Computer forensic science
|
|
- Janis Griffin
- 8 years ago
- Views:
Transcription
1 Computer forensic science This drive has been victimized! Mallory 1
2 CS78 students must help! CS78 students What happened?! Every student gets a copy 2
3 Forensic science it s detective work Computer forensic science 3
4 Not enough drives for everybody would you accept a (large) file? dd if=drive of=file drive.image This week s s exercise shared with us by UCLA professors Peter A. H. Peterson and Peter Reiher (for which, thanks!) they had a corrupted/hacked/victimized drive they dd ed it to a file they named that file act2.img every student gets a copy 4
5 (a) Disks, partitions, filesystems,and files (b) a virgin hard disk (maybe by Western Digital) (d) an MBR written (maybe by grub; partition table inside) (c) a filesystem written (maybe by mkfs, in the partition) (e) a partition defined (maybe by fdisk; in the MBR) files created (maybe by vi, in the filesystem) (a) /dev/hda Naming of disks and partitions: as if devices ( /dev/ ) (b) disk (d) MBR (c) /dev/hda /dev/hda1 filesystem (e) partition files 5
6 Q. how can you use your files? A. mount their containing filesystem into a hierarchical file tree / mountpoint What does mount mount? mount mounts filesytesms mount does not mount anything else not disks not partitions not files give mount the name of the filesystem to mount but filesystems don t have their own names! so instead we give mount the name of a partition that contains the filesystem to mount 6
7 Q. how can you mount a filesystem? A. by referencing its containing partition mount /dev/hda1 /mountpoint /dev/hda1 little disk Copy/dd whole partition into a file partition copy lacks a device name to mount by give it one with losetup big disk File boundaries are dark blue rectangles File contents are rectangles interiors 7
8 Copy/dd whole disk into a file (on a bigger disk) little disk disk copy lacks a device name give it one with losetup big disk File boundaries are dark blue rectangles File contents are rectangles interiors Obtaining your disk using losetup and mount associate /dev/loop0 with data now de-associate associate with other data Loop device boundaries are red rectangles Loop device contents are rectangles interiors on DETER ~ is persistent while associated, treat /dev/loop0 as if a device, holding the loop-associated data as the device s content First, fdisk worked with /dev/loop0 because the data associated with it was that of a disk, and fdisk works with disks Later, mount worked with /dev/loop0 when the data associated with it was that of a filesystem, and mount works with filesystems 8
9 Distinguish among machines 3 computers workbench.cfs.usccsci530.isi.deterlab.net (yours) users.isi.deterlab.net (holds export-mounted parts of your filesystem) the one whose corrupted disk we re analyzing pathnames are confusing don t look at the logs in /var/log for example look at those in ~/sda1/var/log Software tools Peterson & Reiher s instructions document numerous commands as potential tools I found these particularly useful/essential sudo history e2undel strings; xxd and hexedit 9
10 sudo use liberally you can t sudo s config file but root can Everybody can do everything as root provided they do it through sudo history use cat not history command Must be some sensitive data in here 10
11 e2undel recover to a persistent place OK on mounted image, no need to umount try the different time periods when deletions may have occurred Chose something to recover Then look at it Binary file contents strings, xxd strings extracts just ascii portions xxd and hexedit show each byte twice, as both hex and ascii symbol (if any,. otherwise) 11
12 scp secure remote file copy no files start with pass on aludra we have one locally scp puts one there and now there it is System log files start here 12
13 The assignment write a report it was 13
Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationNavigating the Rescue Mode for Linux
Navigating the Rescue Mode for Linux SUPPORT GUIDE DEDICATED SERVERS ABOUT THIS GUIDE This document will take you through the process of booting your Linux server into rescue mode to identify and fix the
More informationBackup policies. Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical
Backup policies Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical This is the bottom line The EGTDC cannot be held responsible for loss of data
More informationUsing Encrypted File Systems with Caché 5.0
Using Encrypted File Systems with Caché 5.0 Version 5.0.17 30 June 2005 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Using Encrypted File Systems with Caché 5.0 InterSystems
More informationLab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
More informationRestoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02
Cristie Bare Machine Recovery Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02 This documentation shows how to restore or migrate a Linux system on dissimilar
More informationOracle VM Server Recovery Guide. Version 8.2
Oracle VM Server Recovery Guide Version 8.2 Oracle VM Server for x86 Recovery Guide The purpose of this document is to provide the steps necessary to perform system recovery of an Oracle VM Server for
