Virtual Hard Disk Forensics Using EnCase
|
|
- Josephine Gibson
- 8 years ago
- Views:
Transcription
1 Virtual Hard Disk Forensics Using EnCase Randy Nading, EnCE Security+ Computer Forensic Analyst, Jacobs Technology Agenda I. Virtual Hard Disks (VHDs) as Evidence Containers Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools II. Ways VHDs Can Be Used to Obfuscate Data Hands On 2: Add Data, Dismount the VHD, Change Extension, Copy to Thumb Drive Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 2 Randy Nading, Jacobs Technology 1
2 Agenda III. Detecting VHDs Using EnCase: Update the File Types Table Hands On 3: Update the File Types Table in EnCase To Detect Common VHDs IV. Detecting VHDs Using EnCase: Create a VHD Condition Hands On 4: Create a Condition to Detect Common VHDs Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 3 Agenda V. Putting It All Together: Implementing VHD Analysis in the Workflow VI. Q & A Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 4 Randy Nading, Jacobs Technology 2
3 I. Virtual Hard Disks (VHDs) as Evidence Containers Think of VHDs as another type of evidence container Current forensic software does not identify VHDs or mount them VHDs are becoming more and more prevalent Windows users can create their own VHDs from the Disk Management snap-in Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 5 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools TrueCrypt s admission TrueCrypt s recommendation Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 6 Randy Nading, Jacobs Technology 3
4 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools TrueCrypt s admission TrueCrypt s recommendation Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 7 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools A. Open the Computer Management window (in File Explorer right-click This PC and select Manage) Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 8 Randy Nading, Jacobs Technology 4
5 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools B. Select Disk Management Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 9 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools C. Open the Action menu and select Create VHD Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 10 Randy Nading, Jacobs Technology 5
6 Hands On 1: Create and Mount a VHD D. Select location, size and type of VHD and click OK. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 11 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools E. Initialize the new VHD: Right-click the new VHD disk icon in the Disk Management window and select Initialize Disk Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 12 Randy Nading, Jacobs Technology 6
7 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools F. Create a partition on the VHD: Still in Disk Management, right-click the Unallocated Space of the newly initialized VHD and select New Simple Volume Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 13 Hands On 1: Create and Mount a VHD Using Windows 7 or 8 OS Tools G. Encrypt the new VHD using BitLocker: Open File Explorer, right-click the New Volume and select Turn on BitLocker Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 14 Randy Nading, Jacobs Technology 7
8 II. Ways VHDs Can Be Used to Obfuscate Data VHDs residing on hard drives and thumb drives will not be obvious to examiners, even if nothing is done to hide their presence The VHD file extension can be stripped or changed to blend in with the files around it VHDs may be moved to a thumb drive and encrypted for added security VHDs may be nested VHDs may be encrypted Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 15 Hands On 2: Add Data, Dismount VHD, Change Extension, Copy to TD A. To unmount the drive, right-click the drive in File Explorer and select Eject Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 16 Randy Nading, Jacobs Technology 8
9 Hands On 2: Add Data, Dismount VHD, Change Extension, Copy to TD B. Alternatively, right-click the disk number in the Disk Management window and select Detach VHD Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 17 Hands On 2: Add Data, Dismount VHD, Change Extension, Copy to TD C. To mount the drive again, use Attach VHD in the Action menu of the Disk Management window Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 18 Randy Nading, Jacobs Technology 9
10 Hands On 2: Add Data, Dismount VHD, Change Extension, Copy to TD D. Disguise the VHD as the Microsoft Debug Information Accessor: Dismount the drive as in step A, right-click the filename of the VHD in File Explorer, and select Rename. Change the name to msdia80, and change the extension to.dll. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 19 Hands On 2: Add Data, Dismount VHD, Change Extension, Copy to TD E. Move the VHD to the thumb drive: Right-click the filename of the VHD in File Explorer and select Cut. Rightclick the thumb drive in File Explorer and select Paste. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 20 Randy Nading, Jacobs Technology 10
11 III. Detecting VHDs Using EnCase: Update the File Types Table Since VHDs operate fine without filename extensions, search for them by the unique signatures embedded in their file headers Update the File Types table with the signatures of popular VHDs in use today Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 21 III. Detecting VHDs Using EnCase: Update the File Types Table Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 22 Randy Nading, Jacobs Technology 11
12 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs A. Start EnCase and select View File Types and click on the New icon on the menu bar Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 23 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs B. In the New File Type window, click on the Options tab and enter these settings Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 24 Randy Nading, Jacobs Technology 12
