GOOGLE DESKTOP FORENSICS WIN!

Size: px
Start display at page:

Download "GOOGLE DESKTOP FORENSICS WIN!"

Transcription

1 The Quarterly Magazine for Digital Forensics Practitioners WIN! A STEGALYZER USB FROM SARC ISSUE 15 MAY 2013 INSIDE / Cryptographic Key Recovery / Tunnelling Out: Data Extraction / Fuzzing Risks in Software Tools / Timeline Creation & Review GOOGLE DESKTOP FORENSICS Google desktop use in Digital Forensic examinations Issue 15 / TR Media / REGULARS NEWS, 360, irq, LEGAL & more / INTRODUCING Registry Recon HOW IT WAS DEVELOPED / FROM THE LAB StegAlyzer: DETECTING Steganography IN THE FIELD / Book Reviews Windows Forensic Analysis Toolkit

2 / FEATURE RAISING THE BAR IN WINDOWS REGISTRY FORENSICS Mark Spencer explains the story behind the development of Registry Recon. / INTERMEDIATE The Microsoft Windows Registry ( Registry ) is a complex database containing valuable evidence related to hardware, software, and users. At a very basic level, the Registry is composed of hives that contain keys and values which are similar in some ways to folders and files. The Registry is continually referenced during Windows operation so large volumes of Registry information can always be found both on disk and in live memory. Digital forensics and incident response ( DFIR ) practitioners have been digging into the Registry in various forms for over 20 years. You might be surprised by that given the archaic state of Registry forensics that continues to persist in many ways to this day. I m sure I m not the only member of our community whose pleas to vendors to improve the Registry functionality of their tools went unanswered. Generally speaking, DFIR tools have allowed us to analyse one Registry hive at a time. If we are only concerned with the active Registry, as it exists in a handful of hives on disk, this type of workflow is frustrating but manageable. It quickly devolves into complete insanity if we concern ourselves with the vast number of hives which exist in live memory, swap, hibernation, backups, and unallocated space. Should we be concerned with what often amounts to thousands of hives that exist beyond the active SAM, SECURITY, SOFTWARE, SYSTEM, and NTUSER.DAT/UsrClass.Dat files on disk? Perhaps a better question is, how can DFIR practitioners disregard thousands of hives, case after case? Would you go to a car wash that only cleaned your front bumper? I hope my analogy is so absurd that you consider very carefully what I am asking here. By taking all the hives in a piece of evidence into account, we are able to gain insight into how Registries from both the current and previous installations (to the extent their hives still exist in unallocated space) of Windows have changed over time. / Registry Recon Development I never thought my company would be involved in software development, but we were left with no choice. We decided to develop Registry Recon upon realizing no one else was going to address the fundamental issue that thousands of hives in countless pieces of evidence were being left untapped by existing tools and methodologies. Our first priority was to seamlessly harvest as many hives as possible from a piece of evidence to lay a solid foundation for processing and analysis. This ended up being more difficult than we envisioned, and eventually required building our own image mounter so that Volume Shadow Copies ( VSCs ) could be parsed properly. The end result allows users to simply click Add on a piece of evidence and active, backed up (restore points, VSCs, etc.), temporary (swap) and deleted (unallocated) hives are then ingested into the database. Our second priority involved Hive Association and Registry rebuilding. It was very important to us that regardless of how many hives we found and where we found them, our tool had to be able to connect those hives and rebuild all the Registries they represented in a historical fashion. We had two cases within months of each other which involved IT departments that had re-imaged and re-deployed laptops to new employees, before it became apparent that the former employees would In the pursuit of readability, when I refer to hive in this article I am referring to the files that support hives e.g. SAM, SECURITY, SOFTWARE, SYSTEM, and NTUSER.DAT/UsrClass.dat. Recon Registries 67

