IN this paper we examine the application of the virtual
|
|
|
- Kellie Green
- 10 years ago
- Views:
Transcription
1 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE Analysis of USB Flash Drives in a Virtual Environment Derek Bem and Ewa Huebner Abstract This paper is a continuation of our previous work [1] in which we proposed an approach where two environments, conventional and virtual, are used independently in the forensic analysis of computer systems. We discuss the use of virtual environments in the analysis of USB flash drives in computer forensics investigations. After briefly introducing general concepts of a virtual environment and software tools we show how this approach can be successfully used in the analysis phase of the computer forensics investigation of portable USB flash drives. We also show why virtualisation technique can complement but not completely replace conventional methods of computer evidence analysis. Index Terms Computer Forensics, Virtual Machine, computer evidence, USB drive. I. INTRODUCTION IN this paper we examine the application of the virtual environment in the analysis phase of a computer forensics investigation of USB flash drives. The commercial product VMWare [2] is used to illustrate the strengths and weaknesses of a virtual environment methodology. The environment created by VMWare is considerably different from the original computer system acquired during the process of forensics investigations; analysis of the evidence using VMWare by itself is likely to taint the evidence and make it inadmissible in a court of law. There are considerable differences between original and virtualized machines; the latter emulate a very limited range of hardware. For example, VMWare creates virtual machines with standardized virtualized hardware presented to the applications [3] which is very unlikely to be the same hardware as the investigated machine used. This limits the use of virtual environments in computer forensics examinations where do not alter the original evidence is the most important rule [4]. In our previous work [1] we proposed concurrent and independent use of conventional and virtual environments where two copies of forensically acquired images are produced: the first, original evidence copy is protected using Standard Operating Procedures and the strict chain of custody rules, and analysed exclusively with forensically sound tools by a more experienced investigator, a working copy (or multiple working copies) are made from the evidence copy and analysed in a virtual machine environment by a less experienced investigator who is not constrained by strict forensics procedures. D. Bem, MElecEng Warsaw, MIEAust, CPEng ([email protected]) is a Lecturer in the School of Computing and Mathematics at the University of Western Sydney, Australia. E. Huebner, MElecEng Warsaw, PhD Sydney, MACS ([email protected]) is a Senior Lecturer in the School of Computing and Mathematics at the University of Western Sydney, Australia. Any findings made by the less experienced investigator are documented and passed to the more experienced investigator who confirms them in accordance with appropriate forensics rules. Further we present a scenario to illustrate our approach. We used a 128Mb USB flash drive with portable application software installed, acquired a forensic image of the USB flash drive, and demonstrated the process of using two environments to analyse the acquired image. The example scenario shows the benefits of the virtual environment approach such as reducing the time required to analyse the evidence, increasing the chances of discovering important data, and allowing less qualified personnel to be involved in a highly productive way. We also show the potential dangers which may cause tainting of the evidence if correct procedures are not followed. We decided to use only free, readily available utilities to allow everyone to repeat our experiments, and to encourage the reader to try experimenting with their own cases. II. COMPUTER FORENSICS AND USB FLASH DRIVES For the purpose of this paper we look at the computer forensics investigation as a process which can be divided into four major phases [5]: access, acquire, analyse (the focus of this paper) and report. During the access phase an incident has been identified, or there is a strong suspicion that an incident has happened. An initial responder records the basic details and notifies the individual responsible within the organisation for starting the correct procedure. During the acquiring phase relevant data is collected and passed to the team responsible for analysing it. The end result of this analysis is a report which, if required, may be used in a court of law. It is worth noting here that the four phases classification is somewhat arbitrary, and other sources divide incident response into more steps [6]. Within each specific organization this allocation of who does what and when would obviously vary, however one rule remains common: if the response and findings of the investigators involved in computer related crimes are to be of any use as court evidence they have to comply with the same rules as any other conventional investigations. USB flash drives (also known under many other names) are NAND-type flash memory data storage devices integrated with a USB interface controller. They were invented in the 1980s with the first commercial models reaching the market in The first USB drives offered very small storage capacities by today standards, but they still compared very favorably with physically larger and less reliable 3.5 diskettes. At the time of writing USB flash drives with capacities ranging between 512MB to 2GB are the most common and affordable, with
