Capturing a Forensic Image. By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013

Size: px
Start display at page:

Download "Capturing a Forensic Image. By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013"

Transcription

1 Capturing a Forensic Image By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013

2 Before you Begin The first step in capturing a forensic image is making an initial determination as to the direction of an investigation. If there is any possibility that the investigation could lead to litigation or criminal proceedings, STOP, do not make forensic images have the drive pulled and delivered to ISC Security with a proper chain of custody form ( If the case is a malware incident response, or other incident that will remain internal, then it is appropriate for SAS Security to complete a forensic drive capture. There are two methods to take a forensic image. The first is to clone the drive, the second is to take an image. In general, images are better as they are more portable and easier to work with. Cloning a drive may be advantageous in certain circumstances, however, so documentation on this method is included as well. Step 1 Tools you need If you intend to clone the target drive you'll need a zero'ed drive. This is any hard drive that has been overwritten with zeros, typically using the dd command. A typical way to do this on a Linux system (assuming /dev/sdc is the hard drive to be wiped) would be: $ dd if=/dev/zero of=/dev/sdc bs=1m Once a drive is zeroed a sticky note should be attached to the device indicating the size of the device and when the drive was wiped and by whom. If you are to image a drive, then you simply need another hard drive with sufficient capacity for the image. Note, however, that if you intend to image a drive you will need a larger hard drive to store the image. Formatted hard drives contain formatting and volume information which take up space so a 250 GB hard drive is not large enough to capture a 250 GB image. You'll also want a USB stick to use for copying specific pieces of malware, writing logs, or keeping digital notes on. Additionally you'll need a stack of bootable Linux distributions on CD (or DVD). It is important to have several because different distributions will work better, or worse, or not at all. Even having different versions of the same distribution will be helpful as one may work when another does not. We typically use: BackTrack, Caine, Deft, Helix and Knoppix. Finally you'll need a notebook that you use for forensics and investigations. Use a dedicated notebook and only use it in such circumstances.

3 Step 2 Approach the target When you first arrive at the scene of the potentially compromised machine you will probably want to determine if the machine can safely be powered off. If you want to grab an image of the RAM (a memory dump, or memory image) you must do this prior to shutting down the target. Otherwise, power off the target. Next, you want to record the date and time, plus the incident name, in your notebook. Plug your USB stick and the drive enclosure with the wiped drive in it into the machine while it's powered off. Boot the machine via CD. To do this power on the machine and place the CD in the tray. Next bring up the BIOS boot menu and choose to boot from CD. You may have to press a key as the machine powers on to do this (for instance F12 on most Dell machines, or hold down C on a Mac). The bootable CD may, or may not, load up. Give the CD sufficient time to load. Different machine architectures and distributions will take variable times to load. Plan on giving the CD minutes to boot before giving up. If one disk fails, simply repeat the process with another disk. Once the CD starts to boot Linux you may be presented with a menu of modes in which to boot. Always be sure to review these modes and choose the forensically sound mode. Some distributions have safe, and unsafe, modes of booting, so pay careful attention. Once the live CD has booted write down the distribution that is being used for the capture in your notebook. Step 3 Capture an image The first step in taking a capture is to identify all the devices plugged into the machine. Typically you'll want to identify: The internal hard disk The external drive The usb stick Each will be in the /dev directory, typically as /dev/sdx where X is a letter starting with a and incrementing. To do this use the fdisk command like so: # fdisk -l You should see output that will identify the various drives, their sizes, and allocation tables. Note that the zeroed drive won't have an allocation table and will merely be identified as a device. The drive size and partitioning are the best clues as to the identity of each drive. If the output is too long, and scrolls off the screen you can pipe it to an editor using the command: # fdisk -l less

4 This will start the less editor and you can use the up and down arrows to scroll through the document. To quit use the 'Ctrl+C' or type ':q' (colon then q) and hit enter. For instance, in the following screenshot you can see the first internal hard drive, identified as /dev/sda, which has three partitions of various sizes and formats: Figure 1: Output of the fdisk command In the next screenshot, the output at the end of the fdisk command, you can see the two terrabyte external drive and the 512 MB USB stick identified as /dev/sdc and /dev/sdd respectively: Figure 2: Further output from the fdisk command Once you have identified the drives, record in your notebook which drive is which including the designation (i.e. /dev/sda), the drive it corresponds to (i.e. internal hard drive, external USB drive, etc.) the size, and partitioning information.

