GLOSSARY OF TERMS...3 1. INTRODUCTION...4 1.1 IMPORTANCE OF IMEI INTEGRITY...4 1.2 IMPROVED IMEI INTEGRITY PRINCIPLES...4
DSO138 oscilloscope program upgrade method
DSO138 oscilloscope program upgrade method Applicable models: 13801K, 13802K Program upgrade Principle The DSO138 is a SCM STM32F103C8 internal oscilloscope that is preinstalled with a flash bootloader,
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
Test Results for Mobile Device Acquisition Tool: Lantern v2.3
FEB. 203 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special RepoRt Test Results for Mobile Device Acquisition Tool: Lantern v2.3 nij.gov Office of Justice Programs
MARTECH SPI Tools. MARTECH SPI Tools User Manual v1.0. User Manual
MARTECH SPI Tools v1.0 Contents 1. Basic informations about the product...3 1.1 Memory types supported by SPI Tool...3 2. Main features and application possibilities...4 2.1 Technical Support activation...4
Overview of Data Security Methods: Passwords, Encryption, and Erase
Overview of Data Security Methods: Passwords, Encryption, and Erase Chris Budd SMART High Reliability Solutions Santa Clara, CA 1 Overview of Data Security Methods Introduction Data Protection Passwords
The Glitch360Spi 3.0 rev b is a HiSpeed USB2 SPI programmer, it can use any existing protocols (SPI, JTAG, BitBang, etc )
GLITCH360SPI 3.0 (rev b) MANUAL v1.9 FOR XBOX 360 FAT & SLIM This Manual will explain you how to install the Glitch360Spi 3.0 (rev b) on your xbox 360. For more information about the Reset Glitch Hack
Cellular Device Data Recovery Preparation Considerations and Troubleshooting
Cellular Device Data Recovery Preparation Considerations and Troubleshooting Lauren Wagner High-Tech Crime Training Specialist S E A R C H T R A I N I N G S E R V I C E S April 2013 HOW TO USE THIS GUIDE
isppac-powr1220at8 I 2 C Hardware Verification Utility User s Guide
November 2005 Introduction Application Note AN6067 The isppac -POWR1220AT8 device from Lattice is a full-featured second-generation Power Manager chip. As part of its feature set, this device supports
Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone
Informatica forense Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone A cura di Matteo Brunati Udine, 11 maggio 2015 Me, Myself & I IT Security consultant Design & development
Android anti-forensics at the operating system level
Android anti-forensics at the operating system level Karl-Johan Karlsson 1100965 Submitted in partial fulfilment of the requirements for the degree of Master of Science in Computer Forensics and E-Discovery
GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches
GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials
GPS Vehicle and personal location tracker. User manual
GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Reverse Engineering Flash Memory for Fun and Benefit Jeong Wook (Matt) Oh
Reverse Engineering Flash Memory for Fun and Benefit Jeong Wook (Matt) Oh [email protected] [email protected] HP NAND Flash technology Flash Technology was invented circa 1980 by a Japanese inventor, Dr.
Open Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
i.mx USB loader A white paper by Tristan Lelong
i.mx USB loader A white paper by Tristan Lelong Introduction This document aims to explain the serial downloader feature of i.mx SoCs on Linux (available across i.mx family starting with i.mx23). This
SOSSE. Matthias Brüstle <[email protected]> Simple Operating System for Smartcard Education. Kommunikationsnetz Franken e.v.