13 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs B. In the New File Type window, click on the Options tab and enter these settings Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 25 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs C. In the New File Type window, click on the Header tab and enter these settings Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 26 Randy Nading, Jacobs Technology 13
14 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 27 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs D. The Footer tab will not be used. Click OK to save the settings to the File Types table. E. Repeat the above process for each of the VHD file types you wish to add. Pay attention that the four character Unique Tag field begins with vhd and is different for each VHD entered. This will be the field you will use later in the process to write a condition that will identify all VHDs on the media being examined. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 28 Randy Nading, Jacobs Technology 14
15 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs F. If you have multiple installations of EnCase as in a lab setting, you can update the File Types table once, and copy the FileTypes.ini incremental file from your C:\Users\username\ AppData\Roaming\EnCase\EnCase7-2\Config folder to the same folder on all the other machines. You do all the heavy lifting and your coworkers benefit. : ) Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 29 Hands On 3: Update File Types Table in EnCase To Detect Common VHDs Practice this by copying the FileTypes.ini incremental file that I prepared on the instructor materials network share to your C:\Users\username\AppData\Roaming\EnCase\EnCase7-2\Config folder now. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 30 Randy Nading, Jacobs Technology 15
16 IV. Detecting VHDs Using EnCase: Create a VHD Condition Create a condition to filter out all files except VHDs based on their file signature analysis Searches for and displays only files whose File Type Tag contains the tag vhd Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 31 Hands On 4: Create a Condition to Detect Common VHDs A. Click the Condition dropdown menu and select New Condition, which will bring up the New Condition dialog box. (1) For the Path field, navigate to the folder in which you would like the condition stored, then name the condition Virtual Hard Disk and click Save. (2) Click the New icon on the toolbar, which brings up the New Term dialog box. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 32 Randy Nading, Jacobs Technology 16
17 Hands On 4: Create a Condition to Detect Common VHDs B. Select the File Type Tag property, the Contains operator, and type vhd for the value. Then click OK to save and close the New Term dialog box and OK to save and close the New Condition dialog box. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 33 Hands On 4: Create a Condition B. Select the File Type Tag property, the Contains operator, and type vhd for the value. Then click OK to save and close the New Term dialog box and OK to save and close the New Condition dialog box. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 34 Randy Nading, Jacobs Technology 17
18 Hands On 4: Create a Condition to Detect Common VHDs C. Test the new condition: (1) Open EnCase and add at least one VHD as evidence. (2) Click the Condition dropdown menu and select Run, then select the name of the condition just created and click Open. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 35 Hands On 4: Create a Condition to Detect Common VHDs D. Select the appropriate Filter (Current View, Current Device, or All Evidence Files) and click OK to run the condition. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 36 Randy Nading, Jacobs Technology 18
19 Hands On 4: Create a Condition to Detect Common VHDs Question: Why does the condition return no results if you verified you have at least one virtual hard drive added as evidence? Resist the urge to double-check your File Type table additions you copied and pasted the right bits of data. Resist the urge to edit the condition it is as simple and straightforward as any condition you have ever written. Resist the urge to verify the presence of the VHD file in the evidence you just put it there a few minutes ago! Resist the urge to question your sanity think workflow! Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 37 V. Putting It All Together: VHD Analysis in the Workflow The reason the condition returned no results is due to running it at the wrong spot in your digital forensics workflow The condition identifying the VHDs depends on File Signature Analysis to work One of the initial workflow steps to be performed ought to be File Signature Analysis, either through Evidence Processor or Entries Hash\Sig Selected. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 38 Randy Nading, Jacobs Technology 19
20 V. Putting It All Together: VHD Analysis in the Workflow Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 39 V. Putting It All Together: VHD Analysis in the Workflow Reminder: After completing File Signature Analysis, either through Evidence Processor or Entries Hash\Sig Selected, you must reload the evidence so that the results are available to the condition However, it would be a workflow mistake to do File Signature Analysis as the very first step. Why? Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 40 Randy Nading, Jacobs Technology 20
