Lab I: Disk Imaging and Cloning

Size: px
Start display at page:

Download "Lab I: Disk Imaging and Cloning"

Transcription

1 New Mexico Tech Digital Forensics Fall 2006 Lab I: Disk Imaging and Cloning Objectives - Use VMWare and modify device configuration in a VMWare system - Image a drive to a file - Extract individual partitions from an image file - Mount the image as a loopback device and read only for analysis - Properly sanitize a disk for cloning - Clone a drive versus imaging the drive - Verify disk and file integrity with hashing Procedures Adding Virtual Disks in VMWare Step 1 On your lab machines launch VMWare. A virtual operating system running Linux and containing the forensics tools you will need can be found in the favorites panel. Select Linux Forensics and click edit virtual machines settings. In the Hardware tab you will see a listing of the virtual devices that have been configured with this virtual machine. Devices can be added and removed from this panel as if you were adding and removing actual devices on a physical machine. Select the Network Adapter > choose Remove. Question 1: Why might it be a good idea to disconnect your forensics machine from the network before performing digital analysis on a drive? By being on a network, your forensics system may be at risk of being compromised. The evidence in your custody should be well protected from unauthorized access. Also, If you are analyzing a system that has been compromised you want to take precautions Prepared by Regis Cassidy Sandia National Laboratories Page 1

2 that malicious code does not escape out onto a network. Step 2 In a real world situation you would have seized or collected the computer under investigation and may choose to pull out the hard disk and add it to your own system for performing digital analysis. In VMWare you can simulate this procedure by editing the virtual machine settings and adding another disk. In the Hardware tab click the Add... button > Choose Hard Disk > click Next. The compromised disk has already been set up for you as a VMWare image. Choose Use an existing virtual disk > click Next. Make sure you are browsing in the c:\vmware-images\linux - Forensics directory. Select the Linux Hacked.vmdk file. This file represents the virtual disk that you will be analyzing. Click OK > Finish. Step 3 In the event that the evidence you find will be needed in court, you need to make sure that no modifications are made to the original drive. Therefore, a copy or image of the compromised drive is needed to perform your analysis. You will need to add an additional disk for storing the image you are about to make and any evidence that will be extracted from that image. A general rule of thumb is to add a drive that is at least 3 times the size of the original drive. The original compromised drive is 1GB. Question 2: Why would it be a good idea to use a separate blank drive that contains all the extracted evidence and reports you obtained from the image? Why should this drive be significantly larger then the original drive? The images and evidence you collect can potentially be huge amounts of data. It would be a good idea to avoid fragmenting your own system with these large files. Having all the files related to your investigation on its own disk helps to be organized and makes portability of the evidence easier in case you need to use multiple computer systems to do your analysis. This drive would need to be significantly larger then the original drive under investigation because you may be extracting large amounts of data from the image. For example, you may extract individual partitions from the Prepared by Regis Cassidy Sandia National Laboratories Page 2

3 image, unallocated space, slack space, etc. You also may be recovering deleted files and will have logs and reports from the results of your investigation. Using the procedure described in Step 2, add another virtual disk. This time choose the option Create a new virtual disk. Choose IDE and a disk size that is 3 times the size of the original drive. Make sure that Allocate all disk space now is NOT selected and that Split disk into 2GB files is selected. This nice feature in VMWare helps to conserve physical disk space on your computer if the virtual disks are not being fully utilized. Name the virtual disk Linux - Forensics-image.vmdk Step 4 You should now see 3 hard disks on your virtual forensics machine under the Hardware tab. One hard disk contains the operating system with the forensics tools you will be using. Another simulates the collected disk from a compromised computer. The last hard disk will be large enough to hold an image of the compromised hard disk and any evidence, log, reports you make during the investigation. However, this last hard disk is currently blank and does not contain a file system. The next step is to prepare this hard disk for you to record your investigation. Start the Linux Forensics virtual machine. Login with username root and password letmein. Once the system completely boots, start a Terminal session located on the toolbar. You will need to figure out what the device names are for the two drives you just added to your Linux system. Generally, the operating system (OS) will be on /dev/hda which is the primary channel on the first IDE cable in the computer. The secondary channel on that cable would be /dev/hdb. The primary and secondary channels on the second IDE cable would be /dev/hdc and /dev/hdd. This still all holds true for virtual disks in VMWare since VMWare does such an excellent job modeling a physical computer. fdisk is a Linux tool for listing the partition table of a device. For example, look at the partition table for the disk containing your operating system by running the command # fdisk -l /dev/hda Prepared by Regis Cassidy Sandia National Laboratories Page 3