2 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE larger capacities of 4-8GB also available. The drives with a capacity of 64Mb and below are considered obsolete. A few companies offer drives with a maximum capacity reaching 64GB [7], [8]. While 64GB drives are currently very expensive at around US$3,000-5,000, it is safe to predict that the existing drives will become more affordable, and that drives with even higher capacities will be developed in the near future. Due to their portability and robust construction (no moving parts) the first major and still most common use of flash drives is to transport personal data like documents, spreadsheets, and pictures. However when the USB flash drives capacity reached around 32MB-64MB and higher, consumers noticed that USB drives open a new possibility: to carry applications that can be run on any standard computer without installation. This became practical only in recent years when USB drives reached a higher capacity at a low hardware cost. Typical software for Microsoft Windows is not designed to be portable: it relies heavily on the Windows registry, installs or uses already installed dynamic libraries (DLL), stores files and profiles in various system folders, and generally does not provide a portable installation option [9]. To make a portable application a software developer needs to write it in such a way that it does not use the Windows registry, nor store its files anywhere on the host computer. There are many applications written in such a way. Many Web sites also offer advice on how to modify the existing software to make it portable. Recently a new class of commercial software emerged which converts conventional non-portable applications into portable applications [10]. The degree of success varies, and some applications changed for portability do not work. A new emerging standard for USB flash drives with very strong industry support is U3 [11]. U3 compatible drives and compatible software allow for the creation of a portable full user environment including applications and user files. One can plug a U3 drive into any PC, and use applications installed on the drive to perform practically all tasks one would perform on a desktop computer. What is of particular interest in computer forensics investigations is the statement regarding U3 compliant USB flash keys with installed portable software: when you unplug it, it leaves no personal data behind [11]. Yet another complete portable environment is PortableApps [12], a free, actively developed compilation of software tools which offers easy to use installation and menu. PortableApps does not require U3 compatible hardware. Again, a computer forensics investigator should notice that PortableApps can also be used on any Windows computer, and it does not leave any personal data on the computer when unplugged. III. THE DUAL PARALLEL APPROACH TO USB FLASH DRIVE ANALYSIS A USB flash drive which is part of a forensics investigation may be found plugged into a USB port of a running system, or it may be separated from a computer and inactive. During the acquire phase an investigator has to create a forensic (bit by bit) image of all storage devices [13]. An image of a USB storage device is typically acquired using a dd based tool [14], and is stored in the dd format [15] or a proprietary format typically based on dd [16]. The image is considered to be a forensically valid copy of the original USB flash drive, and it can be analysed using one of many forensics tools in a similar way to analysing dd images acquired from hard disk drives. The conventional computer forensics technique is then to copy the acquired image to a hard drive and analyse it using appropriate forensics software. This method works best for passive storage devices, although even in this case the large volume of data may itself become a problem. However, as mentioned above, there is a growing trend of using USB flash drives as active devices which carry portable applications and full user environments. This trend is growing because of continuously increasing capacity and dropping prices of the USB flash drives, and easy access to USB equipped computers. We propose a different method which is more suitable to analyse this dynamic environment, that still retains the full integrity of the original image. The method benefits from using a virtual machine environment, as detailed below. IV. A BRIEF OVERVIEW OF VIRTUAL MACHINES Virtualization is an abstraction layer that decouples the physical hardware from the operating system [2]. Virtual machine (also known as VM ) is software which runs in a host machine environment and creates separate, independent environments each simulating its own set of hardware and software. Virtualization technology is, by computing standards, a very old concept which was first time proposed