More informationBtrfs and Rollback How It Works and How to Avoid Pitfalls
Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server kukuk@suse.com rm -rf /? I will be discussing what is needed for rollback: Btrfs /
More informationRed Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
More informationThe Linux CryptoAPI A User s Perspective
The Linux CryptoAPI A User s Perspective David Bryson May 31, 2002 Abstract Today we are going to talk about using strong cryptography inside Linux. With currently available kernel patches discussed in
More informationRecovering Data from Windows Systems by Using Linux
Recovering Data from Windows Systems by Using Linux Published by the Open Source Software Lab at Microsoft. November 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software
More informationUNIX - FILE SYSTEM BASICS
http://www.tutorialspoint.com/unix/unix-file-system.htm UNIX - FILE SYSTEM BASICS Copyright tutorialspoint.com A file system is a logical collection of files on a partition or disk. A partition is a container
More informationHTTP-FUSE PS3 Linux: an internet boot framework with kboot
HTTP-FUSE PS3 Linux: an internet boot framework with kboot http://openlab.jp/oscirclar/ Kuniyasu Suzaki and Toshiki Yagi National Institute of Advanced Industrial Science and Technology Embedded Linux
More informationInstalling Debian with SATA based RAID
Installing Debian with SATA based RAID Now for 2.6 kernel version I've read that there will soon be an installer that will do raid installs and perhaps even support SATA, but today it is manual. My install
More informationUSB Bare Metal Restore: Getting Started
USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs
More informationLinux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery
Linux Overview Written by: Josh Lowery The Senator Patrick Leahy Center for Digital Investigation Champlain College October 29, 2012 Disclaimer: This document contains information based on research that
More informationSophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
More informationRecovering Data from Windows Systems by Using Linux
Recovering Data from Windows Systems by Using Linux Published by the Open Source Software at Microsoft, May 27 Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab Most
More informationAdvanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data
More informationLinux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
More informationCryptographic Filesystems. Background and Implementations for Linux and OpenBSD
Cryptographic Filesystems Background and Implementations for Linux and OpenBSD Background Loop device primer Keys, cipher modes, salting, key hashing Journaling file systems and encrypted swap Offset,
More informationCreating a Cray System Management Workstation (SMW) Bootable Backup Drive
Creating a Cray System Management Workstation (SMW) Bootable Backup Drive This technical note provides the procedures to create a System Management Workstation (SMW) bootable backup drive. The purpose
More informationEncryption Security Recommendations
Basic Concepts Sensitive data should be encrypted while in transit and stored. All communication between clients and servers, and between servers (Web server to app server, app server to database server,
More informationATT8231: Creating a Customized USB Thumb Drive for ZCM Imaging Methods for creating a customized bootable USB Thumb Drive
ATT8231: Creating a Customized USB Thumb Drive for ZCM Imaging Methods for creating a customized bootable USB Thumb Drive Rich Hanley Senior ATT Engineer rhanley@novell.com Objectives Understanding ZCM
More informationA Crash Course in OS X D. Riley and M. Allen
Objectives A Crash Course in OS X D. Riley and M. Allen To learn some of the basics of the OS X operating system - including the use of the login panel, system menus, the file browser, the desktop, and
More informationThe Linux System. o Updating without touching the user's files and configurations.
Backups In Linux The Linux System Many Linux distros set up seperate "/home" and "/" (root) partitions. User configuration files are hidden with a "." (period) in the front of the name. Separate partitions
More informationRecover Data Like a Forensics Expert Using an Ubuntu Live CD
Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We
More informationTwo Parts. Filesystem Interface. Filesystem design. Interface the user sees. Implementing the interface
File Management Two Parts Filesystem Interface Interface the user sees Organization of the files as seen by the user Operations defined on files Properties that can be read/modified Filesystem design Implementing
More informationSystem administration basics
Embedded Linux Training System administration basics Michael Opdenacker Thomas Petazzoni Free Electrons Copyright 2009, Free Electrons. Creative Commons BY SA 3.0 license Latest update: Dec 20, 2010, Document
More informationVMDK Has Left the Building
VMDK Has Left the Building Attacking Cloud Infrastructures by Malicious VMDK Files Matthias Luft, Daniel Mende, Enno Rey, Pascal Turbing {mluft,dmende,erey,pturbing}@ernw.de 5/25/2012 ERNW GmbH Carl-Bosch-Str.
