GOOGLE DESKTOP FORENSICS WIN!
|
|
|
- Adelia Ray
- 9 years ago
- Views:
Transcription
1 The Quarterly Magazine for Digital Forensics Practitioners WIN! A STEGALYZER USB FROM SARC ISSUE 15 MAY 2013 INSIDE / Cryptographic Key Recovery / Tunnelling Out: Data Extraction / Fuzzing Risks in Software Tools / Timeline Creation & Review GOOGLE DESKTOP FORENSICS Google desktop use in Digital Forensic examinations Issue 15 / TR Media / REGULARS NEWS, 360, irq, LEGAL & more / INTRODUCING Registry Recon HOW IT WAS DEVELOPED / FROM THE LAB StegAlyzer: DETECTING Steganography IN THE FIELD / Book Reviews Windows Forensic Analysis Toolkit
2 / FEATURE RAISING THE BAR IN WINDOWS REGISTRY FORENSICS Mark Spencer explains the story behind the development of Registry Recon. / INTERMEDIATE The Microsoft Windows Registry ( Registry ) is a complex database containing valuable evidence related to hardware, software, and users. At a very basic level, the Registry is composed of hives that contain keys and values which are similar in some ways to folders and files. The Registry is continually referenced during Windows operation so large volumes of Registry information can always be found both on disk and in live memory. Digital forensics and incident response ( DFIR ) practitioners have been digging into the Registry in various forms for over 20 years. You might be surprised by that given the archaic state of Registry forensics that continues to persist in many ways to this day. I m sure I m not the only member of our community whose pleas to vendors to improve the Registry functionality of their tools went unanswered. Generally speaking, DFIR tools have allowed us to analyse one Registry hive at a time. If we are only concerned with the active Registry, as it exists in a handful of hives on disk, this type of workflow is frustrating but manageable. It quickly devolves into complete insanity if we concern ourselves with the vast number of hives which exist in live memory, swap, hibernation, backups, and unallocated space. Should we be concerned with what often amounts to thousands of hives that exist beyond the active SAM, SECURITY, SOFTWARE, SYSTEM, and NTUSER.DAT/UsrClass.Dat files on disk? Perhaps a better question is, how can DFIR practitioners disregard thousands of hives, case after case? Would you go to a car wash that only cleaned your front bumper? I hope my analogy is so absurd that you consider very carefully what I am asking here. By taking all the hives in a piece of evidence into account, we are able to gain insight into how Registries from both the current and previous installations (to the extent their hives still exist in unallocated space) of Windows have changed over time. / Registry Recon Development I never thought my company would be involved in software development, but we were left with no choice. We decided to develop Registry Recon upon realizing no one else was going to address the fundamental issue that thousands of hives in countless pieces of evidence were being left untapped by existing tools and methodologies. Our first priority was to seamlessly harvest as many hives as possible from a piece of evidence to lay a solid foundation for processing and analysis. This ended up being more difficult than we envisioned, and eventually required building our own image mounter so that Volume Shadow Copies ( VSCs ) could be parsed properly. The end result allows users to simply click Add on a piece of evidence and active, backed up (restore points, VSCs, etc.), temporary (swap) and deleted (unallocated) hives are then ingested into the database. Our second priority involved Hive Association and Registry rebuilding. It was very important to us that regardless of how many hives we found and where we found them, our tool had to be able to connect those hives and rebuild all the Registries they represented in a historical fashion. We had two cases within months of each other which involved IT departments that had re-imaged and re-deployed laptops to new employees, before it became apparent that the former employees would In the pursuit of readability, when I refer to hive in this article I am referring to the files that support hives e.g. SAM, SECURITY, SOFTWARE, SYSTEM, and NTUSER.DAT/UsrClass.dat. Recon Registries 67
3 / FEATURE Recon View be defendants in civil litigation. The amount of time our team had to spend on manually carving and associating hives from unallocated space on these laptops makes me cringe to this day. You could say that programmatically associating hives and rebuilding the Registries they belonged to, was on our minds constantly after dealing with these two cases. Our third priority was the development of additional technologies to facilitate the analysis of the large numbers of hives we knew were waiting for us. We knew that simply putting all of the information contained in these hives in front of users in the traditional ways would be overwhelming and basically dead on arrival. In addition to the hive association and Registry rebuilding I mentioned above, we developed the concepts of Recon View, Instances, and Key History. Recon View is where users view the values contained within keys. By default, we only show the user unique values (based on each value s name and data) in a key over time. We also show the user the date and times associated with each unique value s parent key, as well as the number of times (Instances) we found that value in a piece of evidence. We provide two levels of nesting (Instances) for each unique value; all the times the value is associated with, per all the instances of its parent key, and then a list of all the locations a unique value at a unique time was found. / RegRipper RegRipper (now consolidated on one site google.com/p/regripper/) has an active community building plug-ins to perform various types of analysis on particular hives. RegRipper s author, Harlan Carvey, frequently posts on his Windows Incident Response blog about Registry analysis. I recommend checking out his blog as soon as you are done with this article, particularly topics regarding registry redirection/reflection, malware, and ShellBags. Our users sometimes run RegRipper plugins against hives carved from a piece of evidence by Registry Recon. Key History allows users to see a list of all the times associated with each key in a rebuilt Registry. A user can select a key at a particular time and it will be displayed at is appeared at that time. While we envisioned most of our users would analyse Registry data using the default view which displays unique values in a historical fashion, we knew that we had the ability to show our users keys at particular points in time; so we gave them that option. We also had other priorities, which were not quite as unique as these first three. E.g. we were frustrated by how few tools were able to parse deleted keys within hives, which should have been one of the priorities for any DFIR developer. We were also irritated with databases that were difficult to move between forensic workstations and export options which were not spreadsheet friendly. You will be pleased to find that we have addressed all of these priorities. Can some of these new technologies be a bit obtuse, particularly Instances? Of course! Diving into the intricacies of new technologies often is. The reward for mastering these technologies is very significant, as you will be wielding a very unique and powerful DFIR weapon. / Good Hunting We have found over the years that DFIR practitioners digging into Registry information tend to be most interested in the analysis of document, application, network, USB storage, and malware activities. In the past, analysing a handful of readily accessible Registry hives became relatively standard practice. By taking into account what often amounts to thousands of hives, Registry Recon now provides DFIR practitioners with the ability to see vast amounts of historical Registry information related to these activities. We don t get tired of hearing that our users are reanalysing old cases to learn more about their evidence! As there are constraints related to the size of this article, I ll get into more detail regarding these types of analyses 68 Digital / ForensicS
4 using some sample Windows 7 Registry keys. Please keep in mind that Registry redirection/reflection may come into play with some of these keys e.g. without reviewing the SOFTWARE\Wow6432Node subkeys, you may be left with an incomplete picture of the application and malware activity I discuss below. / Document Activity The RecentDocs key, a/k/a Recently Used Documents, is a well-known location in the Registry related to document activity. While RecentDocs and its subkeys can be quite illuminating, keep in mind there are many other keys you may be interested in as well. Keys containing MRU (Most Recently Used) lists may be particularly helpful to you. MRU lists are maintained by Windows, Office and thirdparty applications. Explorer\RecentDocs Explorer\ComDlg32\OpenSavePidlMRU NTUSER.DAT\Software\Nico Mak Computing\WinZip\mru / Application Activity One of the first things we like to do with Registry analysis is get a feel for what applications have been installed and uninstalled over time. We recommend checking out the root of the Software hive, the Software subkeys in each NTUSER. DAT hive, and the Windows Uninstall and App Paths keys. Something we also like to do early in our Registry analysis is get a feel for which account ran each application and when by reviewing the UserAssist key. Software\ NTUSER.DAT\Software Software\Microsoft\Windows\CurrentVersion\Uninstall Software\Microsoft\Windows\CurrentVersion\App Paths Explorer\UserAssist / Network Activity Our users in law enforcement have been particularly interested in keys related to network connections, and more specifically, wireless network connections. They have always been able to see a variety of details related to the last network their suspects connected to, but now they are able to see network connections over time. In addition to network connections, we are often interested in MRUs related to remote access as well. Interfaces Software\Microsoft\Windows NT\CurrentVersion\ Software\Microsoft\Terminal Server Client\Default NTUSER.DAT\Software\RealVNC\vncviewer\MRU / USB Storage Activity Identifying not only when USB storage devices were last attached to computers, but when they were attached over time, has become very important to our cases involving intellectual property theft. Registry keys related to USB Raw Devices, Disk Devices, Volume Devices and more help us determine when these devices have been attached over time, what their volume names were, and what drive letters they were assigned. Software\Microsoft\Windows Portable Devices\Devices Explorer\MountPoints2 System\MountedDevices / Malware Activity Confirming that malware has been executed on a system may be possible by reviewing the AppCompatCache key. Malware tends to maintain persistence by using Registry keys related to autorun, so these keys may help you spot red flags. AppCompatCache Run Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ System\CurrentControlSet\Control\Session Manager\ KnownDlls USB Storage 69