4 Notice in the listing of fdisk that /dev/hda is followed by partition numbers. Physical information and file system information is displayed for each partition. Question 3: Use fdisk like the example above to figure out which device name is associated with the compromised drive and the blank drive. How did you conclude which is the compromised drive and which is the blank drive? You know the OS is on /dev/hda so good reason should lead you to see what is on /dev/hdb. After running fdisk -l /dev/hdb you see a partition table for a 1GB drive with two partitions; a Linux and a Linux swap. This has to be the compromised drive. In this case /dev/hdc is the CDROM drive so you should not see any partition information if there is no disk in the drive. Running fdisk -l /dev/hdd shows you a 3GB disk that contains no partition table information. This must be the blank drive. Step 5 You should now know which device name is associated with the blank drive. You need to add a primary partition and file system to that drive so you can start writing to the disk. Run fdisk to create a new partition on the blank drive. # fdisk /dev/hd(x) NOTE: Where (x) is the device letter you discovered in step 4 for the blank drive. Type m to list the menu. Type n for new partition, choose primary and partition number 1. Use default start and end cylinders. Type w to write to disk and quit. Check that there is now a partition table. # fdisk -l /dev/hd(x) Now add the Linux ext3 file system. Run the Linux command # mkfs -t ext3 /dev/hd(x)1 Once the file system has been made, you must mount the device so that you may have access to it. First create a mount point named evidence in /mnt. Prepared by Regis Cassidy Sandia National Laboratories Page 4

5 # mkdir /mnt/evidence Now mount the device. # mount /dev/hd(x)1 /mnt/evidence Try writing to the disk by creating a directory called lab1. # mkdir /mnt/evidence/lab1 Imaging a Disk Step 6 You are going to use the Linux tool Disk Dump (dd) to create a bit for bit copy of the original compromised drive. An example dd command would look like this: # dd if=source_file of=dest_file bs=8k conv=noerror,sync The arguments for dd are described as follows: if= In file. Specify the source device or file that is to be copied of= Out file. Specify the destination device or file that will contain the copy bs= Block size. Specify the size of a block of data that dd reads and writes at a time conv=noerror,sync if there is a read error, do not stop. If there is a read error the image will be synced with the original by padding the output with 0s. A larger block size will speed up the imaging process. However, if a read error occurs, then the whole block will be lost giving you an inaccurate image. When imaging, it is best to use the default block size of 512 bytes (leave bs out for the default). Create your image of the compromised drive using dd (it may take a few minutes). Be sure that you use the correct device names or you might risk corrupting data. # dd if=/dev/hd(y) of=/mnt/evidence/lab1/image.dd conv=noerror,sync NOTE: Where (y) is the device letter you discovered for the compromised drive. Question 4: Why do you NOT mount the original drive and simply copy the files? Prepared by Regis Cassidy Sandia National Laboratories Page 5

6 If you only copy files from the drive under investigation you may be missing a majority of the data on that drive. You will not be copying system information such as the partition table, boot record, and meta layer information (superblock, FAT, MFT). You also miss any of the data hidden in unallocated space and will not be able to recover deleted files. In order to make sure you have all data to analyze you must do a bit for bit copy of the original drive. Before any type of verification or analysis of this image file is done its permissions should be set to read only to avoid accidental modification. # chmod a-w /mnt/evidence/lab1/image.dd Verify Disk Image Step 7 You must verify that the image you created is an exact replica of the original. You can confirm the imaging process by comparing hashes from the original drive with the new image. You will need to save these hashes for your records. # sha1sum /dev/hd(y) > /mnt/evidence/lab1/original.sha1.txt # sha1sum /mnt/evidence/lab1/image.dd > /mnt/evidence/lab1/image.sha1.txt # cat /mnt/evidence/lab1/*sha1.txt Question 5: What are the hash values? Why should you compute the hash of the original drive only after you've created the image? The hash of both the original drive and image should match. In the rare event that the drive you are to investigate only has a very limited amout of life on it, you should make imaging first priority. If you were to take a hash of the drive first and during that process the drive goes bad, you are out of luck without any kind of backup. Prepared by Regis Cassidy Sandia National Laboratories Page 6