More informationAdd Disk Space to a VM when a Partition is Full
Add Disk Sace to a VM when a Partition is Full Document ID: 119025 Contributed by Mike Dooley, Cisco TAC Engineer. Jun 29, 2015 Contents Introduction Background Information Procedure Section 1 Determine
More informationLinux System Administration
System Backup Strategies Objective At the conclusion of this module, the student will be able to: describe the necessity for creating a backup regimen describe the advantages and disadvantages of the most
More informationAcronis Backup & Recovery 10 Server for Linux. Command Line Reference
Acronis Backup & Recovery 10 Server for Linux Command Line Reference Table of contents 1 Console mode in Linux...3 1.1 Backup, restore and other operations (trueimagecmd)... 3 1.1.1 Supported commands...
More informationTechnical Note TN_146. Creating Android Images for Application Development
TN_146 Creating Android Images for Application Development Issue Date: 2013-01-28 This document shows how to build and install the Android Operating System on the BeagleBoard xm Use of FTDI devices in
More informationEncrypted Root Filesystem HOWTO
Encrypted Root Filesystem HOWTO Christophe Devine Revision History Revision v1.3 2005 03 13 Revised by: cd Updated the packages version. Revision v1.2 2004 10 20 Revised by: cd Updated the packages version.
More informationSophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2015 Contents 1 About this guide...5 2 About Sophos Anti-Virus for Linux...6 2.1 What Sophos Anti-Virus does...6
More informationBackTrack Hard Drive Installation
BackTrack Hard Drive Installation BackTrack Development Team jabra [at] remote-exploit [dot] org Installing Backtrack to a USB Stick or Hard Drive 1 Table of Contents BackTrack Hard Drive Installation...3
More informationINF-110. GPFS Installation
INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity
More informationFileBench's Multi-Client feature
FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network
More informationInstalling MooseFS Step by Step Tutorial
Installing MooseFS Step by Step Tutorial Michał Borychowski MooseFS Support Manager contact@moosefs.org march 2010 Gemius SA Overview... 3 MooseFS install process on dedicated machines... 3 Master server
More informationA candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
More informationChapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
More informationUser Manual for Data Backups
User Manual for Data Backups 1 Accepted formats are: EXT3, EXT4, NTFS, FAT32 and HFS+ (Mac OS). Recommended format: EXT3 and EXT4 Mac OS formatted disks will work only on workstations 4 and 7. Keep in
More informationComparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology
Comparing and Contrasting Windows and Linux Forensics Zlatko Jovanovic International Academy of Design and Technology Abstract Windows and Linux are the most common operating systems used on personal computers.
More informationComputer Forensics using Open Source Tools
Computer Forensics using Open Source Tools COMP 5350/6350 Digital Forensics Professor: Dr. Anthony Skjellum TA: Ananya Ravipati Presenter: Rodrigo Sardinas Overview Use case explanation Useful Linux Commands
More informationPlanning for an Amanda Disaster Recovery System
Planning for an Amanda Disaster Recovery System Bernd Harmsen bjh@datasysteme.de www.datasysteme.de 22nd April 2003 Contents 1 Introduction 1 1.1 Why we need a specialized Amanda Disaster Recovery System?..............
More informationInstalling a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
More informationUNIX Computer Forensics
Honeynet2_book.fm Page 347 Thursday, April 29, 2004 11:09 AM 12 UNIX Computer Forensics Brian Carrier In the last chapter, we discussed the basics of computer forensics. In this chapter, we discuss the
More informationLSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
More informationLinux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
More informationEncrypting Your Files. Because nobody else will And would you trust them if they did?
