Recover My Files v Test Results for Video File Carving Tool
|
|
|
- Felicity Laureen Davis
- 10 years ago
- Views:
Transcription
1 Recover My Files v5.2.1 Test Results for Video File Carving Tool October 22, 2014
2 This report w as prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division by the Office of Law Enforcement Standards of the National Institute of Standards and Technology. For additional information about the Cyber Security Division and ongoing projects, please visit w ww.cyber.st.dhs.gov.
3 Test Results for Video File Carving Tool: Recover My Files v5.2.1 October 2014
4 Contents Introduction... 1 How to Read This Report Results Summary Test Case Selection Testing Environment Execution Environment Support Software Raw dd Image Creation Test Results No Padding Cluster Padded Fragmented In order Incomplete Fragmented Out of Order Braided Pair Byte Shifted... 9 ii
5 Introduction The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology Law Enforcement Standards Office (OLES) and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security s Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. Test results provide the information necessary for developers to improve tools, users to make informed choices, and the legal community and others to understand the tools capabilities. The CFTT approach to testing computer forensics tools is based on wellrecognized methodologies for conformance and quality testing. Interested parties in the computer forensics community can review and comment on the specifications and test methods posted on the CFTT Web site ( This document reports the results from testing Recover My Files (RMF) v5.2.1 against raw disembodied dd images that contain various layouts of fragmentation and completeness. The dd images are available at the CFREDS Web site ( Test results from other tools can be found on the DHS S&T-sponsored digital forensics web page, How to Read This Report This report is divided into four sections. Section 1 identifies and provides a summary of any significant anomalies observed in the test runs. This section is sufficient for most readers to assess the suitability of the tool for the intended use. Section 2 identifies the test cases that were selected. The test cases are selected, in general, based on features offered by the tool. Section 3 lists software used to run the test cases with links to additional information about the items used. Section 4 presents for each test case the expected result data used to measure the success of the test and the actual data reported by the tool. To download a zip file containing data returned for each test case for RMF v5.2.1 runs, see
6 Test Results for Digital Data File Carving Tool Tool Tested: Software Version: Supplier: Address: Recover My Files (RMF) v5.2.1 GetData 588 West 400 South Suite 350 Lindon, UT Tel: +61 (0) (Australian Business Hours) USA callback service: (866) Fax: +61 (0) WWW: 1 Results Summary Below are summaries on how Recover My Files v5.2.1 performed when carving raw dd images containing various layouts of fragmentation and completeness. RMF was most successful at carving mp4, mov, avi, wmv, 3gp and ogv from no padding, braided pair and cluster padded dd images. Recovering video files from fragmented images (i.e., Simple, Partial, Disorderd) returned an increase in Viewable Incomplete and Not Viewable rankings. The Non-Sector boundary dd image containing a total of 36 files, recovered only 6 files all of which were classified as False Positive. For more test result details see section 4. 2 Test Case Selection RMF s ability to carve mp4, mov, avi, wmv, 3gp, ogv video files was measured by analyzing carved video files from raw disembodied dd images (i.e., an image without a filesystem) that contain various layouts of fragmentation and completeness. The dd image layouts are: No Padding: contiguous files with no other content between files Cluster Padded: contiguous files with assorted content between files ranging in size from 1, 2, 4, 8, 16 and 32 sectors Fragmented In Order: contiguous and sequential fragmented files with content separating the files October 2014 Page 2 of 10 Recover My Files v5.2.1