21 V. Putting It All Together: VHD Analysis in the Workflow The first priority in workflow is to Recover Folders The second priority is to Mount Compound Files The third priority is to conduct File Signature Analysis The fourth priority is to reload the evidence The fifth priority is to run the new VHD condition Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 41 V. Putting It All Together: VHD Analysis in the Workflow Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 42 Randy Nading, Jacobs Technology 21
22 V. Putting It All Together: VHD Analysis in the Workflow After step 10, continue the rest of your digital forensics workflow as usual NOTE: If the exported VHD in workflow step 6 above is a file with an extension of.vdi, it must be converted to a.vhd or.vmdk before mounting it in step 7 above. The.vdi file is the Virtual Disk Image created by Oracle VirtualBox. Install VirtualBox before continuing. After VirtualBox is installed, use the VBoxManage command line tool to do the conversion as shown below. Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 43 V. Putting It All Together: VHD Analysis in the Workflow Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 44 Randy Nading, Jacobs Technology 22
23 V. Putting It All Together: VHD Analysis in the Workflow Open a command window and type the following command: VBoxManage clonehd sourcefilename destinationfilename --format VHD Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 45 V. Putting It All Together: VHD Analysis in the Workflow NOTE: If an error is generated for a duplicate UUID, run the command below and then repeat the conversion process: VBoxManage internalcommands sethduuid sourcefilename Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 46 Randy Nading, Jacobs Technology 23
24 VI. Q & A Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 47 Resources VHD Forensics nments.aspx Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 48 Randy Nading, Jacobs Technology 24
25 Resources VHDs Randy Nading EnCE Security+ Computer Forensic Analyst Jacobs Technology Page 49 Randy Nading, Jacobs Technology 25
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
More informationForensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationMICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS
MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS Lasted Edited: 2012-07-10 1 Find the Inbox... 3 Check for New Mail... 4 Manually check for new messages... 4 Change new incoming e-mail schedule options...
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationExtracting an S/MIME certificate from a digital signature
Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:
More informationInstructions for Creating an Outlook E-mail Distribution List from an Excel File
Instructions for Creating an Outlook E-mail Distribution List from an Excel File 1.0 Importing Excel Data to an Outlook Distribution List 1.1 Create an Outlook Personal Folders File (.pst) Notes: 1) If
More informationThere are several ways of creating a PDF file using PDFCreator.
it Information Information Technology Services Introduction Using you can convert virtually any file from any application into Adobe Portable Document Format (PDF). Documents in Adobe PDF preserve the
More informationImplementing Mission Control in Microsoft Outlook 2010
Implementing Mission Control in Microsoft Outlook 2010 How to Setup the Calendar of Occasions, Not Doing Now List, Never Doing Now List, Agendas and the Vivid Display In Outlook 2010 Handout Version 3
More informationThe VHD is separated into a series of WinRar files; they can be downloaded from the following page: http://www.scorpionsoft.com/evaluation/download
Overview This document will serve as a quick setup guide to get the AuthAnvil Password Solutions virtual hard drive setup with Windows Hyper-V and Oracle Virtual Box. Downloading the VHD The VHD is separated
More informationMICROSOFT ACCESS 2007 BOOK 2
MICROSOFT ACCESS 2007 BOOK 2 4.1 INTRODUCTION TO ACCESS FIRST ENCOUNTER WITH ACCESS 2007 P 205 Access is activated by means of Start, Programs, Microsoft Access or clicking on the icon. The window opened
More informationHEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team
How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require
More informationPdf - print version. Lab Objectives: When you are finished with this lab you should be able to:
1 of 5 Pdf - print version LAB EXERCISE 2 File Management in Windows Summary: This lab is a continuation of the concepts and techniques introduced in Lab1, which introduced you to the Windows interface
More informationBitLocker To Go User Guide
BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB
More informationUser Guide. Nero BackItUp. Ahead Software AG
User Guide Nero BackItUp Ahead Software AG Information on copyright and trade marks The Nero BackItUp user manual and all its contents are protected by copyright and are the property of Ahead Software.
More informationOutlook 2007 EXPLORE THE OUTLOOK USER INTERFACE. Microsoft. Basic Tasks
Microsoft Outlook 2007 Basic Tasks EXPLORE THE OUTLOOK USER INTERFACE 1. Instant Search box: Helps you quickly find items in Microsoft Outlook. The Instant Search pane is always available in all of your
More informationSonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
More informationSonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
More informationMS Excel Template Building and Mapping for Neat 5
MS Excel Template Building and Mapping for Neat 5 Neat 5 provides the opportunity to export data directly from the Neat 5 program to an Excel template, entering in column information using receipts saved
More informationEmail Basics. a. Click the arrow to the right of the Options button, and then click Bcc.