in the late 1950s [17]. A series of implementations followed with IBM announcing the first successful commercial product (VM - Virtual Machine operating system) in 1972 [18]. Virtualisation is a powerful tool which could be used for many tasks, but it requires additional computing resources. In addition to running a host operating system the computer shares the same set of hardware components between virtual machines, and obviously this need for resources increases if we run more virtual machines on a single host at the same time. Most implementations do not place any specific restrictions on how many virtual machines can be active at the same time. The only practical restriction is the availability of resources, and one can easily run dozens of virtual machines on one host at the same time. Typically a well designed virtual machine has intelligent and complex resources management capabilities. For example memory management in VMWare products are shared dynamically, as required, between virtual machines and real hardware host system space [19]. This extra level of address translation creates complex mapping of real hardware to virtual hardware, but is necessary to provide each virtual machine with an illusion of having full access to the allocated memory range. Practical conclusions for a computer which is to be used to run a virtual environment are as follows: use as much memory as the hardware can accept (typically 3-4GB for a Windows based host computer), consider using two or more CD/DVD burners to allow the virtual machine exclusive access to one CD/DVD burner, and use a very fast CPU. Conceptual complexity of virtualisation leads to certain compromises and restrictions, some of them (as we explain later) especially relevant in forensic applications. Only very
3 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE recently the unique advantages of virtualisation were noticed by professionals in relation to computer forensics. There are many free and commercial VM products offering different levels of maturity and flexibility, some of the best known are Microsoft Virtual PC [20], the extensive VMWare range of products [2], XenSource range of Xen products [21], and the open source (free) software QEMU [22]. Surprisingly all commercial developers offer selected virtualization software free, thus encouraging further experiments. However it should be remembered that some utilities are the result of the work of a small, dedicated group of hobbyists [23], and while the results achieved are often spectacular, such tools may not be sufficiently stable and tested to be used in forensic investigations. Some restrictions worth noticing here are that options of mixing host and guest systems may be restricted in a specific environment. Hardware configurations emulated by a guest system are limited to only the most common components, for example only one type of video card or one type of Ethernet controller. This may severely restrict use of VM in certain applications, but is of no consequence in USB key image analysis as presented here. V. ANALYSING USB FLASH DRIVE CONTENTS IN VIRTUAL MACHINE ENVIRONMENT To describe the proposed approach we introduce two levels of computer forensics personnel; less experienced and more experienced. Depending on the organization involved those descriptive terms will translate to specific titles; here we will be referring to them respectively as Computer Technician and Professional Investigator. This is similar to the roles CNF Technician (Computer and Network Forensic Technician) and CNF Professional (Computer and Network Forensic Professional) in classification proposed by Yasiniac et al [24]. It should be stressed that this classification, the terms used, and allocation of tasks vary between organisations and countries, and may have different titles such as Junior Investigative Officer, Digital Forensic Analyst, Senior Forensic Analyst, and so on. The modus operandi of a team consisting of a Professional Investigator and a Computer Technician is as follows: The fully trained and more experienced Professional Investigator adheres strictly to computer forensics investigation methods. The less qualified Computer Technician does not have to strictly follow forensic rules, and never has any direct input to the formal reporting process. The Computer Technician checks the copy of the materials for anything of potential interest, and then reports the findings to the Professional Investigator. A person conducting the final, formal analysis and presenting the report in the court is considered to be an expert [25] who possesses relevant specialised knowledge. We proposed [1] that the the whole process can be faster, more efficient and more reliable if two parallel investigating streams are used as shown in figure 1. In the analysis phase of the computer forensics investigation a master copy of the acquired USB flash drive image is kept Fig. 1. Using virtual environment in analysing USB flash drive image by the Professional Investigator, who provides another copy to the Computer Technician. The Computer Technician uses a virtual machine environment to mount the image under an appropriate Virtual Machine (typically Windows XP) and to find all data relevant to the investigation. If at any time the Technician