7 Incomplete: contiguous and partial (i.e., only a portion of the file is present) files Fragmented Out of Order: contiguous and disordered fragmented files separated by other content Braided Pair: contiguous and intertwined fragmented files Byte Shifted: contiguous files that are not aligned to sector boundaries 3 Testing Environment The tests were run in the NIST CFTT lab. This section describes the selected test execution environment, using the support software, and notes on other test hardware. 3.1 Execution Environment RMF version was installed on Windows XP v The default configuration settings were used for RMF. 3.2 Support Software A package of programs to support test analysis, rel-9, was used. The software can be obtained from: Raw dd Image Creation The scripts used to create the dd images used for testing can be obtained from: 4 Test Results The results in sections identify the test image that was carved and the data (i.e., carved files) that were returned. Each test has an associated table that identifies the test, the total number of files carved and whether the carved files were Viewable Complete/minor alteration; Viewable Incomplete/major alteration; Not Viewable or a False Positive. The Total Carved column reports the total number of files carved. This number is often higher than the number of files contained within the image. This is generally due to false positives. False positives often occur when a tool has carved a file based upon a known file signature (e.g., FF D8) string that is not a file header, but a string within another file. The Viewable Complete/minor alteration column describes carved files in which the video appears to be unchanged from the original or the changes are so minor that the full content, color, and other attributes of the video are maintained. The Viewable Incomplete/major alteration column include partial recoveries (i.e., only parts of the video are viewable), scrambled videos in which the fragments are assembled incorrectly, color shifts and similar changes. October 2014 Page 3 of 10 Recover My Files v5.2.1
8 The Not Viewable column describes a file that is not viewable, could not be opened or had no content when opened. Samples of viewable/complete and viewable/incomplete are available at The False Positive column reports a count of files that were incorrectly identified. The left-most column of the report tables provides a count for the individual file types that make up the test image. The first row in in the tables reports the overall results for all files. Subsequent rows report results by file types (e.g., mp4, mov). The results are further divided based on the test case, e.g., by the amount of fragmentation or the presence of filler (i.e., other content). A bent arrow is used to show the breakdown. The VLC media player software was used to interpret the files carved and classify them into the different categories (i.e., Viewable Complete/minor, Viewable Incomplete/major). The media player speed used was faster to shorten the classification time for files carved. Full data on the test results including a complete analysis of sectors recovered is available at October 2014 Page 4 of 10 Recover My Files v5.2.1
9 4.1 No Padding Video-nofill_ dd contains a total of 36 contiguous files with no filler between files. Out of the 36 video files a total of 34 files were carved 33 of the carved files were Viewable Complete and 1 file was Not Viewable. Summary: The tool was successful at recovering the majority of all file types. Test: No Padding Total Carved Viewable Viewable Complete/minor Incomplete/major alteration alteration Not Viewable 36 files mp mov avi wmv gp ogv 6 6 Full results are available at: CFTT-Test-Run-Raw-Files.html Table 1: No Padding False Positive 4.2 Cluster Padded Video-notshifted_ dd contains a total of 36 files, where all 36 files are contiguous files that have filler that ranges in size from 1, 2, 4, 8, 16, 32 sectors where the files land on sector boundaries. Out of the 36 video files a total of 35 files were carved 34 of the carved files were Viewable Complete and 1 was Not Viewable. Summary: The tool was successful at recovering contiguous files separated with various lengths of filler. Test: Cluster Padded Total Carved Viewable Viewable Complete/minor Incomplete/major alteration alteration Not Viewable 36 files mp mov avi wmv gp ogv 6 6 Full results are available at: CFTT-Test-Run-Raw-Files.html Table 2: Cluster Padded False Positive October 2014 Page 5 of 10 Recover My Files v5.2.1
10 4.3 Fragmented In order Video-simple-frag_ dd contains a total of 36 files, 12 which are contiguous and 24 that are sequentially fragmented with filler that ranges in size from 1, 2, 4, 8, 16 sectors. Out of the 36 video files a total of 40 files were carved 12 of the carved files were Viewable Complete, 14 of the files were Viewable Incomplete and 14 of the files were Not Viewable. Summary: In the presence of sequentially fragmented files, the tool had a reduced ability to recover viewable complete mp4, mov, avi, wmv, 3pg and ogv files. Test: Fragmented In Order Total Carved Viewable Viewable Complete/minor Incomplete/major alteration alteration Not Viewable False Positive 36 files mp Frag w/fill mov Frag w/fill avi Frag w/fill wmv Frag w/fill gp Frag w/fill ogv Frag w/fill Full results are available at: CFTT-Test-Run-Raw-Files.html Table 3: Fragmented In Order 4.4 Incomplete Video-partials_ dd contains a total of 36 files, 18 complete files: 12 which are contiguous and 6 that have filler that ranges in size from 1, 2, 4, 8, 16 sectors. The remaining 18 files are partial files (e.g., only a portion of the file is present). October 2014 Page 6 of 10 Recover My Files v5.2.1