3 / FEATURE Recon View be defendants in civil litigation. The amount of time our team had to spend on manually carving and associating hives from unallocated space on these laptops makes me cringe to this day. You could say that programmatically associating hives and rebuilding the Registries they belonged to, was on our minds constantly after dealing with these two cases. Our third priority was the development of additional technologies to facilitate the analysis of the large numbers of hives we knew were waiting for us. We knew that simply putting all of the information contained in these hives in front of users in the traditional ways would be overwhelming and basically dead on arrival. In addition to the hive association and Registry rebuilding I mentioned above, we developed the concepts of Recon View, Instances, and Key History. Recon View is where users view the values contained within keys. By default, we only show the user unique values (based on each value s name and data) in a key over time. We also show the user the date and times associated with each unique value s parent key, as well as the number of times (Instances) we found that value in a piece of evidence. We provide two levels of nesting (Instances) for each unique value; all the times the value is associated with, per all the instances of its parent key, and then a list of all the locations a unique value at a unique time was found. / RegRipper RegRipper (now consolidated on one site google.com/p/regripper/) has an active community building plug-ins to perform various types of analysis on particular hives. RegRipper s author, Harlan Carvey, frequently posts on his Windows Incident Response blog about Registry analysis. I recommend checking out his blog as soon as you are done with this article, particularly topics regarding registry redirection/reflection, malware, and ShellBags. Our users sometimes run RegRipper plugins against hives carved from a piece of evidence by Registry Recon. Key History allows users to see a list of all the times associated with each key in a rebuilt Registry. A user can select a key at a particular time and it will be displayed at is appeared at that time. While we envisioned most of our users would analyse Registry data using the default view which displays unique values in a historical fashion, we knew that we had the ability to show our users keys at particular points in time; so we gave them that option. We also had other priorities, which were not quite as unique as these first three. E.g. we were frustrated by how few tools were able to parse deleted keys within hives, which should have been one of the priorities for any DFIR developer. We were also irritated with databases that were difficult to move between forensic workstations and export options which were not spreadsheet friendly. You will be pleased to find that we have addressed all of these priorities. Can some of these new technologies be a bit obtuse, particularly Instances? Of course! Diving into the intricacies of new technologies often is. The reward for mastering these technologies is very significant, as you will be wielding a very unique and powerful DFIR weapon. / Good Hunting We have found over the years that DFIR practitioners digging into Registry information tend to be most interested in the analysis of document, application, network, USB storage, and malware activities. In the past, analysing a handful of readily accessible Registry hives became relatively standard practice. By taking into account what often amounts to thousands of hives, Registry Recon now provides DFIR practitioners with the ability to see vast amounts of historical Registry information related to these activities. We don t get tired of hearing that our users are reanalysing old cases to learn more about their evidence! As there are constraints related to the size of this article, I ll get into more detail regarding these types of analyses 68 Digital / ForensicS

4 using some sample Windows 7 Registry keys. Please keep in mind that Registry redirection/reflection may come into play with some of these keys e.g. without reviewing the SOFTWARE\Wow6432Node subkeys, you may be left with an incomplete picture of the application and malware activity I discuss below. / Document Activity The RecentDocs key, a/k/a Recently Used Documents, is a well-known location in the Registry related to document activity. While RecentDocs and its subkeys can be quite illuminating, keep in mind there are many other keys you may be interested in as well. Keys containing MRU (Most Recently Used) lists may be particularly helpful to you. MRU lists are maintained by Windows, Office and thirdparty applications. Explorer\RecentDocs Explorer\ComDlg32\OpenSavePidlMRU NTUSER.DAT\Software\Nico Mak Computing\WinZip\mru / Application Activity One of the first things we like to do with Registry analysis is get a feel for what applications have been installed and uninstalled over time. We recommend checking out the root of the Software hive, the Software subkeys in each NTUSER. DAT hive, and the Windows Uninstall and App Paths keys. Something we also like to do early in our Registry analysis is get a feel for which account ran each application and when by reviewing the UserAssist key. Software\ NTUSER.DAT\Software Software\Microsoft\Windows\CurrentVersion\Uninstall Software\Microsoft\Windows\CurrentVersion\App Paths Explorer\UserAssist / Network Activity Our users in law enforcement have been particularly interested in keys related to network connections, and more specifically, wireless network connections. They have always been able to see a variety of details related to the last network their suspects connected to, but now they are able to see network connections over time. In addition to network connections, we are often interested in MRUs related to remote access as well. Interfaces Software\Microsoft\Windows NT\CurrentVersion\ Software\Microsoft\Terminal Server Client\Default NTUSER.DAT\Software\RealVNC\vncviewer\MRU / USB Storage Activity Identifying not only when USB storage devices were last attached to computers, but when they were attached over time, has become very important to our cases involving intellectual property theft. Registry keys related to USB Raw Devices, Disk Devices, Volume Devices and more help us determine when these devices have been attached over time, what their volume names were, and what drive letters they were assigned. Software\Microsoft\Windows Portable Devices\Devices Explorer\MountPoints2 System\MountedDevices / Malware Activity Confirming that malware has been executed on a system may be possible by reviewing the AppCompatCache key. Malware tends to maintain persistence by using Registry keys related to autorun, so these keys may help you spot red flags. AppCompatCache Run Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ System\CurrentControlSet\Control\Session Manager\ KnownDlls USB Storage 69