5 Now that you know where drives are, you need to mount the USB stick so we can write files (specifically log files) to it. To do this you first have to make a target directory, then mount the device using the following commands (assuming /dev/sdb1 is a partition on the the USB stick. Note that while /dev/sdb may refer to the device, /dev/sdb1 is the actual partition of the device used for files): # mkdir /mnt/usbstick # mount /dev/sdb1 /mnt/usbstick Once the USB stick is mounted create a new folder for the incident using the following command: # mkdir /mnt/usbstick/[incidentname] Replacing [incidentname] with an appropriate label. Note the name of all mount points in your notebook. Take a copy of the fdisk output and write it to the usbdrive with using command output redirection like so: # fdisk -1 > /mnt/usbstick/[incidentname]/fdisk.txt Next you'll want to begin the job of copying the target to the wiped drive block by block. The only difference between taking an image, and making a drive clone is the target of the copy command. Use the dc3dd command to begin the copying of the target. If you want to take a clone you copy the entire device to the unmounted external drive. Cloning a Drive To clone a drive using the dc3dd command, execute the following command, assuming /dev/sda is the target hard drive, /dev/sdc is the wiped drive, and the USB stick is mounted on /mnt/usbstick also replace the filename with one more appropriate: # dc3dd if=/dev/sda of=/dev/sdc hash=md5 log=/mnt/usbstick/[incidentname]dc3dd.log This will take clone /dev/sda to /dev/sdc, write the log file to the USB stick, and output the md5 hash of the image. Write the command you used down in your notebook.

6 The following screenshot shows typical output of this command. Note the md5 value: Figure 4: Using the dc3dd command Taking an Image The process for taking a drive image is similar to cloning, but instead of writing to a raw device, you write to a file on a formatted drive. The first step to taking an image is mounting the external drive partition you want to write to. Do this in the same way that you mount the USB stick, assuming /dev/sdc1 is the partition you wish to write to: # mkdir /mnt/extharddrive # mount /dev/sdc1 /mnt/extharddrive Once the drive is mounted the command to copy the image is similar. Make sure the drive is mounted by changing into the target directory like so: # cd /mnt/extharddrive Next, make a directory for the incident and move into that directory: # mkdir [incidentname] ; cd [incidentname] Now you can take the image using the dc3dd in the same way as with a drive clone, only the output file will be an actual file name: # dc3dd if=/dev/sda of=160gbhd.img hash=md5 log=dc3ddlog.txt

7 Figure 5: Taking a drive image (to a file) This will create a new file that will contain an exact copy of the drive. The file extension is somewhat arbitrary. Other extensions for images include.ewf and.aff. Step 4 Verification To view the log file, once the image is complete, we can use the cat command like so: # cat /mnt/usbstick/[incidentname]dc3dd.log To verify this md5 you'll have to use the md5sum command like so (for a drive clone): # md5sum /dev/sdc For an image the command is the same but the target is the file: # md5sum /mnt/extharddrive/[incidentname]/drive.img Note that this can take a long time to complete. The following screenshot shows the md5sum command run against the device in the figure 4: If you feel confident, you may combine both the capture and verification commands so they run sequentially by separating them with a semi-colon like so (NB: there is no line break in the following command): # dc3dd if=/dev/sda of=/dev/sdc hash=md5 log=/mnt/usbstick/[incidentname]dc3dd.log ; md5sum /dev/sdc You must verify that the md5 in the log file (or dc3dd output) matches the sum from the md5sum command. If they do not match then something has gone wrong. If they do match, record the md5 in your notebook. Halt the bootable CD using the command: # halt -n Figure 6: Verifying the MD5 hash The machine should power down. Unplug the USB stick and the hard drive. On a sticky note attached to the hard drive note the incident name, the date and time, your name, and the md5 of the image. Note this information in your notebook as well.