11 Out of the 36 video files a total of 32 files were carved 12 of the carved files were Viewable Complete, 10 of the files were Viewable Incomplete and 10 were Not Viewable. Summary: In the presence of partial files, the tool had a reduced ability to recover viewable complete mp4, mov, avi, wmv, 3pg and ogv files. Test: Incomplete Total Carved Viewable Viewable Recovery of all Incomplete/major available/minor alteration alteration Not Viewable 36 files mp Complete Partial mov Complete Partial avi Complete Partial wmv Complete Partial gp Complete Partial ogv Complete Partial Full results are available at: CFTT-Test-Run-Raw-Files.html Table 4: Incomplete False Positive 4.5 Fragmented Out of Order Video-disorder_ dd contains a total of 36 files, 6 of which are contiguous fragmented files that have filler that ranges in size from 1, 2, 4, 8, 16 sectors and the remaining 30 are fragmented files that are disordered. Out of the 36 video files a total of 36 files were carved 16 of the carved files were Viewable Incomplete and 21 of the files were Not Viewable. Summary: In the presence of disordered fragmented files, the tool had a reduced ability to recover viewable complete mp4, avi, wmv and ogv files. All mov and 3gp files were not viewable. October 2014 Page 7 of 10 Recover My Files v5.2.1
12 Test: Fragmented Out of Order Total Carved Viewable Viewable Complete/minor Incomplete/major alteration alteration Not Viewable False Positive 36 files mp ABC 1 1 ACB BAC BCA CAB CBA 1 6 mov ABC ACB BAC BCA CAB CBA avi ABC ACB BAC BCA CAB CBA wmv ABC 1 ACB 1 BAC 1 BCA CAB 1 CBA 6 3gp ABC ACB BAC BCA CAB CBA ogv ABC ACB BAC BCA CAB CBA Full results are available at: CFTT-Test-Run-Raw-Files.html Table 5: Fragmented Out of Order October 2014 Page 8 of 10 Recover My Files v5.2.1
13 4.6 Braided Pair Video-braid_ dd contains a total of 24 files, 12 of which are contiguous and 12 fragmented files. Out of the 24 video files a total of 24 files were carved 13 of the carved files were Viewable Complete, 5 were Viewable Incomplete and 6 were Not Viewable. Summary: The presence of braided files did not significantly impact the recovery of Viewable Complete files. Test: Braided Pair Total Carved Viewable Viewable Complete/minor Incomplete/major alteration alteration Not Viewable 24 files mp Braided mov Braided avi Braided wmv Braided gp Braided ogv Braided Full results are available at: CFTT-Test-Run-Raw-Files.html Table 6: Braided Pair False Positive 4.7 Byte Shifted Video-shifted_ dd contains a total of 36 files, where all 36 files are contiguous files that have filler that ranges in size from 1, 2, 4, 8, 16, 32 sectors where the files land on non-sector boundaries. Out of the 36 video files, only 6 ogv video files were carved. All 6 files were False Positives. Summary: The tool was unsuccessful at carving files not aligned to sector boundaries. October 2014 Page 9 of 10 Recover My Files v5.2.1
14 Test: Byte Shifted Total Carved Viewable Viewable Complete/minor Incomplete/major alteration alteration Not Viewable False Positive 36 files mp4 6 mov 6 avi 6 wmv 6 3gp 6 ogv 6 6 Full results are available at: CFTT-Test-Run-Raw-Files.html Table 7: Byte Shifted October 2014 Page 10 of 10 Recover My Files v5.2.1
BlackLight v2016.1. Test Results for Mobile Device Acquisition Tool
BlackLight v2016.1 Test Results for Mobile Device Acquisition Tool May 25, 2016 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division
Tableau TD3 Forensic Imager 1.3.0. Test Results for Digital Data Acquisition Tool
Tableau TD3 Forensic Imager 1.3.0 Test Results for Digital Data Acquisition Tool July 23, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber
Test Results for Mobile Device Acquisition Tool: Lantern v2.3
FEB. 203 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special RepoRt Test Results for Mobile Device Acquisition Tool: Lantern v2.3 nij.gov Office of Justice Programs
Deleted File Recovery Tool Testing Results
Deleted File Recovery Tool Testing Results Jim Lyle NIST 1 AAFS Washington CFTT Develop specifications for testing forensic tools Disk Imaging Write Blocking Drive erase for reuse Metadata based deleted
NIST CFTT: Testing Disk Imaging Tools
NIST CFTT: Testing Disk Imaging Tools James R. Lyle, Ph.D. Computer Scientist National Institute of Standards and Technology 1. Introduction There is a critical need in the law enforcement community to
Digital Forensics at the National Institute of Standards and Technology
NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards
Mobile Device Forensics. Rick Ayers
Mobile Device Forensics Rick Ayers Disclaimer Certain commercial entities, equipment, or materials may be identified in this presentation in order to describe an experimental procedure or concept adequately.