5 / FEATURE USBOblivion / Registry Scrubbing Registry scrubbing features in tools such as WhiteCanyon s SecureClean and Piriform s CCleaner have been around for many years. These features have targeted Registry keys that are often useful to DFIR practitioners. While this type of scrubbing could be problematic, it has not been catastrophic in the sense that the number of targeted keys has been relatively limited. With the introduction of tools such as USB Oblivion however, particular types of Registry keys are being more carefully targeted. Straight from the USB Oblivion s Google Code site USBOblivion utility designed to erase all traces of USB connected drives and CD-ROMs from the registry in Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8 32/64-bit versions. We have done some testing of USB Oblivion at Arsenal, and we can say it is very effective when it comes to the active Registry. Since Registry Recon ingests all the hives from restore points and VSCs, you might think you have defeated Registry scrubbing. To some extent, this is true. I am only aware of one tool with Registry scrubbing functionality (CCleaner) that will also delete restore points. It s only a matter of time however before more of these tools delete not only restore points but volume shadow copies (and other backups) as well. As Registry scrubbing tools become more effective in this regard, ingesting hives from live memory captures and unallocated space will become even more important. / Other Advancements We believe we have improved the state of Registry forensics in some very significant ways, but I am the first to acknowledge that the tool doesn t do everything for everyone. We still have a lot of work to do! Volatility s Technology Preview edition has a regdump module that extracts all the hives from a live memory capture. This is an awesome function and I m not aware of any other tools capable of extracting all the hives from a live memory capture. Registry Recon can ingest these hives once Volatility has extracted them and essentially rebuild the Registry, as it existed in live memory. We have been placing some spreadsheets in the Resources section ( of our website that some of you may be interested in. One set of spreadsheets is related to our Registry Key Mapping project. We are not talking about rocket science here; these spreadsheets simply track the keys added during the installation of particular applications as well as which keys are removed during their removal. We take requests; so if there are any applications you want us to hit please let me know. Another couple spreadsheets we ve published contain all the keys we know of that are related to USB storage devices and autorun functionality. Back to the work that we have to do; our development queue has become quite large. In addition to implementing our own ideas and associated R&D, we have received great suggestions from consultants, law enforcement, and the military. Some of the more straightforward improvements we have in the queue include automatic value decoding, direct support for live memory captures, greatly improving searching, bookmarking, and reporting functionality, and performance tuning. Law enforcement in particular has been interested in more pre-built reports and global shortcuts. Other features in the queue will be a bit more eye opening once we weaponise them. / In Closing Soon, rather than asking why DFIR practitioners are disregarding thousands of hives in case after case, I hope to be talking about how those same practitioners are now harnessing and leveraging them. / / Author Bio Mark Spencer is President of Arsenal Recon, where he leads the development of innovative digital forensics and incident response tools which include Registry Recon. Mark has over 15 years of law-enforcement and private-sector experience in digital forensics. He has been an adjunct professor at Bunker Hill Community College in Boston and an instructor at the Computer Security Institute. Mark is also President of Arsenal Consulting, where his team provides exceptional digital forensics services to law firms, corporations, and government agencies. Arsenal Recon and Consulting are located in the Chelsea Naval Magazine, a historic military structure which once stored arms for the USS Constitution, just outside Boston, Massachusetts. 70 Digital / ForensicS

6

Operating Systems Forensics

Operating Systems Forensics Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!