5 / FEATURE USBOblivion / Registry Scrubbing Registry scrubbing features in tools such as WhiteCanyon s SecureClean and Piriform s CCleaner have been around for many years. These features have targeted Registry keys that are often useful to DFIR practitioners. While this type of scrubbing could be problematic, it has not been catastrophic in the sense that the number of targeted keys has been relatively limited. With the introduction of tools such as USB Oblivion however, particular types of Registry keys are being more carefully targeted. Straight from the USB Oblivion s Google Code site USBOblivion utility designed to erase all traces of USB connected drives and CD-ROMs from the registry in Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8 32/64-bit versions. We have done some testing of USB Oblivion at Arsenal, and we can say it is very effective when it comes to the active Registry. Since Registry Recon ingests all the hives from restore points and VSCs, you might think you have defeated Registry scrubbing. To some extent, this is true. I am only aware of one tool with Registry scrubbing functionality (CCleaner) that will also delete restore points. It s only a matter of time however before more of these tools delete not only restore points but volume shadow copies (and other backups) as well. As Registry scrubbing tools become more effective in this regard, ingesting hives from live memory captures and unallocated space will become even more important. / Other Advancements We believe we have improved the state of Registry forensics in some very significant ways, but I am the first to acknowledge that the tool doesn t do everything for everyone. We still have a lot of work to do! Volatility s Technology Preview edition has a regdump module that extracts all the hives from a live memory capture. This is an awesome function and I m not aware of any other tools capable of extracting all the hives from a live memory capture. Registry Recon can ingest these hives once Volatility has extracted them and essentially rebuild the Registry, as it existed in live memory. We have been placing some spreadsheets in the Resources section ( of our website that some of you may be interested in. One set of spreadsheets is related to our Registry Key Mapping project. We are not talking about rocket science here; these spreadsheets simply track the keys added during the installation of particular applications as well as which keys are removed during their removal. We take requests; so if there are any applications you want us to hit please let me know. Another couple spreadsheets we ve published contain all the keys we know of that are related to USB storage devices and autorun functionality. Back to the work that we have to do; our development queue has become quite large. In addition to implementing our own ideas and associated R&D, we have received great suggestions from consultants, law enforcement, and the military. Some of the more straightforward improvements we have in the queue include automatic value decoding, direct support for live memory captures, greatly improving searching, bookmarking, and reporting functionality, and performance tuning. Law enforcement in particular has been interested in more pre-built reports and global shortcuts. Other features in the queue will be a bit more eye opening once we weaponise them. / In Closing Soon, rather than asking why DFIR practitioners are disregarding thousands of hives in case after case, I hope to be talking about how those same practitioners are now harnessing and leveraging them. / / Author Bio Mark Spencer is President of Arsenal Recon, where he leads the development of innovative digital forensics and incident response tools which include Registry Recon. Mark has over 15 years of law-enforcement and private-sector experience in digital forensics. He has been an adjunct professor at Bunker Hill Community College in Boston and an instructor at the Computer Security Institute. Mark is also President of Arsenal Consulting, where his team provides exceptional digital forensics services to law firms, corporations, and government agencies. Arsenal Recon and Consulting are located in the Chelsea Naval Magazine, a historic military structure which once stored arms for the USS Constitution, just outside Boston, Massachusetts. 70 Digital / ForensicS
6
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012
Advanced Registry Forensics with Registry Decoder Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Who am I? Senior Security Researcher @ DFS Published Researcher
Windows 7 Forensic Analysis. H. Carvey Chief Forensics Scientist, ASI
Windows 7 Forensic Analysis H. Carvey Chief Forensics Scientist, ASI Introduction Who am I? Chief Forensics Scientist at ASI. Forensic Nerd. Published Author. Why are we here? To talk about Windows 7 Forensic
Registry Analysis SANS Forensic Summit 2009
Registry Analysis SANS Forensic Summit 2009 Allow myself to introduce myself 2 What is Registry Analysis?? More than just opening Registry files in a viewer and finding values Registry analysis involves:
Clickfree The Effortless Backup Solution
Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
QUICK START GUIDE. Draft twice the documents in half the time starting now.