7 Splitting out Individual Partitions Step 8 The file image.dd is an image of an entire disk that may contain multiple partitions. In order to perform proper analysis you must be able to access these individual partitions. A version of fdisk with a few more features is sfdisk. sfdisk will allow you to look at the structure of the image file like fdisk, but can report more information such as the number of sectors in a partition. Use sfdisk to look at the partition table of the image file # sfdisk -lus /mnt/evidence/lab1/image.dd Option l lists the partition table and us reports disk structure according to sectors. You should notice two partitions. The first partition must be the root directory '/' and the second is the swap partition. Question 6: What are the beginning sector numbers and the number of sectors for the two partitions? (Note: If the rows do not properly line up with the columns, make sure you are looking at the right values). Why do you think the first partition does not begin at the first sector (sector 0)? The root partition begins at sector 32 and is sectors long. The swap partition begins at sector and is sectors long. Since this is a bootable drive the first 32 sectors have been reserved for the master boot record (MBR). The MBR contains the partition table that sfdisk reads to display the output you just saw. You are now going to learn a couple more features of the dd command. The option skip will skip over a specified number of blocks, bs in length (default 512 bytes). The option count copies a specified number of those blocks. With the information found from sfdisk you can now use dd to extract the partitions from the image. You use the default bs of 512 bytes since that is the size of a disk sector. # dd if=/mnt/evidence/lab1/image.dd of=/mnt/evidence/lab1/image.root.dd skip=x count=y conv=noerror,sync # dd if=/mnt/evidence/lab1/image.dd of=/mnt/evidence/lab1/image.swap.dd skip=w count=z Prepared by Regis Cassidy Sandia National Laboratories Page 7

8 conv=noerror,sync NOTE: Where x,y,w and z are the values you found using sfdisk. Change the permissions of these image files to read only. # chmod a-w /mnt/evidence/lab1/image.*.dd Create hashes of the two new images and append it to your other hash file. # sha1sum /mnt/evidence/lab1/image.root.dd >> /mnt/evidence/lab1/image.sha1.txt # sha1sum /mnt/evidence/lab1/image.swap.dd >> /mnt/evidence/lab1/image.sha1.txt Question 7: You should verify the above hashes with the partitions on the original drive. What steps would you take to do this? Use fdisk or sfdisk to confirm the partition device names on the original drive. # fdisk -l /dev/hdb The first root partition on the original drive is /dev/hdb1 and the swap partition is /dev/hdb2. Hash these and record them to your hash file. # sha1sum /dev/hdb1 /dev/hdb2 >> /mnt/evidence/lab1/original.sha1.txt Verify the hashes match # cat /mnt/evidence/lab1/*sha1.txt Question 8: # dd if=/dev/hdb1 of=/mnt/evidence/lab1/image.root.dd conv=noerror,sync is another possible way to have created an image of an individual partition and may even seem easier. Why might you not want to extract individual partitions in this way? As a digital forensics investigator you want to access the original drive the least amount of times as possible. The idea is to get the entire drive imaged, obtain a hash value and lock the drive up in a safe place as soon as possible. Prepared by Regis Cassidy Sandia National Laboratories Page 8