More information

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Advanced Registry Forensics with Registry Decoder Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Who am I? Senior Security Researcher @ DFS Published Researcher

More information

Windows 7 Forensic Analysis. H. Carvey Chief Forensics Scientist, ASI

Windows 7 Forensic Analysis. H. Carvey Chief Forensics Scientist, ASI Windows 7 Forensic Analysis H. Carvey Chief Forensics Scientist, ASI Introduction Who am I? Chief Forensics Scientist at ASI. Forensic Nerd. Published Author. Why are we here? To talk about Windows 7 Forensic

More information

Registry Analysis SANS Forensic Summit 2009

Registry Analysis SANS Forensic Summit 2009 Registry Analysis SANS Forensic Summit 2009 Allow myself to introduce myself 2 What is Registry Analysis?? More than just opening Registry files in a viewer and finding values Registry analysis involves:

More information

Clickfree The Effortless Backup Solution

Clickfree The Effortless Backup Solution Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:

More information

Determining VHD s in Windows 7 Dustin Hurlbut

Determining VHD s in Windows 7 Dustin Hurlbut Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for

More information

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.

More information

QUICK START GUIDE. Draft twice the documents in half the time starting now.

QUICK START GUIDE. Draft twice the documents in half the time starting now. QUICK START GUIDE Draft twice the documents in half the time starting now. WELCOME TO PRODOC Thank you for choosing ProDoc, your forms solution to save time and money, reduce errors, and better serve your

More information

GUIDE A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS

GUIDE A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS GUIDE A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS TABLE OF CONTENTS A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATION & OS ARTIFACTS FOR

More information

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer 1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts

More information

1. System Requirements

1. System Requirements BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

User Manual. Copyright Rogev LTD

User Manual. Copyright Rogev LTD User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's

More information

Software Installation and Creating a New Company

Software Installation and Creating a New Company Chapter 1 Software Installation and Creating a New Company OBJECTIVES: 1 System Requirements 2 Software Installation 3 Starting QuickBooks and Creating a New Company 4 Backing up Company Data 5 QuickBooks

More information

Windows 7 Virtualization Technologies

Windows 7 Virtualization Technologies Windows 7 Virtualization Technologies Advanced Forensic Topics Virtualization Technologies Integrated Virtual Hard Drive (VHD) Creation and Mounting Boot to Virtual Hard Drive (VHD) VHD File Use in System

More information

Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?

Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk? Windows Q & A April 2012 By Mary Phillips, Secretary, Icon Users Group, MO April 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network www.iconusersgroup.com [email protected]

More information

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses

If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses 2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...

More information

16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista

16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista 16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS

EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.

More information

Close Support Service Desk v 3.00. Upgrade Guide

Close Support Service Desk v 3.00. Upgrade Guide Close Support Service Desk v 3.00 Upgrade Guide I Close Support Service Desk v 3 Upgrade Manual Table of Contents Part I Upgrading from version 2.95 2 1 Prerequisites... 2 2 Potential version... conflicts

More information

`````````````````SIRE USER GUIDE

`````````````````SIRE USER GUIDE `````````````````SIRE USER GUIDE Table of Contents INTRODUCTION 3 SYSTEM REQUIREMENTS 4 RUNNING SANDISK BACKUP 5 Setup Your First Backup 6 Create Your Backup 7 Custom Backup 8 Dmailer Online 10 Launch

More information

Business Virtualization

Business Virtualization Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15

More information

Augmenting VMware View Horizon (VDI) with Micro Focus Client Management

Augmenting VMware View Horizon (VDI) with Micro Focus Client Management White Paper ZENworks Augmenting VMware View Horizon (VDI) with Micro Focus Client Management Table of Contents page Making the VMware View Horizon Management Solution Work Beyond Your Wildest Dreams...2

More information

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Solution Brief: Creating Avid Project Archives

Solution Brief: Creating Avid Project Archives Solution Brief: Creating Avid Project Archives Marquis Project Parking running on a XenData Archive Server provides Fast and Reliable Archiving to LTO or Sony Optical Disc Archive Cartridges Summary Avid

More information

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer

Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...