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners With the Tools They Need U.S. Cyber Crime Conference
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Gaming System Monitoring and Analysis Effort
for the Gaming System Monitoring and Analysis Effort DHS/S&T/PIA-025 October 11, 2012 Contact Point Douglas Maughan DHS S&T Cyber Security Division 202-254-6145 Reviewing Official Jonathan R. Cantor Acting
Ans.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
Digital Forensics. Module 4 CS 996
Digital Forensics Module 4 CS 996 Hard Drive Forensics Acquisition Bit for bit copy Write protect the evidence media EnCase for DOS Safeback (NTI: www.forensics-intl.com) Analysis EnCase FTK (www.accessdata.com)
a partition (drive letter) has been deleted or is missing (and a Fast Format Recover did not work);
Page 1 of 7 Recover My Files Data Recovery Software English V3.98 When to run a "Complete Format Recover" When running a "Complete Format Recover", use only the default selected file types:.doc,.ppt,.xls,.avi,.wav,.jpeg
CTC 328: Computer Forensics
FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: [email protected] Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:
Contents. Getting Set Up... 3. Contents 2
Getting Set Up Contents 2 Contents Getting Set Up... 3 Setting up Your Firewall for Video...3 Configuring Video... 3 Exporting videos... 4 Security for Jive Video Communication... 4 Getting Set Up 3 Getting
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Towards facilitating reliable recovery of JPEG pictures? P. De Smet
Towards facilitating reliable recovery of JPEG pictures? P. De Smet (edited for public release) [email protected] http://nicc.fgov.be/datarecovery/ Introduction & disclaimer Aim of this talk:
A Records Recovery Method for InnoDB Tables Based on Reconstructed Table Definition Files
Journal of Computational Information Systems 11: 15 (2015) 5415 5423 Available at http://www.jofcis.com A Records Recovery Method for InnoDB Tables Based on Reconstructed Table Definition Files Pianpian
Welcome to new students seminar!! Security is a people problem. forensic proof.com proneer.tistory.com. @pr0neer JK Kim
Welcome to new students seminar!! Data Recovery Security is a people problem proneer.tistory.com [email protected] @pr0neer JK Kim Outline Data & Recording Method Definition & Classification Recovering
Criminal Justice: Law Enforcement Technology
Criminal Justice: Law Enforcement Technology Dr. Kamal Shahrabi, Acting Chair Security Systems & Law Enforcement Technology Dept. Bachelor of Science The Bachelor of Science program in Criminal Justice:
9.63 Laboratory in Visual Cognition. Single Factor design. Single design experiment. Experimental design. Textbook Chapters
9.63 Laboratory in Visual Cognition Fall 2009 Single factor design Textbook Chapters Chapter 5: Types of variables Chapter 8: Controls Chapter 7: Validity Chapter 11: Single factor design Single design
Data Domain Profiling and Data Masking for Hadoop
Data Domain Profiling and Data Masking for Hadoop 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University
December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Working with Temporal Data
Esri International User Conference San Diego, California Technical Workshops July 26 2012 Working with Temporal Data Aileen Buckley Mark Smithgall This technical workshop Visualizing temporal data recurring
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED?