decides that the image has been changed by the procedure he used, he may request another copy of the master image from the Professional Investigator. Typically this should not be required, as the procedure recommended for the Technican to follow would be to duplicate and save the image, or alternatively to save the complete virtual machine which includes a mounted image of the acquired USB flash drive. The methodology used by the Computer Technician invalidates the integrity of the acquired image, as he can use any suitable tools or methods even if they are not forensically sound. This is of no consequence to the validity of the final report. The Computer Technician makes detailed notes, and communicates all findings to the Professional Investigator, who uses proper computer forensics techniques and tools to confirm all initial findings in a formally approved way. It is crucial to note that no findings of the Computer Technician are included directly in the reporting process. The final report is created by the Professional Investigator, and it is the result of conducting a proper forensic analysis and using the original image. Next we will use a simple example scenario to demonstrate that the methodology described above can deliver more accurate results faster. VI. THE EXAMPLE SCENARIO A USB flash drive was found as part of a larger investigation. A computer forensics investigator was requested to check the USB flash drive and to find all information pertaining to drug trafficking, including details of financial transactions and any relevant letters or documents. The investigator documented physical details of the USB flash drive including make and model number, write protected the drive, and acquired the drive image using AccessData FTK Imager [26]. In addition to creating the dd image of the drive, FTK Imager also created a record (see Figure 2) which describes the USB drive geometry, physical drive information, and computed MD5 and SHA1 hashes of the image and the
4 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE Fig. 2. Acquiring USB flash drive image, FTK Imager report Fig. 3. The Virtual Disk Driver in VMWare guest machine original drive, verifying their match. The chain of custody was created according to local forensic procedures [27]. Two copies of the image USB27.dd were given to two people in the forensic lab: the Professional Investigator, and the Computer Technician. Both updated the respective chain of custody records and physically secured the image by locking it in a safe place. The Computer Technician was asked to investigate the image in a virtual environment (see Figure 1), and to use any suitable tools to search the image for any materials which may be relevant to the investigations. VMWare Server [3], a free virtualisation product from VMWare, was installed on a separate computer, and a Windows XP SP2 guest virtual machine was installed under VM [1]. After booting the Windows XP VM guest the USB flash drive image was copied to the virtual machine. However the USB flash drive image was in dd format, and thus it would only be of use if proper forensics tools and methods were used. There are a few different ways to use a dd image in a Windows environment in such a way that Windows treats the image as a disk drive. Still inside the guest virtual machine, the Computer Technician used VDK virtual driver [28] which mounted the USB27.dd image as a separate drive E: - see Figure 3. At this stage it is interesting to compare Figure 2 and Figure 3, and to notice that the virtual disk driver mounted the USB27.dd image as a FAT32 drive with 125 cylinders, 64 heads and 32 sectors per track, totalling sectors. FTK Image logged the geometry differently (see Figure 3) as follows: 15 cylinders, 255 tracks per cylinder, 63 sectors per track, 512 bytes per sector, giving a total sector count of 256,000. This difference is not unusual; the virtual machine automatically emulates real drive geometry and it may use a different virtual drive configuration. An important confirmation of the validity of the process is that the sector size and the total sector count are identical, in this case 512 bytes per sector and 256,000 sectors. Fig. 4. VMWare running master Windows XP guest and USB image mounted as a drive When browsing the contents of the E: drive with Windows Explorer the Computer Technician noticed a file named StartPortableApps.exe in the root directory. When the file was executed, it started the PortableApps application, see Figure 4. Looking at the environment built by the Computer Technician we notice the following (numbers refer to Figure 5): 1) Windows XP system running on the host PC used for testing of the image. 2) VMWare virtual environment running. 3) Four virtual machines are configured, and three are running, namely: hd1, hd2 and hda1-img.dd. 4) Desktop of the virtual guest named hda1-img.dd running Windows XP. 5) Acquired USB flash drive dd image mounted as a separate hard drive E: inside the virtual machine with a menu showing installed applications. 6) PortableApps panel also shows drive letter E:, as well as the amount of total and free space on the virtual USB drive E:. The Computer Technician checked applications installed on PortableApps, browsed the contents of the E: drive, and