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can

More information

Computer Forensics using Open Source Tools

Computer Forensics using Open Source Tools Computer Forensics using Open Source Tools COMP 5350/6350 Digital Forensics Professor: Dr. Anthony Skjellum TA: Ananya Ravipati Presenter: Rodrigo Sardinas Overview Use case explanation Useful Linux Commands

More information

Make a Bootable USB Flash Drive from the Restored Edition of Hiren s Boot CD

Make a Bootable USB Flash Drive from the Restored Edition of Hiren s Boot CD Make a Bootable USB Flash Drive from the Restored Edition of Hiren s Boot CD proteuss@sdf.lonestar.org Contents 1 Linux Method 2 2 Windows Method 3 3 Alternative Windows Method (RMPrepUSB) 4 4 HBCD on

More information

BackTrack Hard Drive Installation

BackTrack Hard Drive Installation BackTrack Hard Drive Installation BackTrack Development Team jabra [at] remote-exploit [dot] org Installing Backtrack to a USB Stick or Hard Drive 1 Table of Contents BackTrack Hard Drive Installation...3

More information

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

Recover Data Like a Forensics Expert Using an Ubuntu Live CD Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We

More information

USB 2.0 Flash Drive User Manual

USB 2.0 Flash Drive User Manual USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Installing Windows 98 in Windows Virtual PC 7 (Windows Virtual PC)

Installing Windows 98 in Windows Virtual PC 7 (Windows Virtual PC) Installing Windows 98 in Windows Virtual PC 7 (Windows Virtual PC) Before beginning, you will need to have a Windows 98 installation CD and a Windows 98 license key and a bootable CD. A bootable floppy

More information

AlienVault Offline Key Activation

AlienVault Offline Key Activation Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević, DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia

More information

User Manual. 2 ) PNY Flash drive 2.0 Series Specification Page 3

User Manual. 2 ) PNY Flash drive 2.0 Series Specification Page 3 User Manual Table of Contents 1 ) Introduction Page 2 2 ) PNY Flash drive 2.0 Series Specification Page 3 3 ) Driver Installation (Win 98 / 98 SE) Page 4 4 ) Driver Installation (Win ME / 2000 / XP) Page

More information

Creating a Cray System Management Workstation (SMW) Bootable Backup Drive

Creating a Cray System Management Workstation (SMW) Bootable Backup Drive Creating a Cray System Management Workstation (SMW) Bootable Backup Drive This technical note provides the procedures to create a System Management Workstation (SMW) bootable backup drive. The purpose

More information

WES 9.2 DRIVE CONFIGURATION WORKSHEET

WES 9.2 DRIVE CONFIGURATION WORKSHEET WES 9.2 DRIVE CONFIGURATION WORKSHEET This packet will provide you with a paper medium external to your WES box to write down the device names, partitions, and mount points within your machine. You may

More information

How you configure Iscsi target using starwind free Nas software & configure Iscsi initiator on Oracle Linux 6.4

How you configure Iscsi target using starwind free Nas software & configure Iscsi initiator on Oracle Linux 6.4 How you configure Iscsi target using starwind free Nas software & configure Iscsi initiator on Oracle Linux 6.4 Download the software from http://www.starwindsoftware.com/ Click on products then under

More information

USB Bare Metal Restore: Getting Started

USB Bare Metal Restore: Getting Started USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs

More information

Recovering Data from Windows Systems by Using Linux

Recovering Data from Windows Systems by Using Linux Recovering Data from Windows Systems by Using Linux Published by the Open Source Software at Microsoft, May 27 Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab Most

More information

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+) Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Navigating the Rescue Mode for Linux

Navigating the Rescue Mode for Linux Navigating the Rescue Mode for Linux SUPPORT GUIDE DEDICATED SERVERS ABOUT THIS GUIDE This document will take you through the process of booting your Linux server into rescue mode to identify and fix the

More information

Enterprise Erase LAN

Enterprise Erase LAN Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

Recovering Data from Windows Systems by Using Linux

Recovering Data from Windows Systems by Using Linux Recovering Data from Windows Systems by Using Linux Published by the Open Source Software Lab at Microsoft. November 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software

More information

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Created by Simon Monk Last updated on 2015-11-25 11:50:13 PM EST Guide Contents Guide Contents Overview You Will Need Downloading