Email Basics Add CC or BCC You can display the Bcc box in all new messages that you compose. In a new message, do one of the following: 1. If Microsoft Word is your e-mail editor a. Click the arrow to
More informationMAC OSX INSTALLATION NOTES ORACLE VIRTUALBOX Micro Planner X-Pert V3.5.1 Digital Download Edition
MAC OSX INSTALLATION NOTES ORACLE VIRTUALBOX Micro Planner X-Pert V3.5.1 Digital Download Edition THIS DOCUMENT CONTAINS IMPORTANT INFORMATION REGARDING THE INSTALLATION AND USE OF THIS SOFTWARE. IF AFTER
More informationCreate a PDF File. Tip. In this lesson, you will learn how to:
Create a PDF File Now that you ve seen what an ETD looks like and how to browse the contents, it s time to learn how to convert your own thesis or dissertation into a PDF file. There are several different
More informationMAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
More informationMICROSOFT EXCEL 2011 MANAGE WORKBOOKS
MICROSOFT EXCEL 2011 MANAGE WORKBOOKS Last Edited: 2012-07-10 1 Open, create, and save Workbooks... 3 Open an existing Excel Workbook... 3 Create a new Workbook... 6 Save a Workbook... 6 Set workbook properties...
More informationMoving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
More informationIntro to Web Development
Intro to Web Development For this assignment you will be using the KompoZer program because it free to use, and we wanted to keep the costs of this course down. You may be familiar with other webpage editing
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationCOEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types
COEN 152 / 252 Lab Exercise 1 Imaging, Hex Editors & File Types In this lab we will explore the concepts associated with creating a forensic image. Write-blocking will be accomplished utilizing a mounted
More informationAffiliated Provider Billing/Coding
Affiliated Provider Billing/Coding RADIOLOGY BILLING Table of Contents Accessing icentra...2 Opening PowerChart...2 Finding and Selecting a Patient...2 Selecting a patient on the Patient List:...2 Searching
More informationQuick Start Guide. Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve.
Quick Start Guide Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve. Change the screen size or close a database Click the Access
More informationMTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.
STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationWHAT S NEW IN OUTLOOK 2010 & HOW TO CUSTOMIZE IT
WHAT S NEW IN OUTLOOK 2010 & HOW TO CUSTOMIZE IT THE RIBBON... 2 CONTEXTUAL TABS... 4 THE FILE TAB... 4 DIALOG BOXES... 5 MINIMIZING THE RIBBON... 5 CUSTOMIZING THE RIBBON... 6 CUSTOMIZING THE QUICK ACCESS
More informationCreating a Patch Management Dashboard with IT Analytics Hands-On Lab
Creating a Patch Management Dashboard with IT Analytics Hands-On Lab Description This lab provides a hands-on overview of the IT Analytics Solution. Students will learn how to browse cubes and configure
More informationWINDOWS 64-BIT INSTALLATION NOTES ORACLE VIRTUALBOX Micro Planner X-Pert V3.5.1 Digital Download Edition
WINDOWS 64-BIT INSTALLATION NOTES ORACLE VIRTUALBOX Micro Planner X-Pert V3.5.1 Digital Download Edition THIS DOCUMENT CONTAINS IMPORTANT INFORMATION REGARDING THE INSTALLATION AND USE OF THIS SOFTWARE.
More informationBacking Up and Deleting Files
CHAPTER 5 Backing Up and Deleting Files Video files can be copied from the hard disk to external storage media, such as CD-R, DVD, MO, or ZIP drives. Video files saved on the hard disk can be easily deleted
More informationPersonal Folders Backup
Personal Folders Backup The Personal Folders Backup tool is designed for use in Outlook 2000 and later and the operating systems that support each respective Outlook version. The tool provides a quick
More informationPGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4
More informationChapter 4: Website Basics
1 Chapter 4: In its most basic form, a website is a group of files stored in folders on a hard drive that is connected directly to the internet. These files include all of the items that you see on your
More informationBringing the Eko VM Home (302)
Liinux Howttos Brriingiing tthe Eko VM Home ((302)) CIIS 90 Sprriing 2011 Bringing the Eko VM Home (302) This Howto shows how to install VirtualBox and create the Linux Eko VM used in the CIS 90 course.
More informationContents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
More information12 NETWORK MANAGEMENT
12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking
More informationAppendix A How to create a data-sharing lab
Appendix A How to create a data-sharing lab Creating a lab involves completing five major steps: creating lists, then graphs, then the page for lab instructions, then adding forms to the lab instructions,
More informationGREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
More informationQuick Start Guide. Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve.