Matthias Brüstle Smart Cards mit SOSSE sind lecker 1 SOSSE Simple Operating System for Smartcard Education Matthias Brüstle Kommunikationsnetz Franken e.v. Matthias Brüstle Smart Cards
Access Control Using Smartcard And Passcode
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676 Volume 4, Issue 5 (Jan. - Feb. 2013), PP 29-34 Access Control Using Smartcard And Passcode Omorogiuwa Eseosa 1., Uhunmwangho
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
How to read this guide
How to read this guide The following shows the symbols used in this Quick start guide with descriptions and examples. Symbol Description Example P oint Reference Caution [ ] This symbol explains information
Gilsson AlwaysFind Web Base Fleet Management AVL & Personal GPS Trackers
Gilsson AlwaysFind Web Base Fleet Management AVL & Personal GPS Trackers System block diagram AlwaysFind GSM/GPRS network GPS Tracking Systems AlwaysFind OR AlwaysFind Mini Web Base control center Internet
Teltonika FM41XX. Configurator v. 1.0
Teltonika FM41XX Configurator v. 1.0 1. First steps Connect Teltonika FM41XX (PIN1 for plus and PIN11 ground ) to the voltage supply 10-30 V as shown below and GPS, GSM antennas. (GSM is long and thin,
Getting Started Guide with WIZ550web
1/21 WIZ550web is an embedded Web server module based on WIZnet s W5500 hardwired TCP/IP chip, Users can control & monitor the 16-configurable digital I/O and 4-ADC inputs on module via web pages. WIZ550web
Mitsubishi Electric Q Series PLC Ladder Monitor. Operation Manual
Mitsubishi Electric Q Series PLC Ladder Monitor Operation Manual Preface Thank you for purchasing Pro-face's PLC Ladder Monitor Add-on Kit for the Mitsubishi Electric Q Series PLC. This manual ("Mitsubishi
Smart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler [email protected] Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
UFED 4PC/Touch 4.1 & UFED Physical/Logical Analyzer 4.1.1. Release Notes
UFED 4PC/Touch 4.1 & UFED Physical/Logical Analyzer 4.1.1 Release Notes January 2015 Contents Release highlights... 3 Additional information... 4 Forensic methods... 7 Supported devices... 7 End of life
Connecting UniOP to Telemecanique PLC s
Connecting UniOP to Telemecanique PLC s Contents 1. Introduction... 2 2. Uni-Telway Driver... 2 2.1 Uni-Telway Addresses... 2 2.2 Designer Controller Setup... 4 2.3 Point To Point Connection Addressing...
USER GUIDE. Diagnostic Web Server FW ver. 5.1.54. BrightSign, LLC. 16780 Lark Ave., Suite B Los Gatos, CA 95032 408-852-9263 www.brightsign.
USER GUIDE Diagnostic Web Server FW ver. 5.1.54 BrightSign, LLC. 16780 Lark Ave., Suite B Los Gatos, CA 95032 408-852-9263 www.brightsign.biz 1 TABLE OF CONTENTS Introduction 1 Setup 2 Setting up the DWS
Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov
Local Heating Attacks on Flash Memory Devices Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Introduction Semi-invasive attacks were introduced in 2002 ( Optical fault induction
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1
UNIT 22: PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1 This work covers part of outcome 2 of the Edexcel standard module. The material is
3.1 Backup and Recovery System
3.1 Backup and Recovery System FriendlyARM English User Manual 197 In the development process, we often need to constantly update the programmer and system debugging, and sometimes you will be with the
IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: 2004-07-16 Version 1.0
T-BOXN12R You can make it wireless First steps with T-BOXN12R Date: 2004-07-16 Version 1.0 Content 1. Purpose of this document... 3 2. T-BoxN12R overview... 4 3. First step... 5 3.1. Preparing your workshop
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel [email protected] 1,2 Information Technology Department, 1,2 Gujarat Technological University, Gujarat, India. Abstract: Sun Microsystems
MRT Advanced HDD Repair and Data Recovery Training Course
MRT Advanced HDD Repair and Data Recovery Training Course The First Day A.M. Western Digital Course 1. The course overview based on the MRT data recovery 2. WD start-up procedures 3. How to handle due
Programming NAND devices
Technical Guide Programming NAND devices Kelly Hirsch, Director of Advanced Technology, Data I/O Corporation Recent Design Trends In the past, embedded system designs have used NAND devices for storing
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners With the Tools They Need U.S. Cyber Crime Conference
GPS Hardware. GSM / GPS In-Vehicle / Personal Tracker
GPS Hardware GSM / GPS In-Vehicle / Personal Tracker SD-10 (In-Vehicle) SD-10 is a smart and reliable GPS/GSM/GPRS in-vehicle tracking device which is developed and designed for real-time tracking and
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Chapter 11. Using MAX II User Flash Memory for Data Storage in Manufacturing Flow
Chapter 11. Using MAX II User Flash Memory for Data Storage in Manufacturing Flow MII51011-1.1 Introduction Small capacity, non-volatile memory is commonly used in storing manufacturing data (e.g., manufacturer
Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
TAS (Tecnosoft Alarm System)
TAS (Tecnosoft Alarm System) User Manual Date 16/03/2009 Alarms management software for Tecnosoft systems Software Version 2.2.3.1 2/16 TAS TecnoSoft s.r.l. Tecnosoft s.r.l. Via delle Regioni, 34, 20090
Java Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
Palm Dialer Handbook
Palm Dialer Handbook Copyright Copyright 2002 Palm, Inc. All rights reserved. Graffiti and Palm OS are registered trademarks of Palm, Inc. Palm and the Palm logo are trademarks of Palm, Inc. Other product
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
How To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
Testing and Programming PCBA s during Design and in Production
Testing and Programming PCBA s during Design and in Production Hogeschool van Arnhem en Nijmegen 6 June 23 Rob Staals JTAG Technologies [email protected] Copyright 23, JTAG Technologies juni 3 The importance
HP VMware ESXi 5.0 and Updates Getting Started Guide
HP VMware ESXi 5.0 and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HP VMware ESXi. HP Part Number: 616896-002 Published: August 2011 Edition: 1 Copyright
SKP16C62P Tutorial 1 Software Development Process using HEW. Renesas Technology America Inc.