More information

«Disaster Recovery» A DOM Restore Guide for Thecus NAS

«Disaster Recovery» A DOM Restore Guide for Thecus NAS «Disaster Recovery» A DOM Restore Guide for Thecus NAS This guide is applicable to the following NAS models N2800, N4800ECO, N5550, N4510U (PRO), N6850, N8850, 10850, N7510, N7710, N8810, N8900, N12000

More information

Ocster Backup - Rescue System

Ocster Backup - Rescue System Overview Ocster Backup - Rescue System The software allows you to create a rescue CD, DVD or USB-Stick. This rescue system is intended for two kinds of situations: 1. To restore a backup to your main hard

More information

GNU/LINUX Forensic Case Study (ubuntu 10.04)

GNU/LINUX Forensic Case Study (ubuntu 10.04) GNU/LINUX Forensic Case Study (ubuntu 10.04) Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License wim.bertels@khleuven.be FCCU Federal Computer Crime Unit of Belgium Assistance house

More information

book.book Page 1 Tuesday, August 19, 2008 2:01 PM Dell OptiPlex FX160 Re-Imaging Guide

book.book Page 1 Tuesday, August 19, 2008 2:01 PM Dell OptiPlex FX160 Re-Imaging Guide book.book Page 1 Tuesday, August 19, 2008 2:01 PM Dell OptiPlex FX160 Re-Imaging Guide book.book Page 2 Tuesday, August 19, 2008 2:01 PM book.book Page 1 Tuesday, August 19, 2008 2:01 PM Dell OptiPlex

More information

AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures

AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights

More information

Computer Forensic Tools. Stefan Hager

Computer Forensic Tools. Stefan Hager Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important

More information

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.

2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd. Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!

More information

Operating System Installation Guidelines

Operating System Installation Guidelines Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document

More information

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment Version 2.0 This tutorial will walk you through how to create a bootable USB drive to enter into a WINPE

More information

Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual

Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual Installing a hard disk 1. Power off the unit. 2. Remove the bottom cover from the unit by removing four screws. 3. Insert the 2.5 HDD to the

More information

Using VMware Workstation

Using VMware Workstation VMware Workstation 10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1.

XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1. XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1. The suggested interface for your computer is USB2.0 to have better speed

More information

How to Make a USB Bootable

How to Make a USB Bootable /0/0 Ways to Make a USB Bootable - wiki How to Make a USB Bootable Five Methods: Ad Making a USB Drive to Install Any PC Operating System Making a Windows Vista or 7 Install Drive Creating a USB PC Repair

More information

How To Set Up Software Raid In Linux 6.2.2 (Amd64)

How To Set Up Software Raid In Linux 6.2.2 (Amd64) Software RAID on Red Hat Enterprise Linux v6 Installation, Migration and Recovery November 2010 Ashokan Vellimalai Raghavendra Biligiri Dell Enterprise Operating Systems THIS WHITE PAPER IS FOR INFORMATIONAL

More information

User Manual. 2 Bay Docking Station

User Manual. 2 Bay Docking Station FANTEC MR-CopyDU3 User Manual 2 Bay Docking Station With One Touch Backup (OTB) and Copy Function Hardware: PC and Notebooks, Macintosh USB 1.1, USB 2.0 or USB 3.0 interface Features: 2,5 or 3,5 SATA I,II,III

More information

Bare Metal Backup And Restore

Bare Metal Backup And Restore Bare Metal Backup And Restore A TundraWare Inc. Technical Note Author: Tim Daneliuk (tundra@tundraware.com) Version: $Id: baremetal.rst,v 1.124 2014/08/26 13:15:28 tundra Exp $ Précis Many commercial and

More information

Incident Response and Computer Forensics

Incident Response and Computer Forensics Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident

More information

Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery

Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery Linux Overview Written by: Josh Lowery The Senator Patrick Leahy Center for Digital Investigation Champlain College October 29, 2012 Disclaimer: This document contains information based on research that

More information

USTM16 Linux System Administration

USTM16 Linux System Administration USTM16 Linux System Administration Lesson 4: Memory Management and Backups Instructor: Peter Chung (cspeter@cse.ust.hk) Peter Chung (cspeter) 1 GNOME System Monitor A graphical user interface to display

More information

USB. 16MB~2GB JetFlash. User s Manual

USB. 16MB~2GB JetFlash. User s Manual USB 16MB~2GB JetFlash User s Manual Introduction Table of Contents Package Contents...1 Features...1 System Requirements...2 Before Use...2 Driver Installation Driver Installation for Windows 98/98SE...3

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Cloning Complex Linux Servers

Cloning Complex Linux Servers Cloning Complex Linux Servers Cloning A Linux Machine That Has A Complex Storage Setup Where I work we have Cent OS servers whose drives are in various software raid and LVM2 configurations. I was recently

More information

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting

More information

Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system.

Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system. Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) All commands run from terminal as super user. Default CentOS 6.3 installation with two hard drives, /dev/sda

More information

USB bootable Ubuntu Kickstart Howto

USB bootable Ubuntu Kickstart Howto USB bootable Ubuntu Kickstart Howto (Version 1.0) 10(1)/2008-OTC/CHN-PROJECT - OPEN TECHNOLOGY CENTRE NATIONAL INFORMATICS CENTRE DEPARTMENT OF INFORMATION TECHNOLOGY CHENNAI Open Technology Centre, NIC,

More information

ThinLinX TLXOS NUC / Compute Stick / RePC Installation Guide Creating the Installer (Step 1)

ThinLinX TLXOS NUC / Compute Stick / RePC Installation Guide Creating the Installer (Step 1) ThinLinX TLXOS NUC / Compute Stick / RePC Installation Guide ThinLinX has created optimized versions of ThinLinX OS (TLXOS) for either the Intel NUC, Intel Compute Stick or RePC making full use of the

More information

v4: How to create a BartPE Rescue CD for Macrium Reflect

v4: How to create a BartPE Rescue CD for Macrium Reflect So, you ve created your Linux based recovery CD, you push it in and boot up and it doesn t find your hard drives, network or both what s next? If the Linux Based Recovery CD option doesn t work for you

More information

Computing forensics: a live analysis

Computing forensics: a live analysis April 18th, 2005 1 2 3 Objectives Evidence acquisition Recovery and examination of suspect digital evidence (think Warrick Brown on CSI) Hardware: servers, workstations, laptops, PDAs, mobiles, cameras

More information

2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1.

2.5 XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1. 2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1. The suggested interface for your computer is USB2.0 to have better

More information

Getting Started User s Guide

Getting Started User s Guide Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,

More information

USB Portable Firewall. User Manual

USB Portable Firewall. User Manual USB Portable Firewall User Manual Table of Contents Introduction... 1 Product Contents... 1 USB Portable Firewall... 1 Specs... 1 Usage... 1 USB Firewall Utility... 3 Installation... 3 Usage... 3 1) Reading

More information

CASPER SECURE DRIVE BACKUP

CASPER SECURE DRIVE BACKUP TM CASPER SECURE DRIVE BACKUP USER GUIDE V4.0 TM Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication,

More information

USB FLASH DRIVE. User s Manual. USB 2.0 Compliant. Version A10. - 1 - Version A10

USB FLASH DRIVE. User s Manual. USB 2.0 Compliant. Version A10. - 1 - Version A10 USB FLASH DRIVE User s Manual USB 2.0 Compliant Version A10-1 - Version A10 Introduction Thank you for purchasing the USB FLASH DRIVE device. The manual explains how to use the USB FLASH DRIVE software

More information

Security Incident Investigation

Security Incident Investigation Security Incident Investigation Mingchao Ma STFC RAL, UK HEPSYSMAN Workshop 10 th June 2010 Overview Security incident handling lifecycle Based on NIST SP800-61rev1 recommendation http://csrc.nist.gov/publications/nistpubs/800-61-rev1/sp800-61rev1.pdf

More information

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types COEN 152 / 252 Lab Exercise 1 Imaging, Hex Editors & File Types In this lab we will explore the concepts associated with creating a forensic image. Write-blocking will be accomplished utilizing a mounted

More information

!!! How To! setup storage devices!