Quick Start Guide Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve. Change the screen size or close a database Click the Access
More informationKnowledgebase Article
Company web site: Support email: Support telephone: +44 20 3287-7651 +1 646 233-1163 2 EMCO Network Inventory 5 provides a built in SQL Query builder that allows you to build more comprehensive
More informationLab 5 Managing Access to Shared Folders
Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared
More informationINSTALLING NOVA DATA ENCRYPTION SOFTWARE
INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption
More informationJunk E-mail Settings. Options
Outlook 2003 includes a new Junk E-mail Filter. It is active, by default, and the protection level is set to low. The most obvious junk e-mail messages are caught and moved to the Junk E-Mail folder. Use
More informationMICROSOFT ACCESS 2003 TUTORIAL
MICROSOFT ACCESS 2003 TUTORIAL M I C R O S O F T A C C E S S 2 0 0 3 Microsoft Access is powerful software designed for PC. It allows you to create and manage databases. A database is an organized body
More informationZimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
More informationFax and SMS Quickguide
INTRODUCTION U2 Fax and SMS allow faxes and SMS to be sent directly from a user s workstation via the Internet using U2 Webservices. This improves staff efficiency by removing the need to physically fax
More information1. Introduction... 2. 2. About the BackupAssist Hyper-V solution... 2. Advantages... 2. Features... 2. Granular technology... 2
Contents 1. Introduction... 2 2. About the BackupAssist Hyper-V solution... 2 Advantages... 2 Features... 2 Granular technology... 2 The BackupAssist VM Granular Restore Console... 2 Limitations and requirements...
More informationImporting Contacts to Outlook
Importing Contacts to Outlook 1. The first step is to create a file of your contacts from the National Chapter Database. 2. You create this file under Reporting, Multiple. You will follow steps 1 and 2
More informationisupport 15 Release Notes
isupport 15 Release Notes This document includes new features, changes, and fixes in isupport v15. The Readme.txt file included with the download includes a list of known issues. New Features in isupport
More informationINTRODUCTION 5 COLLABORATION RIBBON 5 SELECT THE UPDATING METHOD 6 MAKE YOUR PROJECT COLLABORATIVE 8 PROCESSING RECEIVED TASK UPDATES 9
Contents Contents INTRODUCTION 5 COLLABORATION RIBBON 5 SELECT THE UPDATING METHOD 6 MAKE YOUR PROJECT COLLABORATIVE 8 PROCESSING RECEIVED TASK UPDATES 9 IMPORT UPDATES 12 CUSTOM TEXT FIELDS MAPPING 13
More informationMicrosoft Outlook 2010. Reference Guide for Lotus Notes Users
Microsoft Outlook 2010 Reference Guide for Lotus Notes Users ContentsWelcome to Office Outlook 2010... 2 Mail... 3 Viewing Messages... 4 Working with Messages... 7 Responding to Messages... 11 Organizing
More informationPC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0
T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on
More informationZimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0
Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international
More informationRoth IRA Conversion Evaluator
Roth IRA Conversion Evaluator Quick Start Guide 2009, WoltersKluwer. All Rights Reserved. Page 1 of 36 Table of Contents Roth IRA Conversion Evaluator Quick Start Guide Getting Started... 3 About the Roth
More informationPatch Manager. Overview. LabTech
Patch Manager PATCH MANAGER 1 Overview... 1 Using the Patch Manager... 7 Using the Patch Manager for Groups... 8 Ignoring Patches... 11 Denying Patches... 12 Removing Patch Approvals from Groups... 12
More informationHow To Send An Encrypted Email In Outlook 2000 (For A Password Protected Email) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Safemail) On An Iphone Or
Outlook 2000 1. Open Outlook 2000 and select the Tools > Options > Security. 2. Click Change Settings. 3. Under the Certificates and Algorithms, there are two Choose buttons. The first allows you to select
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationLab: Case Resolution Processing
Lab: Case Resolution Processing Objectives Create a case. Associate a phone call with the case. Resolve the case. Reactivate the case. Manage the case through the case resolution process ribbon. Resolve
More informationLab 5: Delete What You Won t Need from the Publish Process
Lab 5: Delete What You Won t Need from the Publish Process You have now created the groundwork that you need to build a process that will deal with remediation at source. In the following labs, you will
More informationZimbra Connector for Outlook User Guide. Release 6.0
Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2010 Legal Notices Copyright 2005-2010 Zimbra, Inc. All rights reserved. Zimbra and the Zimbra logo are trademarks of Zimbra.