5 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE Fig. 5. guest Virtual environment: Windows XP VMWare host and Windows XP continued the examination using standard Windows tools. The Computer Technician discovered a series of folders containing documents relevant to the investigation: letters, s, spreadsheets and records of transactions. When Portable Firefox was started one of the links pointed to the online storage system Mozy [29]. As the user of the USB key decided to use the Mozy log on panel option remember my details on this computer. The Computer Technician extracted the Mozy account user name and password using a password revealing tool [1]. Two important points are worth noting here: 1) The E: disk in the virtual machine is no longer identical with the image USB27.dd acquired from the USB storage device using forensically sound methods. The Computer Technician started the PortableApps application installed on the E: disk - various files and folders were touched by checking them in Windows Explorer, and by opening them in their native applications. It would be unrealistic to argue that the image is still valid as evidence, as it is now clearly contaminated. 2) The originally acquired image USB27.dd is still kept in custody by the Professional Investigator; it is unchanged and forensically valid. The Computer Technician reported the result obtained in the virtual environment to the Professional Investigator who can now confirm all the findings using forensically sound methodology, proper forensics software tools, and the original image USB27.dd. VII. CONCLUSION We described the process of using conventional and virtual environments in computer forensics investigations of USB flash drives. This approach is particularly suitable and brings faster results in cases when a USB flash drive is used not just to store data, but to contain a full set of portable applications, and used as an independent, fully self contained environment. We demonstrated a possible approach where virtual machine is used to quickly and efficiently recreate the original dynamic environment. To illustrate the concept we presented a relatively simple scenario where a single USB flash drive containing an independent PortableApps environment was analysed. The method of conventional and virtual environments used in parallel made it fast and simple to see the original environment as it was seen by the last user of the USB key, to still retain the integrity of the original image and giving the ability to confirm all findings using conventional forensics methods. The scenario demonstrated that the cooperation between two teams with different levels of expertise can produce more thorough results faster, and will lessen the workload of a Professional Investigator, who is a highly qualified specialist, and ideally should be involved only in resolving complex issues. The Professional Investigator would most likely achieve the same results using a conventional approach; however the described method saves time and increases the chances of finding important evidence. An additional advantage of using a dual conventional/virtual setup is involving less experienced technical personnel in a real investigation with no risk of compromising the integrity of the evidence. We believe that more research is needed to formalise the process of using a parallel conventional/virtual environment. Future research is also required to more thoroughly test other available virtual environment software. We believe that some of those tools may be more suitable to analyse USB devices, and thus may speed up the process. Also, some virtual machines may provide more accurate emulation of a wider range of hardware. Currently the hardware emulated by VM software is limited to very few devices. At this stage no such overview of utilities exists. It is also important to survey and test peculiarities of available portable applications and systems to better understand their behaviour in a virtual environment. Finally it is necessary to conduct more experiments with a growing range of large capacity USB storage hardware and document the peculiarities of various scenarios and devices. REFERENCES [1] D. Bem and E. Huebner, Computer Forensic Analysis in a Virtual Environment: University of Western Sydney. University of Western Sydney, [2] VMWare, VMWare, 2007; [3] VMWare Server, VMWare Server, 2007; products/server/ [4] B. Shavers, VMWare as a Forensic Tool, 2006; forensicfocus.com/vmware-forensic-tool [5] W.G. Kruse II and J.G. Heiser, Computer Forensics: Incident Response Essentials, 1st ed. Addison-Wesley Professional, [6] K. Mandia, C. Prosie and M. Pepe, Incident Response & Computer Forensics, 2nd ed. Emeryville, CA: McGraw-Hill/Osborne, [7] Buslink Media, 2007; [8] Kanguru Solutions, 2007; [9] M.E. Russinovich and D.A. Solomon, Microsoft Windows Internals. Redmond: Microsoft Press, [10] Montage, 2007; [11] U3, 2007; [12] PortableApps, 2006; [13] C.L.T. Brown, Computer Evidence: Collection & Preservation. Hingham, MA: Charles River Media, [14] B. Nelson, A. Phillips, F. Enfinger and C. Steuart, Guide to Computer Forensics and Investigations, 2nd ed. Boston, MA: Thomson Course Technology, [15] B. Carrier, File System Forensic Analysis, 1st ed. Upper Saddle River, NJ: Addison-Wesley, 2005.