9 Mounting the Partition Images Step 9 Never mount the original drive! You want to eliminate any chance of data corruption. Therefore, you need a way to mount the image files you just created. The image dd files are obviously not normal block devices so you cannot mount them as if they were physical drives. The way you mount an image file is by using a loopback device. A loopback device allows an image to be mounted as a filesystem. This is done by the loop option in the mount command. Create a mount point for the compromised root partition. # mkdir /mnt/hacked You need to mount your images as read only. You must be able to gather evidence and later prove that you have not made any writes to the image. This will help eliminate accusations that evidence was planted, tampered with or destroyed. Use the ro option in the mount command. # mount -o ro,loop /mnt/evidence/lab1/image.root.dd /mnt/hacked You should now be able to view and browse around the root directory of the compromised system. # ls /mnt/hacked Question 9: Assuming you have completed your analysis, extracting any evidence you have found, what could you now do to verify you have not made any changes to the image file? (Note: You are not actually doing any analysis in this lab). You should re-hash your image files to verify that you have not made any alterations during your evidence gathering. Unmount the compromised system and your image drive. Prepared by Regis Cassidy Sandia National Laboratories Page 9

10 # umount /mnt/hacked # umount /mnt/evidence Creating a Clone Step 10 Rather than creating a bit by bit image to a file like in the steps above, you may choose to duplicate the original drive directly to another drive. Shutdown your VMWare session. Remove the original compromised drive from your system. Be sure to remove the drive that is named Linux Hacked.vmdk. In a real world situation, once you created your images, you would want to remove the drive and store and lock it in a safe place. Add another IDE disk named Linux Forensics-clone.vmdk and make it the same size as the original drive (1GB). Reboot the system and log in as root. Use fdisk (or sfdisk) to confirm what device name you need to use before running dd. In a real world situation, it may be possible that there is data on the disk you wish to use as your clone, even if you reformat the drive. When you go to perform your investigation, you need to be assured that you will only be looking at data from the original drive under investigation. You need to sanitize the new drive removing any residing data. Writing all zeros with the special device /dev/zero to the disk is sufficient. # dd if=/dev/zero of=/dev/hd(z) bs=8k NOTE: Where (z) is the drive letter for the clone drive. Question 10: How would you now use dd to create a clone on the new drive you added? Use the image dd file you created earlier as your source file. Verify your clone is an exact copy. # mount /dev/hdd1 /mnt/evidence # dd if=/mnt/evidence/lab1/image.dd of=/dev/hdb conv=noerror,sync Compute the hash of the clone and verify it with the original. Prepared by Regis Cassidy Sandia National Laboratories Page 10

11 # sha1sum /dev/hd(z) > /mnt/evidence/lab1/clone.sha1.txt # cat /mnt/evidence/lab1/original.sha1.txt /mnt/evidence/lab1/clone.sha1.txt Question 11: Why might you want to have an actual clone of the drive versus an image file that you can mount as a loopback device? Having an actual cloned disk will allow you to boot the system under investigation and perform a live analysis. In this case the investigator will be altering the data on that cloned drive. This may be acceptable, but the investigator would still have to later prove that any evidence found during a live analysis also exists on the unmodified original drive. By booting the system some of the investigative process may be made easier, such as observing system behaviors, but is definitely not always necessary to complete an investigation. Step 11 It is very important to do these next steps so that the lab is properly set up for the person who uses the computer after you. Unmount any drives you mounted and shutdown the VMWare system. In VMWare, revert 'Linux - Forensics' back to the snapshot by clicking the 'Revert' button. From the c:\vmware-images\linux - Forensics\ directory remove all files beginning with 'Linux Hacked ', 'Linux - Forensics-Clone' and 'Linux Forensics-Image'. Question 12: What are your comments and suggestions for this lab? Prepared by Regis Cassidy Sandia National Laboratories Page 11

Lab III: Unix File Recovery Data Unit Level

Lab III: Unix File Recovery Data Unit Level New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the

More information

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can

More information

Lab V: File Recovery: Data Layer Revisited

Lab V: File Recovery: Data Layer Revisited New Mexico Tech Digital Forensics Fall 2006 Lab V: File Recovery: Data Layer Revisited Objectives - Perform searches based on file headers - Data Carving with Foremost - Zip password recovery Procedures