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
More informationWA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
More informationVT Technology Management Utilities for Hyper-V (vtutilities)
VT Technology Management Utilities for Hyper-V (vtutilities) vtutilities provide a local graphical user interface (GUI) to manage Hyper-V. Hyper-V is supported on Windows Server 2008 R2 and Windows Server
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is
More informationInstalling Hortonworks Sandbox on Hyper-V
Installing Hortonworks Sandbox on Hyper-V Getting Ready to install on Windows using Hyper-V Use this section to prepare for your installation. Pre-Requisites Ensure that you have installed and enabled
More informationUsing Keil software with Linux via VirtualBox
Using Keil software with Linux via VirtualBox Introduction The Keil UVision software used to develop programs for ARM based microprocessor systems is designed to run on Microsoft Windows operating systems.
More informationOlathe District Schools 1 of 11 GroupWise 7
Olathe District Schools 1 of 11 GroupWise 7 Creating an email group To create and save a personal group: 1. Click on the toolbar. 2. Click the personal address book you want to add this group to. 3. Click
More informationAdding Digital Signature and Encryption in Outlook
Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be
More information1.5 MONITOR. Schools Accountancy Team INTRODUCTION
1.5 MONITOR Schools Accountancy Team INTRODUCTION The Monitor software allows an extract showing the current financial position taken from FMS at any time that the user requires. This extract can be saved
More informationCreating a Distribution List from an Excel Spreadsheet
Creating a Distribution List from an Excel Spreadsheet Create the list of information in Excel Create an excel spreadsheet. The following sample file has the person s first name, last name and email address
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationIn-Class Lab Assignment
In-Class Lab Assignment Prepared by Ms. Delores J. Reaves Please bring copy to class!!!!! Introduction to Windows (the Operating System) Understanding File Management F ile management is the process of
More informationWorking with Administrative Tools
This final chapter considers a variety of administrative 12 tools and how to use them. Working with Administrative Tools Using Administrative Tools Once you go though Control Panel (assuming you haven
More informationBacking Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2
Backing Up and Restoring Microsoft Exchange Server 2010 Cloud Attached Storage August 2012 Version 3.2 1 Introduction This document explains how to backup your Microsoft Exchange Server 2010 database and
More informationInternet Explorer Settings for use with Privia
Internet Explorer Settings for use with Privia The following document is intended for users who are running Privia and Internet Explorer who either cannot install the Privia client or the client is not
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationHow To Run Paragon Boot Camp Backup On A Mac Computer (Windows) On A Pc Or Mac (Windows 2) On An Ntos 2 (Windows 3) On Your Computer Or Ipad (Windows 1) On Pc Or Ipa
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com Paragon
More informationUsing Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationintroducing COMPUTER ANTI FORENSIC TECHNIQUES
introducing COMPUTER ANTI FORENSIC TECHNIQUES COMPUTER FORENSIC DATA RECOVERY TECHNIQUES AND SOLUTIONS WORKSHOP Executive Summary Computer Forensics, a term that precisely identifies the discipline that
More informationSystem Protection for Hyper-V User Guide
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationCreating and maintaining a database
L E S S O N 7 Creating and maintaining a database Lesson objectives To become familiar with database maintenance, you will: a b c Create a blank database. Move objects from one database to another. Compact
More informationACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationMicrosoft Access 2010 Part 1: Introduction to Access
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Access 2010 Part 1: Introduction to Access Fall 2014, Version 1.2 Table of Contents Introduction...3 Starting Access...3
More informationSPHOL326: Designing a SharePoint 2013 Site. Hands-On Lab. Lab Manual
2013 SPHOL326: Designing a SharePoint 2013 Site Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references,
More informationVMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.4.1
VMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.4.1 This document supports the version of each product listed and supports all subsequent versions
More informationExchange Server Backup and Restore
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...
More informationCreating and Using Databases with Microsoft Access
CHAPTER A Creating and Using Databases with Microsoft Access In this chapter, you will Use Access to explore a simple database Design and create a new database Create and use forms Create and use queries
More informationAcronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
More informationBasic Formatting of a Microsoft Word. Document for Word 2003 and 2007. Center for Writing Excellence
Basic Formatting 1 Basic Formatting of a Microsoft Word Document for Word 2003 and 2007 Center for Writing Excellence Updated April 2009 Basic Formatting 2 Table of Contents GENERAL FORMATTING INFORMATION...
More informationHP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide
HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide Copyright and License 2008 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written
More information