6 SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE [16] S. Bunting and W. Wei, EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide, 1st ed. Indianapolis, IN: Wiley Publishing, [17] L. Chao, Intel Virtualization Technology, Vol. 10 Issue 3. Intel technology Journal, [18] VM History and Heritage, 2007; [19] C. Waldspurger, Memory Resource Management in VMware ESX Server:Paper presented at the Fifth Symposium on Operating Systems Design and Implementation (OSDI 02). Boston, Massachusetts: [20] Microsoft, Microsoft Virtual PC 2007, 2007; com/windows/products/winfamily/virtualpc/default.mspx [21] XenSource, 2007; [22] F. Bellard, QEMU, 2007; [23] SourceForge.net, Bochs IA-32 Emulator, 2007; sourceforge.net/ [24] A. Yasinsac, R.F. Erbacher, D.G. Marks, M.M. Pollitt and P.M. Sommer, Computer Forensics Education, IEEE Security and Privacy, Volume 1 Issue 4, 2003, pp [25] M. Meyers and M. Rogers, Computer Forensics: The Need for Standardization and Certification, Vol. 3 Issue 2. International Journal of Digital Evidence, [26] AccessData, FTK Imager, 2006; pagedetail.aspx?pagecode=downloads [27] S.V. Hart, Forensic Examination of Digital Evidence: A Guide for Law Enforcement, April 2004; htm [28] VM Back, Virtual Disk Driver, 2005; vmware/vdk.html [29] Mozy, 2007; Derek Bem Derek is a Lecturer in the School of Computing and Mathematics at the University of Western Sydney, Australia. Derek has extensive experience in the computer industry, where he worked in IBM and other companies as a hardware and software engineer. Derek is currently coordinating UWS teaching in the Computer Forensics area. Ewa Huebner Ewa is a Senior Lecturer in the School of Computing and Mathematics at the University of Western Sydney, Australia. Ewa has extensive experience teaching computer science subjects, and she is currently leading the UWS Computer Forensics group. The UWS computer forensics web site can be found at
Computer Forensic Analysis in a Virtual Environment
Computer Forensic Analysis in a Virtual Environment Derek Bem Ewa Huebner University of Western Sydney, Australia Abstract In this paper we discuss the potential role of virtual environments in the analysis
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
Forensic Acquisition and Analysis of VMware Virtual Hard Disks Manish Hirwani, Yin Pan, Bill Stackpole and Daryl Johnson Networking, Security and Systems Administration Rochester Institute of Technology
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Live View. A New View On Forensic Imaging. Matthiew Morin Champlain College
Live View A New View On Forensic Imaging Matthiew Morin Champlain College Morin 1 Executive Summary The main purpose of this paper is to provide an analysis of the forensic imaging tool known as Live View.
Comparing and Contrasting Windows and Linux Forensics. Zlatko Jovanovic. International Academy of Design and Technology
Comparing and Contrasting Windows and Linux Forensics Zlatko Jovanovic International Academy of Design and Technology Abstract Windows and Linux are the most common operating systems used on personal computers.
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
SOFTWARE INSTALLATION INSTRUCTIONS
AUDITGARD LGA Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS Implementation Package The AuditGard Software implementation package includes: 707013 AuditGard Software Install CD 42145 Programming/Audit
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Report on virtualisation technology as used at the EPO for Online Filing software testing
Report on virtualisation technology as used at the EPO for Online Filing software testing Virtualisation technology lets one computer do the job of multiple computers, all sharing the resources - including
CBE Architectural Overview and System Requirements
CBE Architectural Overview and System Requirements January 2015 ARCHITECTURAL OVERVIEW ARCHITECTURAL OVERVIEW EXAMPLE OF CBE SOFTWARE INSTALLATION The following diagram shows the users, programs in use
COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS
COMBOGARDPRO 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS IMPLEMENTATION PACKAGE The ComboGard Pro Software implementation package includes: 707012 ComboGard Pro Software Install
Computer Virtualization in Practice
Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland [email protected] ABSTRACT This paper provides an overview
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Getting Started with VMware Fusion
Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site
TrusCont TM TSFD Protection Toolkit
TrusCont TM TSFD Protection Toolkit Version 2.4 User's Manual September 2011 2006-2011 TrusCont Ltd. Table of Contents 1. INTRODUCTION 8 1.1 TSFD KEY FEATURES 8 1.2 WHAT S NEW IN VERSION 2.4 8 1.3 WHAT
Cisco IP Communicator (Softphone) Compatibility
Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
VMware Horizon FLEX User Guide
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Running Windows on a Mac. Why?