More information

BackTrack Hard Drive Installation

BackTrack Hard Drive Installation BackTrack Hard Drive Installation BackTrack Development Team jabra [at] remote-exploit [dot] org Installing Backtrack to a USB Stick or Hard Drive 1 Table of Contents BackTrack Hard Drive Installation...3

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

Creating a Cray System Management Workstation (SMW) Bootable Backup Drive

Creating a Cray System Management Workstation (SMW) Bootable Backup Drive Creating a Cray System Management Workstation (SMW) Bootable Backup Drive This technical note provides the procedures to create a System Management Workstation (SMW) bootable backup drive. The purpose

More information

Installing a Second Operating System

Installing a Second Operating System Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems

More information

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

USB Bare Metal Restore: Getting Started

USB Bare Metal Restore: Getting Started USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs

More information

Capturing a Forensic Image. By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013

Capturing a Forensic Image. By Justin C. Klein Keane <jukeane@sas.upenn.edu> 12 February, 2013 Capturing a Forensic Image By Justin C. Klein Keane 12 February, 2013 Before you Begin The first step in capturing a forensic image is making an initial determination as to the

More information

Recovering Data from Windows Systems by Using Linux

Recovering Data from Windows Systems by Using Linux Recovering Data from Windows Systems by Using Linux Published by the Open Source Software at Microsoft, May 27 Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab Most

More information

Partitioning and Formatting Reference Guide

Partitioning and Formatting Reference Guide Partitioning and Formatting Reference Guide This guide provides simple guidelines for the initial setup of your hard disk drive using the most common methods and utilities available within the following

More information

Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015)

Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Access CloudStack web interface via: Internal access links: http://cloudstack.doc.ic.ac.uk

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics

Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over

More information

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not

More information

Getting Started with Paragon Recovery CD. Quick Guide

Getting Started with Paragon Recovery CD. Quick Guide Getting Started with Paragon Recovery CD Quick Guide Paragon Recovery CD 2 Quick Guide CONTENTS 1 Introduction... 3 2 Distribution...3 2.1 Distributive CD...3 2.2 Online Distribution...3 3 Booting from

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6 July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...

More information

Digital Evidence Search Kit

Digital Evidence Search Kit Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University

More information

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1 File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New

More information

Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system.

Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system. Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) All commands run from terminal as super user. Default CentOS 6.3 installation with two hard drives, /dev/sda

More information

How to Backup XenServer VM with VirtualIQ

How to Backup XenServer VM with VirtualIQ How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes

More information

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR

winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation

More information

USB FLASH DRIVE. User s Manual. USB 2.0 Compliant. Version A10. - 1 - Version A10

USB FLASH DRIVE. User s Manual. USB 2.0 Compliant. Version A10. - 1 - Version A10 USB FLASH DRIVE User s Manual USB 2.0 Compliant Version A10-1 - Version A10 Introduction Thank you for purchasing the USB FLASH DRIVE device. The manual explains how to use the USB FLASH DRIVE software

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

How to partition your disk with the parted magic linux livecd

How to partition your disk with the parted magic linux livecd How to partition your disk with the parted magic linux livecd Disclaimer: If you do not understand the concept of partitioning or do not know what you are doing then please stay away from any partitioning

More information

Fiery Clone Tool For Embedded Servers User Guide

Fiery Clone Tool For Embedded Servers User Guide Fiery Clone Tool For Embedded Servers User Guide Fiery Clone Tool allows you to clone image files to a folder on a USB flash drive connected to the Fiery server. You can restore the image file to the Fiery

More information

Driver Upgrade Instructions

Driver Upgrade Instructions Driver Upgrade Instructions Table of Content Installing updated drivers in Microsoft Windows 2 Uninstall Procedure 2 Uninstall Procedure for Windows 7 3 Install Procedure 4 Installing updated drivers in

More information

Job Aid: Replacing the Hard Drive on the Avaya S8710 Media Servers R2.2 or Later

Job Aid: Replacing the Hard Drive on the Avaya S8710 Media Servers R2.2 or Later Job Aid: Replacing the Hard Drive on the Avaya S8710 Media Servers R2.2 or Later This job aid describes the steps required to replace the hard drive on an Avaya S8710 Media Servers running Release 2.2