Contact: James Lyle Computer Forensics Tool Testing Program Office of Law Enforcement Standards National Institute of Standards and Technology HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED? NIJ, DHS,
Rm avi to dvd vcd svcd mpeg video converter
Rm avi to dvd vcd svcd mpeg video converter DVD Burning Xpress is an integrated tool used to convert home video DV tape to MPEG-2 and burn to DVD disc directly. It features simple user interface, with
by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array!
by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array! WHAT IS THIS ABOUT? BRIEF Coverage ;) Unusual Arrays Intro to RAID About RAID 0 Sight Samples Sound Samples About RAID 5 Demo
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
CDR500 Spy Recovery Pro
The CDR 500 Spy is the ultimate data recovery tool, which enables users to recover lost and deleted data from a variety of different sources using both Windows PC and Mac. By combining 4 of the most sophisticated,
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
Recover My Files v5. Chapter Contents. Published: 18 March 2013 at 12:52:56. Frequently Asked questions... 5. Data Recovery Fundamentals...
Recover My Files v5 Chapter Contents Published: 18 March 2013 at 12:52:56 Frequently Asked questions... 5 Data Recovery Fundamentals... 9 Hardware Recovery... 10 Software Recovery... 11 Chapter 1 Introducing
Connecticut Department of Public Health Electronic Laboratory Reporting HL7 v2.5.1 Message Validation Tool User Guide
Connecticut Department of Public Health Electronic Laboratory eporting HL7 v2.5.1 Message Validation Tool User Guide November 30, 2015 Version 1.0 EL HL7 v2.5.1 Message Validation Tool User Guide Table
Automating the Computer Forensic Triage Process With MantaRay
Automating the Computer Forensic Triage Process With MantaRay Senior Computer Forensic Analysts Doug Koster & Kevin Murphy Worlds best Summer Intern Chapin Bryce GMU RCFG Conference August 2013 1 MantaRay
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009
Fuzzy Hashing for Digital Forensic Investigators Dustin Hurlbut - AccessData January 9, 2009 Abstract Fuzzy hashing allows the investigator to focus on potentially incriminating documents that may not
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
VALUE LINE INVESTMENT SURVEY ONLINE USER S GUIDE VALUE LINE INVESTMENT SURVEY ONLINE. User s Guide
VALUE LINE INVESTMENT SURVEY ONLINE User s Guide Welcome to Value Line Investment Survey Online. This user guide will show you everything you need to know to access and utilize the wealth of information
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Lab 1 Introduction to Microsoft Project
Lab 1 Introduction to Microsoft Project Statement Purpose This lab provides students with the knowledge and skills to use Microsoft Project. This course takes students step-by-step through the features
CA Clarity PPM. Demand Management User Guide. v13.0.00
CA Clarity PPM Demand Management User Guide v13.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Website Editor User Guide
CONTENTS Minimum System Requirements... 3 Design Your Website... 3 Choosing your Theme... 4 Choosing your Header Style... 4-5 Website Content Editor... 6 Text Editor Toolbar features... 6 Main Menu Items...
BCA Software Installation and Troubleshooting Guide
BCA Software Installation and Troubleshooting Guide This document contains four components: Prerequisites provides the list of prerequisites and system requirements to successfully install and run the
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
Jay Ferron. Blog.mir.net. CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM. [email protected]
Jay Ferron CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM [email protected] Blog.mir.net Tools to use How do we make our job easer? What tools are there at low or no cost? What do you use today?