More information

Yurbi: A New Paradigm In Business Intelligence

Yurbi: A New Paradigm In Business Intelligence Yurbi: A New Paradigm In Business Intelligence Published: 8 May 2012 The term Business Intelligence was coined in the late 1950 s and the way some software is designed, you would think that we were still

More information

Using the Windows XP Backup Wizard. Introduction. Open the Backup Wizard

Using the Windows XP Backup Wizard. Introduction. Open the Backup Wizard Technology Department University of Maryland School of Law Office 8 [email protected] 0-706-77 Introduction A computer crash, hard drive failure or a virus can wipe out everything on your computer.

More information

EnCase Forensic Product Overview

EnCase Forensic Product Overview GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-687 Exam Name: Microsoft Configuring Windows 8 Exam Version: Demo QUESTION: 1 A company has an Active Directory

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

Division of Administration (DOA) Desktop Support

Division of Administration (DOA) Desktop Support Division of Administration (DOA) Desktop Support Computer Power Conservation Settings for XP & Vista Operating Systems XP Power Options Overview Using Power Options in Control Panel, you can reduce the

More information

Solve your PST headaches with or without Archiving

Solve your PST headaches with or without Archiving Solve your PST headaches with or without Archiving Executive Summary The reasons that drive users to create and use PST files are well understood (Mailbox Quotas, the Outlook AutoArchive feature) and the

More information

10.3.1.5 Lab - Data Backup and Recovery in Windows Vista

10.3.1.5 Lab - Data Backup and Recovery in Windows Vista 5.0 10.3.1.5 Lab - Data Backup and Recovery in Windows Vista Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: [email protected].

Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: info@pcrepairstore.co. Business details Services and price list 2010 Monday Friday 10:00am 6:00pm Saturday 10:00am 5:00pm We offer professional IT services for home and business users at a cost effective price. We have a team

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Using HP System Software Manager for the mass deployment of software updates to client PCs

Using HP System Software Manager for the mass deployment of software updates to client PCs Using HP System Software Manager for the mass deployment of software updates to client PCs Introduction... 2 HP manageability solutions... 2 SSM overview... 3 Software updates... 3 Why not SSM-enabled?...

More information

Addressing Legal Discovery & Compliance Requirements

Addressing Legal Discovery & Compliance Requirements Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in

More information

5 Group Policy Management Capabilities You re Missing

5 Group Policy Management Capabilities You re Missing 5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the

More information

Deploying EFS: Part 2

Deploying EFS: Part 2 Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

Understand Backup and Recovery Methods

Understand Backup and Recovery Methods Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows

More information

ACADEMIC TECHNOLOGY SUPPORT

ACADEMIC TECHNOLOGY SUPPORT ACADEMIC TECHNOLOGY SUPPORT Tegrity: Getting Started with Lecture Capture (Last updated: 2/23/15) [email protected] 439-8611 www.etsu.edu/ats Table of Contents: Table of Contents:... 2 Overview... 1 Objectives...

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

12 NETWORK MANAGEMENT

12 NETWORK MANAGEMENT 12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking

More information

Technical Procedure for Evidence Search

Technical Procedure for Evidence Search Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

USER MANUAL SlimComputer

USER MANUAL SlimComputer USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide

Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Updated: May 2008 Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 7 2. Installing the

More information

USB Devices and Media Transfer Protocol. Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC

USB Devices and Media Transfer Protocol. Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC USB Devices and Media Transfer Protocol Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC Importance Increasing adoption of MTP in portable devices Android Windows

More information

File Management Windows

File Management Windows File Management Windows : Explorer Navigating the Windows File Structure 1. The Windows Explorer can be opened from the Start Button, Programs menu and clicking on the Windows Explorer application OR by

More information

3 Ways to Restore Salesforce Data

3 Ways to Restore Salesforce Data White Paper 3 Ways to Restore Salesforce Data LEARN MORE AT WWW.SPANNING.COM OR CALL 512.236.1277 3 Ways to Restore Salesforce Data How do you know when you need to do more to protect your Salesforce data?