Running Windows on a Mac Why? 1. We still live in a mostly Windows world at work (but that is changing) 2. Because of the abundance of Windows software there are sometimes no valid Mac Equivalents. (Many
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0
Technical Note Migrating a Windows PC to Run in VMware Fusion VMware Fusion 2.0 This technical note describes the process for migrating an existing Windows PC to run as a virtual machine with VMware Fusion
Comparing Free Virtualization Products
A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Comparing Virtualization Technologies
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
Chapter 12: Windows XP, Vista, and 7
Chapter 12: Windows XP, Vista, and 7 Complete CompTIA A+ Guide to PCs, 6e To distinguish between the Windows XP, Vista, and 7 operating systems To install, configure, and troubleshoot Windows XP, Vista,
Virtualization with Windows
Virtualization with Windows at CERN Juraj Sucik, Emmanuel Ormancey Internet Services Group Agenda Current status of IT-IS group virtualization service Server Self Service New virtualization features in
Windows 7 Virtualization Technologies
Windows 7 Virtualization Technologies Advanced Forensic Topics Virtualization Technologies Integrated Virtual Hard Drive (VHD) Creation and Mounting Boot to Virtual Hard Drive (VHD) VHD File Use in System
Using. Microsoft Virtual PC. Page 1
Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
PVTC Technical Requirements
About the Installation Scenarios This document describes the minimum hardware requirements to install the Pearson VUE Testing (VTS) software in a Pearson VUE Authorized Test Center. The VTS software may
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express SQL 2008 R2 Express Restrictions 1 CPU 1 GB Ram Use Limit 10 GB Database Size High Availability Options None (No Database Mirroring,
Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents
Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe
nanohub.org An Overview of Virtualization Techniques
An Overview of Virtualization Techniques Renato Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida NCN/NMI Team 2/3/2006 1 Outline Resource
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.
White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation
Land Information New Zealand (LINZ) SALT Database Migration from original hardware to virtualised hardware: Process Documentation Contents Migration from original hardware to virtualised hardware: Process
M6310 USB Flash Drive Tester/Duplicator
NEW... USB Production Tester/ Duplicator from the Industry Leader Simple to Use Fast Reliable Versatile Features!!! High Quality Production USB Tester/Duplicator for USB Sticks USB Hard Drives MP3 Players
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
Using VMware Player. VMware Player. What Is VMware Player?
VMWARE APPLICATION NOTE VMware Player Using VMware Player This document contains the following sections: Work and Play in a Virtual World on page 1 Options and Features in VMware Player on page 4 Installing
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week
Network Support Analyst Ref: 14-182 Salary circa 21,000-22,800 per annum 37 hours per week IT Services are looking to recruit a Network Support Analyst to be responsible for delivering professional first
Computer Requirements
Installing Pro64 Network Manager It is recommended that you quit all running Windows applications before starting the Aviom Pro64 Network Manager installation process. Check the Aviom website (www.aviom.com)
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
Getting Started with VMware Fusion. VMware Fusion for Mac OS X
Getting Started with VMware Fusion VMware Fusion for Mac OS X 2 Getting Started with VMware Fusion Getting Started with VMware Fusion Item: EN-000189-00 You can find the most up-to-date technical documentation
Computer Information & Recommendations
Computer Information & Recommendations Files stored in your "S" drive can be accessed from home ( Detailed instructions at the end of this document ): Type \\soet students.main.ad.rit.edu\students\(ritusername)
Receptionist-Small Business Administrator guide
Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING
APPLICATION OF SERVER VIRTUALIZATION IN PLATFORM TESTING Application testing remains a complex endeavor as Development and QA managers need to focus on delivering projects on schedule, controlling costs,
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud
StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched
USB 3.0 to Gigabit Ethernet Adapter
USB 3.0 to Gigabit Ethernet Adapter User Manual Ver. 1.00 All brand names and trademarks are properties of their respective owners. Contents: Chapter 1: Introduction... 3 1.1 Product Introduction... 3
INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0
INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0 PLEASE NOTE PRIOR TO INSTALLING On Windows 8, Windows 7 and Windows Vista you must have Administrator rights to install the software. Installing Enterprise Dynamics
System Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
Read Me UNISTREAM AUTOMATION IDE
Read Me UNILOGIC SOFTWARE UNISTREAM AUTOMATION IDE Unitronics UniLogic software is the programming Integrated Development Environment (IDE) you use to configure hardware, communications, and develop both
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
3 ½ Floppy to USB Flash Reader
3 ½ Floppy to USB Flash Reader Manual Copyright 2010 PLRElectronics PLRElectronics 2010 PLRElectronics PO BOX 11977 Fort Worth, Texas All rights reserved. No part of this manual may be reproduced, transmitted,
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
9/26/2011. What is Virtualization? What are the different types of virtualization.