Global Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
BA 9000: National Institute of Justice Body Armor Quality Management System Requirements January 2012
BA 9000: National Institute of Justice Body Armor Quality Management System Requirements January 2012 The contents of this document may be reproduced and/or distributed, in whole or in part, without prior
Personal Portfolios on Blackboard
Personal Portfolios on Blackboard This handout has four parts: 1. Creating Personal Portfolios p. 2-11 2. Creating Personal Artifacts p. 12-17 3. Sharing Personal Portfolios p. 18-22 4. Downloading Personal
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Quick Reference Guide
Simplified Web Interface for Teachers Quick Reference Guide Online Development Center Site Profile 5 These fields will be pre-populated with your information { 1 2 3 4 Key 1) Website Title: Enter the name
Automated Windows Event Log Forensics
DIGITAL FORENSIC RESEARCH CONFERENCE Automated Windows Event Log Forensics By Rich Murphey Presented At The Digital Forensic Research Conference DFRWS 2007 USA Pittsburgh, PA (Aug 13 th - 15 th ) DFRWS
U.S. Cyber Security Readiness
U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National
Creating Web Pages with Microsoft FrontPage
Creating Web Pages with Microsoft FrontPage 1. Page Properties 1.1 Basic page information Choose File Properties. Type the name of the Title of the page, for example Template. And then click OK. Short
Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools Cory Altheide Harlan Carvey Technical Editor Ray Davidson AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
Computer Forensics Standards:
Computer Forensics Standards: National Software Reference Library Computer Forensics Tool Testing Computer Forensics Reference Data Sets PDA Forensics Research Barbara Guttman [email protected] September
R221 - Specific Requirements: Forensic
R221 - Specific Requirements: Forensic Page 1 of 6 R221 - Specific Requirements: Forensic (October 2015) 2015 by A2LA. All rights reserved. No part of this document may be reproduced in any form or by
Minneapolis Police Department Crime Lab ASCLD/LAB ISO International Accreditation
Minneapolis Police Department Crime Lab ASCLD/LAB ISO International Accreditation ASCLD/LAB ISO International Accreditation The American Society of Crime Laboratory Directors/Laboratory Accreditation Board
Recovers Lost or Deleted Pictures from: Any Memory Card Type Any Brand Using Any Mass Storage Reader
Recovers Lost or Deleted Pictures from: Any Memory Card Type Any Brand Using Any Mass Storage Reader Reader and Media not included Image Recovery - Recovers lost or deleted image files (JPEG, TIFF and
Cloud Forensics. 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu
Cloud Forensics Written & Researched by: Maegan Katz & Ryan Montelbano 175 Lakeside Ave, Room 300A Phone: 802/865-5744 Fax: 802/865-6446 http://www.lcdi.champlin.edu November 4, 2013 Disclaimer: This document
This document was derived from simulation software created by Steve Robbins which was supported by NSF DUE-9752165
UNIX Concurrent IO Simulator Exercises This document was derived from simulation software created by Steve Robbins which was supported by NSF DUE-9752165 Instructions: Download the UNIX Concurrent I/O
Experian Credit Score Import
Experian Credit Score Import Experian Import (Application 3d4fd68e-c8b6-461c-8a5f-b6dbc46a0db) Overview: The Experian Import application reads in an Experian file containing credit scores and applies the
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
Portal Connector Fields and Widgets Technical Documentation
Portal Connector Fields and Widgets Technical Documentation 1 Form Fields 1.1 Content 1.1.1 CRM Form Configuration The CRM Form Configuration manages all the fields on the form and defines how the fields
T R A I N I N G C O U R S E S
T R A I N I N G C O U R S E S Get the Most out of Your Digital Signage Investment Even though our software is easy to use, our certified trainers teach you how to get the most out of your Visix system.
City of Phoenix Prosecutor s Office ediscovery
1. Welcome to ediscovery ediscovery is a web-based application provided by the City of Phoenix Prosecutor s Office. ediscovery is a web portal accessible from the World Wide Web that provides defense attorneys
How to Create and Run a Missouri Arts Council
Tips for Using Grants Online (GO) Missouri Arts Council This guide is divided into three sections: Getting Started Application Tips (pg. 4) Submission Tips (pg. 10) Getting Started Icons Link to FormSet
SQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
SolarEdge Site Mapping Tool Software Guide
1 2 Important Notice Copyright 2011 SolarEdge Inc. All rights reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic,
Grade Level: High School
Lesson I: Triangles- Exterior Angle Theorem KEY WORDS: Triangles, exterior-angle theorem, and remote interior angles. Grade Level: High School SUMMARY: With this investigation students will discover the
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
Using Computer Forensics in your Investigations
Deloitte Financial Advisory Services LLP Using Computer Forensics in your Investigations Presented to: ISACA Los Angeles Chapter Dave Nardoni January 12 th, 2010 Agenda Introduction Analytic & Forensic
Practice Exercise March 7, 2016
DIGITAL FORENSICS Practice Exercise March 7, 2016 Prepared by Leidos CyberPatriot Forensics Challenge 1 Forensics Instruction Guide Introduction The goal of this event is to learn to identify key factors
Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration
Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network