Encrypting Your Files Because nobody else will And would you trust them if they did? Why? Sensitive personal information NSA Identity thieves Linux Disk Encryption Dm-crypt is default under Linux Full
More informationLinux Embedded devices with PicoDebian Martin Noha 28.9.2006
Embedded systems Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 24.03.2005 1 Agenda Why did I look in this stuff? What is an embedded device? Characteristic hardware global requirements for
More informationLinux + Windows 95 mini HOWTO
Linux + Windows 95 mini HOWTO Jonathon Katz jkatz@cpio.net Joy Yokley Converted document from HTML to DocBook 4.1 (SGML) 2001 03 01 Revision History Revision 1.1.1 2001 04 19 Revised by: DCM Corrected
More informationDefining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
More informationReplacing a Laptop Hard Disk On Linux. Khalid Baheyeldin http://2bits.com. KWLUG, September 2015
Replacing a Laptop Hard Disk On Linux Khalid Baheyeldin http://2bits.com KWLUG, September 2015 About Khalid 30 years in software development and software consulting First computer: Sinclair ZX Spectrum
More informationOn Disk Encryption with Red Hat Enterprise Linux
On Disk Encryption with Red Hat Enterprise Linux Author: Contact: Copyright: URL: Bowe Strickland, Curriculum Manager bowe@redhat.com Copyright 2011, Red Hat, Inc. All rights reserved. http://people.redhat.com/~bowe/summit/2011/tot/on_disk_encryption
More informationRed Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
More informationDetermining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
More informationSophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2014 Contents 1 About this guide...8 2 About Sophos Anti-Virus for Linux...9 2.1 What Sophos Anti-Virus does...9
More informationTestDisk Step By Step CGSecurity
This Recovery example guides you through TestDisk step by step to recover a missing partition and repair a corrupted one. Translation of this TestDisk manual to other languages are welcome. Example Problem
More informationCreating a Domain Tree
156 Chapter 4 Installing and Managing Trees and Forests Using the Active Directory Installation Wizard, you can quickly and easily create new domains by promoting a Windows Server 2008 stand-alone server
More informationFrom Hypervisors to Clouds
From Hypervisors to Clouds or: How Traditional Security Controls Fail Matthias Luft mluft@ernw.de Who we are Old-school network geeks, working as security researchers for Germany based ERNW GmbH - Independent
More informationACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationForensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
More informationCloud Storage Quick Start Guide
Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.
More informationDCS-COMPASS project backup procedure C.Q. 29/08/03
DCS-COMPASS project backup procedure C.Q. 29/08/03 The DCS project consists of several parts: the PVSS panels, the PVSS database (containing the datapoint elements and their configuration) and the events
More informationOracle Cloud Storage and File system
2012 Tieto Corporation Oracle Cloud Storage and File system Andrejs Karpovs Oracle Apps DBA Tieto, andrejs.karpovs@tieto.com Few notes about me I Am a DBA Work in Tieto Have 4 years exprerience working
More informationIntroduction to The Sleuth Kit (TSK) By Chris Marko. Rev1 September, 2005. Introduction to The Sleuth Kit (TSK) 1
Introduction to The Sleuth Kit (TSK) By Chris Marko Rev1 September, 2005 Introduction to The Sleuth Kit (TSK) 1 This paper provides an introduction to The Sleuth Kit (referred to as TSK herein), from Brian
More informationEXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
More informationPerforming Administrative Tasks
This chapter describes how to perform administrative tasks using Cisco CMX. Users who are assigned administration privileges can perform administrative tasks. Cisco CMX User Accounts, page 1 Backing Up
More informationBacking Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
More informationThe BackTrack Successor
SCENARIOS Kali Linux The BackTrack Successor On March 13, Kali, a complete rebuild of BackTrack Linux, has been released. It has been constructed on Debian and is FHS (Filesystem Hierarchy Standard) complaint.
More informationwinhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
More informationRAID Software Suite for Linux
RAID Software Suite for Linux Installation Guide Rev 1.001 June 2000 Order Number: 273377-001 Information in this document is provided in connection with Intel products. No license, express or implied,
More informationMonitoring disk stats with Cacti
Monitoring disk stats with Cacti February 13, 2013 Contents 1 Disk space utilisation 1 1.1 hrstoragetable (.1.3.6.1.2.1.25.2.3)................. 2 1.2 dsktable (.1.3.6.1.4.1.2021.9)....................