CSE 501 Monday, September 26, 2011 Kevin Cleary [email protected] What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,
NIST CFTT: Testing Disk Imaging Tools
NIST CFTT: Testing Disk Imaging Tools James R. Lyle, Ph.D. Computer Scientist National Institute of Standards and Technology 1. Introduction There is a critical need in the law enforcement community to
WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2192 Introduction to Big Data and NoSQL Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
The Impact of U3 Devices on Forensic Analysis
The Impact of U3 Devices on Forensic Analysis R. Tank and P.A.H Williams School of Computer and Information Science Edith Cowan University Perth, Western Australia Abstract Flash and USB portable drives
Unified Communications Installation & Configuration Guide
Unified Communications Installation & Configuration Guide Table of contents Page Applications License 1 Mitel 5110 Softphone 5 Click to Dial Application 22 Applications License Obtaining and Configuration
Item Minimum Required Recommended Notes
Carestream Dental strongly adheres to compliance with Microsoft Windows operating systems and hardware compatibility (HCL), which can be found at www.microsoft.com/whdc/hcl/default.mspx. Only operating
Installing & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
1.0. User s Guide & Manual USB 2.0 FLASH DRIVE
1.0 USB 2.0 FLASH DRIVE User s Guide & Manual Index Introduction 1 CHAPTER1 Features & Specifications 2 CHAPTER2 System Requirements 4 CHAPTER3 Getting Started Installation of the Windows 98SE Driver 5
USB FLASH DRIVE. User s Manual 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS...
Table of Contents 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS...2 2. INSTALLATION PROCEDURE...3 2.1. INSTALL USB FLASH DRIVE ON WINDOWS
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Autodesk Inventor on the Macintosh
Autodesk Inventor on the Macintosh FREQUENTLY ASKED QUESTIONS 1. Can I install Autodesk Inventor on a Mac? 2. What is Boot Camp? 3. What is Parallels? 4. How does Boot Camp differ from Virtualization?
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 If you are upgrading... 1 Installation Choices... 1 ZENworks
Workstation Virtualization Software Review. Matthew Smith. Office of Science, Faculty and Student Team (FaST) Big Bend Community College
Workstation Virtualization Software Review Matthew Smith Office of Science, Faculty and Student Team (FaST) Big Bend Community College Ernest Orlando Lawrence Berkeley National Laboratory Berkeley, CA
Verax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: [email protected] Internet: http://www.veraxsystems.com/
Enterprise Backup and Restore technology and solutions
Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
Protection Service for Business
Protection Service for Business Getting Started Guide for Mac Computers System requirements System requirements Supported platforms For all supported OS X versions. Workstation (Mac) Processor: Memory:
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
ARIS Education Package Process Design & Analysis Installation Guide. Version 7.2. Installation Guide
ARIS Education Package Process Design & Analysis Installation Guide Version 7.2 Installation Guide March 2012 This publication is protected by international copyright law. All rights reserved. No part
Proval LS Database & Client Software (Trial or Full) Installation Guide
Proval LS Database & Client Software (Trial or Full) Installation Guide Prerequisites: Technical Requirements SDS ProVal is an independent application and does not require Microsoft Office to run. It is
Chapter 5: Operating Systems Part 1
Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