More information

10 everyday things your data backup system should do. Data backup that is reliable, easy and fast is only the beginning

10 everyday things your data backup system should do. Data backup that is reliable, easy and fast is only the beginning 10 everyday things your data backup system should do Data backup that is reliable, easy and fast is only the beginning Table of Contents Backup and Restore 1 10 Everyday Challenges 1st People delete good

More information

1. System Requirements

1. System Requirements BounceBack Ultimate 14.2 User Guide This guide presents you with information on how to use BounceBack Ultimate 14.2. Contents 1. System Requirements 2. BounceBack Pre-Installation 3. How To Install The

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Introduction. There are several bits of information that must be moved:

Introduction. There are several bits of information that must be moved: Backup and restore on new hardware XProtect Professional VMS Products 2014: XProtect Enterprise 2014, XProtect Professional 2014, XProtect Express 2014, XProtect Essential 2014 Introduction This document

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Data Containers. User Guide

Data Containers. User Guide Data Containers User Guide Contents 1. Overview... 2 The backup... 2 The problem... 2 The solution... 2 Other advantages... 2 RDX granular restore... 2 Portable backups... 2 2. Creating a Data container

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5

More information

Simple Computer Backup

Simple Computer Backup Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:

More information

2013 Open Source Digital Forensics Conference

2013 Open Source Digital Forensics Conference 4 TH ANNUAL OSDF 2013 Open Source Digital Forensics Conference Doing More with Less Willi Ballenthin Consultant MANDIANT Introduc4on: Willi Ballenthin Professionally Incident response Malware analysis

More information

Google Drive: Access and organize your files

Google Drive: Access and organize your files Google Drive: Access and organize your files Use Google Drive to store and access your files, folders, and Google Docs, Sheets, and Slides anywhere. Change a file on the web, your computer, tablet, or

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Managing BitLocker With SafeGuard Enterprise

Managing BitLocker With SafeGuard Enterprise Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption

More information

Carry it Easy. User Guide

Carry it Easy. User Guide Carry it Easy User Guide User Manual Version 3.2 2004-2010 CoSoSys Ltd. Carry it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 1 3. Installation...

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

Events Forensic Tools for Microsoft Windows

Events Forensic Tools for Microsoft Windows Events Forensic Tools for Microsoft Windows Professional forensic tools Events Forensic Tools for Windows Easy Events Log Management Events Forensic Tools (EFT) is a fast, easy to use and very effective

More information

Life after Microsoft Outlook Google Apps

Life after Microsoft Outlook Google Apps Welcome Welcome to Gmail! Now that you ve switched from Microsoft Outlook to, here are some tips on beginning to use Gmail. Google Apps What s Different? Here are some of the differences you ll notice

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service CAS CLOUD WEB USER GUIDE UAB College of Arts and Science Cloud Storage Service Windows Version, April 2014 Table of Contents Introduction... 1 UAB Software Policies... 1 System Requirements... 2 Supported

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used

More information

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the

More information

EnCase 7 - Basic + Intermediate Topics

EnCase 7 - Basic + Intermediate Topics EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic

More information

A Guide to PST Files How Managing PSTs Will Benefit Your Business

A Guide to PST Files How Managing PSTs Will Benefit Your Business A Guide to PST Files How Managing PSTs Will Benefit Your Business What are PST files? An unfamiliar term to those outside of IT, PST files are created by Outlook when the Auto Archive function is used.

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Chapter 5: Operating Systems Part 1

Chapter 5: Operating Systems Part 1 Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain

More information

Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner

Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner Learning to use a backup application is one of the most important things a user of a Windows computer can do. It is so important,

More information

Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile

Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging

More information

Recovering and Analyzing Deleted Registry Files

Recovering and Analyzing Deleted Registry Files Recovering and Analyzing Deleted Registry Files Andrew Case Digital Forensics Solutions [email protected] / @attrc I had a case recently where I was asked to investigate any signs of data exfiltration

More information

Cleaning your Windows 7, Windows XP and Macintosh OSX Computers

Cleaning your Windows 7, Windows XP and Macintosh OSX Computers Cleaning your Windows 7, Windows XP and Macintosh OSX Computers A cleaning of your computer can help your computer run faster and make you more efficient. We have listed some tools and how to use these

More information

ACS Backup and Restore

ACS Backup and Restore Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup

More information

The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software.

The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software. INSTALLATION & CONFIGURATION The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software. 1. System Requirements The following minimum system requirements

More information