!!! How To! setup storage devices! How To setup storage devices DreamBox / VU+ / xtrend DM8000HD PVR / DM7020HD PVR / DM800SE PVR / DM500HD VU+DUO / VU+SOLO / VU+DUO 2 / VU+SOLO 2 / VU+UNO / VU+ULTIMO ET9x00 / ET6x00 / ET5x00 / ET4x00 rudream

More information

RSA Security Analytics Virtual Appliance Setup Guide

RSA Security Analytics Virtual Appliance Setup Guide RSA Security Analytics Virtual Appliance Setup Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or

More information

X-Ways Capture. The program executes the following steps unless you specify a different procedure in the configuration file:

X-Ways Capture. The program executes the following steps unless you specify a different procedure in the configuration file: Executive Summary X-Ways Capture Specialized computer forensics tool for the evidence collection phase of a forensic investigation that captures Windows and Linux live systems. X-Ways Capture employs various

More information

Installing and Upgrading to Windows 7

Installing and Upgrading to Windows 7 Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

10 Red Hat Linux Tips and Tricks

10 Red Hat Linux Tips and Tricks Written and Provided by Expert Reference Series of White Papers 10 Red Hat Linux Tips and Tricks 1-800-COURSES www.globalknowledge.com 10 Red Hat Linux Tips and Tricks Compiled by Red Hat Certified Engineers

More information

Understanding Backup and Recovery Methods

Understanding Backup and Recovery Methods Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore

More information

Dell DR4000 Disk Backup System. Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive

Dell DR4000 Disk Backup System. Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive Dell DR4000 Disk Backup System Introduction to the Dell DR4000 Restore Manager A primer for creating and using a Restore Manager USB flash drive Storage Engineering Dell Product Group February 2012 THIS

More information

NetVault : Backup. User s Guide for the VaultDR System Plugins

NetVault : Backup. User s Guide for the VaultDR System Plugins NetVault : Backup User s Guide for the VaultDR System Plugins VaultDR Offline Plugin ver. 5.6 (VaultOS) VaultDR Online Plugin for Windows ver. 3.5 VaultDR Online Plugin for Linux ver. 3.1 VaultDR Server

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

Lab III: Unix File Recovery Data Unit Level

Lab III: Unix File Recovery Data Unit Level New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the

More information

EXPLORING LINUX KERNEL: THE EASY WAY!

EXPLORING LINUX KERNEL: THE EASY WAY! EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment

More information

Bringing the Eko VM Home (302)

Bringing the Eko VM Home (302) Liinux Howttos Brriingiing tthe Eko VM Home ((302)) CIIS 90 Sprriing 2011 Bringing the Eko VM Home (302) This Howto shows how to install VirtualBox and create the Linux Eko VM used in the CIS 90 course.

More information

EnCase Portable Demo P A G E 0

EnCase Portable Demo P A G E 0 EnCase Portable Demo P A G E 0 EnCase Portable Easy to Use Collection Solution Brent Botta Director of ediscovery Solution Agenda P A G E 2 EnCase Portable Solution What is it? Business Issues to Utilize

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

DriveClone Server. Users Manual

DriveClone Server. Users Manual DriveClone Server Users Manual Contents Chapter 1: Introduction... 3 Chapter 2: Install and uninstall DriveClone Server... 3 2.1 System Requirement... 3 2.2 Installing DriveClone Server... 4 2.3 Uninstalling

More information

Installing Ubuntu 12.04.1 LTS with full disk encryption

Installing Ubuntu 12.04.1 LTS with full disk encryption Installing Ubuntu 12.04.1 LTS with full disk encryption Intro: This is a simple step by step tutorial showing you how to install Ubuntu 12.04.1 LTS with enabled full disk encryption. If you don't know

More information

Series 4 and Series 5 Hardware Appliance Imaging Guide

Series 4 and Series 5 Hardware Appliance Imaging Guide Series 4 and Series 5 Hardware Appliance Imaging Guide Contents Introduction 2 RESOURCES REQUIRED 2 Creating a Security Analytics USB Build Stick 3 UNIVERSAL NETBOOT INSTALLER (UNEBOOTIN) TOOL 3 CURRENT

More information

Accessing your Staff (N and O drive) files from off campus

Accessing your Staff (N and O drive) files from off campus Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document

More information

How To Create A Multi-Version Bootable Windows 7 USB Drive

How To Create A Multi-Version Bootable Windows 7 USB Drive How To Create A Multi-Version Bootable Windows 7 USB Drive This is a step by step tutorial showing how to create a multi-version bootable Windows 7 USB drive. You can use the quick jump menu to skip to