More informationSecureDoc Linux 4.91-3, February 2010 Copyright 1997-2010 by WinMagic Inc.
SecureDoc Linux 4.91-3, February 2010 Copyright 1997-2010 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada
More information======================================================= Tools to wipe out unwanted data: =======================================================
WIKIPEDIA ON LINUX ENCRYPTION http://en.wikipedia.org/wiki/encryption_on_linux Tools to wipe out unwanted data: Darik's Boot and Nuke: http://dban.sourceforge.net/ Thomas Greene's Linux Wipe Tools: http://basicsec.org/tools.html
More informationINSTALL ZENTYAL SERVER
GUIDE FOR Zentyal Server is a small business server based on Ubuntu s LTS server version 10.04 and the ebox platform. It also has the LXDE desktop installed with Firefox web browser and PCMAN File manager.
More informationRECOVER IT ALL NOW. User Manual. Version 1.0
RECOVER IT ALL NOW User Manual Version 1.0 Recover It All Now Ver. 1.0 is a comprehensive data recovery utility that offers a quick and easy solution to catastrophic data loss. RIA Now is a Windows based
More informationw1r3 Network Documentation
w1r3 Network Documentation Release 1.0 w1r3 Network June 08, 2014 Contents 1 Infrastructure 3 1.1 Team orientation............................................. 3 1.2 Accounts.................................................
More informationYocto Project Eclipse plug-in and Developer Tools Hands-on Lab
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in
More informationLVM2 data recovery. Milan Brož mbroz@redhat.com. LinuxAlt 2009, Brno
LVM2 data recovery Milan Brož mbroz@redhat.com LinuxAlt 2009, Brno Linux IO storage stack [ VFS ] filesystem [ volumes ] MD / LVM / LUKS / MPATH... [ partitions ] legacy partition table recovery from the
More informationUSB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
More informationMicrosoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
More information5 HDFS - Hadoop Distributed System
5 HDFS - Hadoop Distributed System 5.1 Definition and Remarks HDFS is a file system designed for storing very large files with streaming data access patterns running on clusters of commoditive hardware.
More informationNetworks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
More informationCreating a Disk Drive For Linux
Storage Presenter:! Robert Wang Linux s Abstraction (vfs) (file systems) (physical devices) Storage Device Disk Drive Multiple Drives RAID! Redundant Array of Independent/Inexpensive Disks! Software or
More informationProcedure to convert Intel Dot.Station 2300 into a LINUX Red Hat 8.0 box. Document Version: 1.1 Author: Javier Castilla (latas) Release: 1
Procedure to convert Intel Dot.Station 2300 into a LINUX Red Hat 8.0 box. Document Version: 1.1 Author: Javier Castilla (latas) Release: 1 INDICE 1. Antes de Empezar... 3 1.1. Por qué Red Hat 8.0?... 3
More informationHow to Restore a Linux Server Using Bare Metal Restore
How to Restore a Linux Server Using Bare Metal Restore This article refers to firmware version 5.4 and higher, and the Barracuda Linux Backup Agent 5.4 and higher. Use the steps in this article to restore
More informationLucidNAS Quick Start Guide
LucidNAS Quick Start Guide This section demonstrates the initial preparation that should be performed before you start using the LucidNAS system. Set Administrative Access By default, no password is required
More informationComputer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
More informationMoving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
More informationHARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
More informationCS615 - Aspects of System Administration
CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Backup and Disaster Recovery Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens-tech.edu
More informationSystem Administration and your Bio-Linux Machine
System Administration and your Bio-Linux Machine System Administration and your Bio-Linux Machine...1 System Administration and your Bio-Linux Machine...2 The bare minimum of Bio-Linux system administration...
More informationBack Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
More informationDigital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
More informationTELE 301 Lecture 7: Linux/Unix file
Overview Last Lecture Scripting This Lecture Linux/Unix file system Next Lecture System installation Sources Installation and Getting Started Guide Linux System Administrators Guide Chapter 6 in Principles
More informationSystem Administration
Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics
More information