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

Using VMware Workstation

Using VMware Workstation VMware Workstation 10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Dual-boot Windows 10 alongside Windows 8

Dual-boot Windows 10 alongside Windows 8 Most of the people are very much interested to install the newly launched Operating System Windows 10 on their devices. But, it is not recommended to directly use Windows 10 as the primary OS because it

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

NovaBACKUP. User Manual. NovaStor / May 2014

NovaBACKUP. User Manual. NovaStor / May 2014 NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Chapter 5. Backing Up and Restoring TiVo Data

Chapter 5. Backing Up and Restoring TiVo Data Chapter 5 Backing Up and Restoring TiVo Data Y our TiVo is both a computer system and a home entertainment appliance, and should therefore be backed up at various times. Like any other computer system,

More information

Maintaining the Content Server

Maintaining the Content Server CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down

More information

Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0

Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0 Technical Note Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0 This technical note describes the process for migrating an existing Windows PC to run as a virtual machine with VMware Fusion

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

ECT362 Installing Linux Virtual Machine in KL322

ECT362 Installing Linux Virtual Machine in KL322 ECT362 Installing Linux Virtual Machine in KL322 The steps below outline how to install Linux under Windows as a virtual machine. This install uses the Ubuntu 10.04 distribution of Linux along with the

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

Operating System Installation Guidelines

Operating System Installation Guidelines Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document

More information

2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16

2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Recovering Data from Windows Systems by Using Linux

Recovering Data from Windows Systems by Using Linux Recovering Data from Windows Systems by Using Linux Published by the Open Source Software Lab at Microsoft. November 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software

More information

How you configure Iscsi target using starwind free Nas software & configure Iscsi initiator on Oracle Linux 6.4

How you configure Iscsi target using starwind free Nas software & configure Iscsi initiator on Oracle Linux 6.4 How you configure Iscsi target using starwind free Nas software & configure Iscsi initiator on Oracle Linux 6.4 Download the software from http://www.starwindsoftware.com/ Click on products then under

More information

StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection

StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright

More information

Computer Forensics using Open Source Tools

Computer Forensics using Open Source Tools Computer Forensics using Open Source Tools COMP 5350/6350 Digital Forensics Professor: Dr. Anthony Skjellum TA: Ananya Ravipati Presenter: Rodrigo Sardinas Overview Use case explanation Useful Linux Commands

More information

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux NOTE: If you need more information regarding the installation process for other distributions

More information

Getting Started User s Guide

Getting Started User s Guide Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,

More information

Active@ Password Changer for DOS User Guide

Active@ Password Changer for DOS User Guide Active@ Password Changer for DOS User Guide 1 Active@ Password Changer Guide Copyright 1999-2014, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form

More information

Technical Note TN_146. Creating Android Images for Application Development

Technical Note TN_146. Creating Android Images for Application Development TN_146 Creating Android Images for Application Development Issue Date: 2013-01-28 This document shows how to build and install the Android Operating System on the BeagleBoard xm Use of FTDI devices in

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

Abstract. Microsoft Corporation Published: August 2009

Abstract. Microsoft Corporation Published: August 2009 Linux Integration Components Version 2 for Hyper-V (Windows Server 2008, Windows Server 2008 R2, Microsoft Hyper-V Server 2008, and Microsoft Hyper-V Server 2008 R2) Readme Microsoft Corporation Published:

More information

Navigating the Rescue Mode for Linux

Navigating the Rescue Mode for Linux Navigating the Rescue Mode for Linux SUPPORT GUIDE DEDICATED SERVERS ABOUT THIS GUIDE This document will take you through the process of booting your Linux server into rescue mode to identify and fix the

More information

Linux + Windows 95 mini HOWTO

Linux + Windows 95 mini HOWTO Linux + Windows 95 mini HOWTO Jonathon Katz jkatz@cpio.net Joy Yokley Converted document from HTML to DocBook 4.1 (SGML) 2001 03 01 Revision History Revision 1.1.1 2001 04 19 Revised by: DCM Corrected