More information

Anti-Virus Scan Tool

Anti-Virus Scan Tool Anti-Virus Scan Tool Procedures version 201407 Introduction Introduction We have experienced an increasing customer concern relating to IT security in general leading to a demand for virus scanning of

More information

Configuring Linux to Enable Multipath I/O

Configuring Linux to Enable Multipath I/O Configuring Linux to Enable Multipath I/O Storage is an essential data center component, and storage area networks can provide an excellent way to help ensure high availability and load balancing over

More information

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range The Intel NUC is a small form factor computer that incorporates several models from Intel Core processors to the economical Single

More information

2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel

2. Boot using the Debian Net Install cd and when prompted to continue type linux26, this will load the 2.6 kernel These are the steps to build a hylafax server. 1. Build up your server hardware, preferably with RAID 5 (3 drives) plus 1 hotspare. Use a 3ware raid card, 8000 series is a good choice. Use an external

More information

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011 LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall

More information

Operating System Installation Guide

Operating System Installation Guide Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating

More information

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013 LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...

More information

CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1

CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1 CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities Project 7-1 In this project you use the df command to determine usage of the file systems on your hard drive. Log into user account for this and the following

More information

USB FLASH DRIVE. User s Manual 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS...

USB FLASH DRIVE. User s Manual 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS... Table of Contents 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS...2 2. INSTALLATION PROCEDURE...3 2.1. INSTALL USB FLASH DRIVE ON WINDOWS

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Hi-Speed USB 2.0 Flash Disk. User s Manual

Hi-Speed USB 2.0 Flash Disk. User s Manual Hi-Speed USB 2.0 Flash Disk User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Before Use... 4 Driver Installation... 5 Driver Installation for Windows 98/98SE... 5 Disk Partitions

More information

How To Install A Safesync 2.1.1 On A 2.0.1 Server

How To Install A Safesync 2.1.1 On A 2.0.1 Server Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...

More information

Backing Up With Acronis True Image 2015

Backing Up With Acronis True Image 2015 Sun City Summerlin Computer Club Seminar Backing Up With Acronis True Image 2015 Tom Burt November 26, 2014 Backing Up With Acronis 1 Seminar Agenda Basic Backup Concepts Cloning vs Imaging Backup Tools

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Week Overview. Running Live Linux Sending email from command line scp and sftp utilities

Week Overview. Running Live Linux Sending email from command line scp and sftp utilities ULI101 Week 06a Week Overview Running Live Linux Sending email from command line scp and sftp utilities Live Linux Most major Linux distributions offer a Live version, which allows users to run the OS

More information

2 Getting started... 15 2.1 User interface language...15 2.2 Protecting your system...15

2 Getting started... 15 2.1 User interface language...15 2.2 Protecting your system...15 Table of contents 1 Introduction...6 1.1 What is Acronis True Image?... 6 1.2 Alternatives to the removed features... 6 1.3 System requirements and supported media... 7 1.3.1 Minimum system requirements...

More information

Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption

Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption This is a step-by-step guide showing how to create an encrypted bootable Backtrack 4 USB thumb drive. I put quotes around full in the title

More information

Puppy Linux Installation To a USB Flash Drive How to install Puppy Linux lupu 5.2.8 Lucid to a Flash Drive

Puppy Linux Installation To a USB Flash Drive How to install Puppy Linux lupu 5.2.8 Lucid to a Flash Drive Puppy Linux Installation To a USB Flash Drive How to install Puppy Linux lupu 5.2.8 Lucid to a Flash Drive Puppy Linux Lucid installation tutorial to a vfat format flash drive with a useful application

More information

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference Acronis Backup & Recovery 10 Server for Linux Command Line Reference Table of contents 1 Console mode in Linux...3 1.1 Backup, restore and other operations (trueimagecmd)... 3 1.1.1 Supported commands...

More information

BeagleBone Black: Installing Operating Systems

BeagleBone Black: Installing Operating Systems BeagleBone Black: Installing Operating Systems Created by Justin Cooper Last updated on 2015-01-16 11:00:15 AM EST Guide Contents Guide Contents Overview Choosing an Operating System Angstrom Download

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information