SKP16C62P Tutorial 1 Software Development Process using HEW Renesas Technology America Inc. 1 Overview The following tutorial is a brief introduction on how to develop and debug programs using HEW (Highperformance
Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP
Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP PROGRAMMING & SOFTWARE DEVELOPMENT AND INFORMATION SUPPORT & SERVICES PATHWAY SOFTWARE UNIT UNIT 5 Programming & and Support & s: (Unit 5) PAGE
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
Program functions. Brief list of functions:
BMW Scanner 1.3.6 First of all the list of supported units is much bigger for now. At this moment software supports almost all electronic units than could be installed on "old" chassis. In main menu you
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Mobile Phone Forensic Analysis
Mobile Phone Forensic Analysis Kevin Curran *, Andrew Robinson, Stephen Peacocke, Sean Cassidy Intelligent Systems Research Centre Faculty of Computing and Engineering, University of Ulster, Northern Ireland,
Mobile Devices in Electronic Discovery
Mobile Devices in Electronic Discovery Mobile Devices in Electronic Discovery Abstract Once upon a time they were used to make phone calls; now they are our mobile offices. Mobile devices are a prolific
NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Smartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
Digital Evidence on Mobile Devices
CHAPTER 20 Digital Evidence on Mobile Devices Eoghan Casey and Benjamin Turnbull Mobile devices such as cell phones and smart phones have become an integral part of peoples daily lives, and as such, they
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
THE EASY WAY EASY SCRIPT FUNCTION
THE EASY WAY EASY SCRIPT FUNCTION Page: 1 Date: January 30th, 2006 The Easy Script Extension is a feature that allows to drive the modem "internally" writing the software application directly in a high
Agenda 22 maj Micro Systemation vad gör vi? XRY video. Micro Systemation AB. XRY Korta fakta. XRY Video. Mobiltelefoner som bevis.
Mobiltelefoner som bevis i brottsmål Thomas Renman Micro Systemation AB [email protected] Agenda 22 maj Micro Systemation vad gör vi? XRY video Mobiltelefoner som bevis i brottsmål Vad kan man hitta
STLinux Software development environment
STLinux Software development environment Development environment The STLinux Development Environment is a comprehensive set of tools and packages for developing Linux-based applications on ST s consumer
Iridium Extreme TM Satellite Phone. Data Services Manual
Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...
Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company
Implementation of Operator Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company Presenter Mark Heard, Eastman Chemical Company Control System Engineer Experience with several
Fondamenti su strumenti di sviluppo per microcontrollori PIC
Fondamenti su strumenti di sviluppo per microcontrollori PIC MPSIM ICE 2000 ICD 2 REAL ICE PICSTART Ad uso interno del corso Elettronica e Telecomunicazioni 1 2 MPLAB SIM /1 MPLAB SIM is a discrete-event
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
Designed for the needs of automation, telecommunications, remote supervision, and monitoring
- Programmable automation controller (PAC) MADE IN EU is a series of industrial computers which you can easily adapt to your needs by choosing from the available options. Energy-efficient ARM11 700 MHz
EPIC 950 THERMAL TICKET PRINTER
EPIC 950 THERMAL TICKET PRINTER Software Reference Guide www.transac-tech.com 2 Contacting Information / Serial Plate Info TransAct Technologies Incorporated is the manufacturer of Ithaca brand POS, Banking,