More information

Virtual Dashboard for VMware and Hyper-V

Virtual Dashboard for VMware and Hyper-V Virtual Dashboard for VMware and Hyper-V USER MANUAL Steelgate Technologies, February 2015, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

Preparing a SQL Server for EmpowerID installation

Preparing a SQL Server for EmpowerID installation Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search

More information

Introduction. IMF Conference September 2008

Introduction. IMF Conference September 2008 Live Forensic Acquisition as Alternative to Traditional Forensic Processes Marthie Lessing* Basie von Solms Introduction The Internet and technology developments introduced a sharp increase in computer

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

CLICK HERE TO ACCESS AN UP-TO-DATE ONLINE VERSION

CLICK HERE TO ACCESS AN UP-TO-DATE ONLINE VERSION CLOUDBOX USER MANUAL CLICK HERE TO ACCESS AN UP-TO-DATE ONLINE VERSION of this document. Online User Manuals feature easy navigation, expandable illustrations, and search capability. 1 INTRODUCTION The

More information

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...

More information

In order to upload a VM you need to have a VM image in one of the following formats:

In order to upload a VM you need to have a VM image in one of the following formats: What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.

More information

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By:

Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer. By: Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect's Computer By: Senior Special Agent Ernest Baca United States Customs Service Office of Investigations Resident Agent in

More information

RAID installation guide for Silicon Image SiI3114

RAID installation guide for Silicon Image SiI3114 RAID installation guide for Silicon Image SiI3114 Contents Contents 2 1 Introduction 4 1.1 About this Guide 4 1.2 The Basics 4 1.2.1 What is RAID? 4 1.2.2 Advantages of RAID 4 1.2.3 Disadvantages of RAID

More information

Intro to Virtualization

Intro to Virtualization Intro to Virtualization Preprepared by Phil Grimes Coach / Mentor - Security Consultant Small changes & Additions by Dr. Enis Karaarslan, 2014 What is a Virtual Machine? Computer within a computer It's

More information

User Guide. Version 3.0

User Guide. Version 3.0 Kaseya Backup and Disaster Recovery User Guide Version 3.0 October 12, 2009 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Acronis Disk Director 11 Home. User's Guide

Acronis Disk Director 11 Home. User's Guide Acronis Disk Director 11 Home User's Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone", Acronis

More information

CA /BrightStor ARCserve9 Backup Software

CA /BrightStor ARCserve9 Backup Software CA /BrightStor ARCserve9 Backup Software The CA BrightStor ARCserve9 Backup program can be installed on the TANDBERG NAS and launched from a browser. You can use this software to manage either an autoloader

More information

INF-110. GPFS Installation

INF-110. GPFS Installation INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity

More information

Incident Response and Computer Forensics

Incident Response and Computer Forensics Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident

More information

WES 9.2 DRIVE CONFIGURATION WORKSHEET

WES 9.2 DRIVE CONFIGURATION WORKSHEET WES 9.2 DRIVE CONFIGURATION WORKSHEET This packet will provide you with a paper medium external to your WES box to write down the device names, partitions, and mount points within your machine. You may

More information

NovaBACKUP Virtual Dashboard

NovaBACKUP Virtual Dashboard NovaBACKUP Virtual Dashboard User Manual NovaStor / April 2015 2015 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Unix/Linux Forensics 1

Unix/Linux Forensics 1 Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,

More information

USB 2.0 Flash Drive User Manual

USB 2.0 Flash Drive User Manual USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6

More information

SmartFiler Backup Appliance User Guide 2.0

SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7

More information

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iscsi SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloudbased

More information

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)

Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+) Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA)

VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA) VMware@SoftLayer Cookbook Backup, Recovery, Archival (BURA) IBM Global Technology Services: Khoa Huynh (khoa@us.ibm.com) Daniel De Araujo (ddearaujo@us.ibm.com) Bob Kellenberger (kellenbe@us.ibm.com) 1

More information

SAMBA SERVER (PDC) Samba is comprised of a suite of RPMs that come on the RHEL/Fedora CDs. The files are named:

SAMBA SERVER (PDC) Samba is comprised of a suite of RPMs that come on the RHEL/Fedora CDs. The files are named: SAMBA SERVER (PDC) INTRODUCTION Samba is a suite of utilities that allows your Linux box to share files and other resources, such as printers, with Windows boxes. This lesson describes how you can make

More information

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Created by Simon Monk Last updated on 2015-11-25 11:50:13 PM EST Guide Contents Guide Contents Overview You Will Need Downloading

More information

USB. 16MB~2GB JetFlash. User s Manual

USB. 16MB~2GB JetFlash. User s Manual USB 16MB~2GB JetFlash User s Manual Introduction Table of Contents Package Contents...1 Features...1 System Requirements...2 Before Use...2 Driver Installation Driver Installation for Windows 98/98SE...3

More information

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec Intelligent disaster recovery Dell DL backup to Disk Appliance powered by Symantec The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

Time Stamp. Instruction Booklet

Time Stamp. Instruction Booklet Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used

More information

These application notes are intended to be a guide to implement features or extend the features of the Elastix IP PBX system.

These application notes are intended to be a guide to implement features or extend the features of the Elastix IP PBX system. Elastix Application Note #201201091: Elastix RAID Setup Step By Step Including Recovery Title Elastix Raid Setup Step By Step Including Recovery Author Bob Fryer Date Document Written 9 th January 2012

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

Reviewer s Guide. EaseUS Backup Solution. EaseUS Todo Backup Reviewer s Guide 1. Contents Introduction... 2. Chapter 1...3

Reviewer s Guide. EaseUS Backup Solution. EaseUS Todo Backup Reviewer s Guide 1. Contents Introduction... 2. Chapter 1...3 EaseUS Todo Backup Reviewer s Guide Reviewer s Guide Contents Introduction... 2 Chapter 1...3 What is EaseUS Todo Backup?...3 Versions Comparison... 4 Chapter 2...7 Using EaseUS Todo Backup...7 Backup...7

More information

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities

More information

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference Acronis Backup & Recovery 10 Server for Linux Command Line Reference Table of contents 1 Console mode in Linux...3 1.1 Backup, restore and other operations (trueimagecmd)... 3 1.1.1 Supported commands...

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

Procedure to Create and Duplicate Master LiveUSB Stick

Procedure to Create and Duplicate Master LiveUSB Stick Procedure to Create and Duplicate Master LiveUSB Stick A. Creating a Master LiveUSB stick using 64 GB USB Flash Drive 1. Formatting USB stick having Linux partition (skip this step if you are using a new

More information

User Manual. 2 Bay Docking Station

User Manual. 2 Bay Docking Station FANTEC MR-CopyDU3 User Manual 2 Bay Docking Station With One Touch Backup (OTB) and Copy Function Hardware: PC and Notebooks, Macintosh USB 1.1, USB 2.0 or USB 3.0 interface Features: 2,5 or 3,5 SATA I,II,III

More information

USER MANUAL DataLocker Enterprise

USER MANUAL DataLocker Enterprise USER MANUAL DataLocker Enterprise ------------------------ March 2014 ------------------------ 1 Contents At a Glance Advanced 3 Introduction 17 Special features 5 About the Enterprise 19 Master admin

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

NetVault : Backup. User s Guide for the VaultDR System Plugins

NetVault : Backup. User s Guide for the VaultDR System Plugins NetVault : Backup User s Guide for the VaultDR System Plugins VaultDR Offline Plugin ver. 5.6 (VaultOS) VaultDR Online Plugin for Windows ver. 3.5 VaultDR Online Plugin for Linux ver. 3.1 VaultDR Server

More information

Red Hat Linux 7.2 Installation Guide

Red Hat Linux 7.2 Installation Guide Red Hat Linux 7.2 Installation Guide Ryan Spangler spanglerrp22@uww.edu http://ceut.uww.edu April 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002

More information

Backing up AIR to Microsoft Windows

Backing up AIR to Microsoft Windows Backing up AIR to Microsoft Windows Dear Valued Customer, Avaya realizes the importance of your data and the significance of a backup and restore strategy for this data. To assist you in performing a backup

More information