QUICK START GUIDE Draft twice the documents in half the time starting now. WELCOME TO PRODOC Thank you for choosing ProDoc, your forms solution to save time and money, reduce errors, and better serve your
GUIDE A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS
GUIDE A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS TABLE OF CONTENTS A GUIDE TO FINDING IMPORTANT BUSINESS APPLICATION & OS ARTIFACTS FOR
1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer
1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
Software Installation and Creating a New Company
Chapter 1 Software Installation and Creating a New Company OBJECTIVES: 1 System Requirements 2 Software Installation 3 Starting QuickBooks and Creating a New Company 4 Backing up Company Data 5 QuickBooks
Windows 7 Virtualization Technologies
Windows 7 Virtualization Technologies Advanced Forensic Topics Virtualization Technologies Integrated Virtual Hard Drive (VHD) Creation and Mounting Boot to Virtual Hard Drive (VHD) VHD File Use in System
Q1. What are the differences between Data Backup, System Restore, Disk Image, System Recovery Disc and System Repair Disk?
Windows Q & A April 2012 By Mary Phillips, Secretary, Icon Users Group, MO April 2011 issue, The ICON-Newsletter of the Interactive Computer Owners Network www.iconusersgroup.com [email protected]
If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista
16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual
HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3
EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS
Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.
Close Support Service Desk v 3.00. Upgrade Guide
Close Support Service Desk v 3.00 Upgrade Guide I Close Support Service Desk v 3 Upgrade Manual Table of Contents Part I Upgrading from version 2.95 2 1 Prerequisites... 2 2 Potential version... conflicts
`````````````````SIRE USER GUIDE
`````````````````SIRE USER GUIDE Table of Contents INTRODUCTION 3 SYSTEM REQUIREMENTS 4 RUNNING SANDISK BACKUP 5 Setup Your First Backup 6 Create Your Backup 7 Custom Backup 8 Dmailer Online 10 Launch
Business Virtualization
Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15
Augmenting VMware View Horizon (VDI) with Micro Focus Client Management
White Paper ZENworks Augmenting VMware View Horizon (VDI) with Micro Focus Client Management Table of Contents page Making the VMware View Horizon Management Solution Work Beyond Your Wildest Dreams...2
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
Solution Brief: Creating Avid Project Archives
Solution Brief: Creating Avid Project Archives Marquis Project Parking running on a XenData Archive Server provides Fast and Reliable Archiving to LTO or Sony Optical Disc Archive Cartridges Summary Avid
Field Audit Report. Asigra. Hybrid Cloud Backup and Recovery Solutions. May, 2009. By Brian Garrett with Tony Palmer
Field Audit Report Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett with Tony Palmer May, 2009 Field Audit: Asigra Hybrid Cloud Backup and Recovery Solutions 2 Contents Introduction...
Yurbi: A New Paradigm In Business Intelligence
Yurbi: A New Paradigm In Business Intelligence Published: 8 May 2012 The term Business Intelligence was coined in the late 1950 s and the way some software is designed, you would think that we were still
Using the Windows XP Backup Wizard. Introduction. Open the Backup Wizard
Technology Department University of Maryland School of Law Office 8 [email protected] 0-706-77 Introduction A computer crash, hard drive failure or a virus can wipe out everything on your computer.
EnCase Forensic Product Overview
GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-687 Exam Name: Microsoft Configuring Windows 8 Exam Version: Demo QUESTION: 1 A company has an Active Directory
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Division of Administration (DOA) Desktop Support
Division of Administration (DOA) Desktop Support Computer Power Conservation Settings for XP & Vista Operating Systems XP Power Options Overview Using Power Options in Control Panel, you can reduce the
Solve your PST headaches with or without Archiving
Solve your PST headaches with or without Archiving Executive Summary The reasons that drive users to create and use PST files are well understood (Mailbox Quotas, the Outlook AutoArchive feature) and the
10.3.1.5 Lab - Data Backup and Recovery in Windows Vista
5.0 10.3.1.5 Lab - Data Backup and Recovery in Windows Vista Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: [email protected].
Business details Services and price list 2010 Monday Friday 10:00am 6:00pm Saturday 10:00am 5:00pm We offer professional IT services for home and business users at a cost effective price. We have a team
NetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
Using HP System Software Manager for the mass deployment of software updates to client PCs
Using HP System Software Manager for the mass deployment of software updates to client PCs Introduction... 2 HP manageability solutions... 2 SSM overview... 3 Software updates... 3 Why not SSM-enabled?...
Addressing Legal Discovery & Compliance Requirements
Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in
5 Group Policy Management Capabilities You re Missing
5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the
Deploying EFS: Part 2
Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
Understand Backup and Recovery Methods
Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows
ACADEMIC TECHNOLOGY SUPPORT
ACADEMIC TECHNOLOGY SUPPORT Tegrity: Getting Started with Lecture Capture (Last updated: 2/23/15) [email protected] 439-8611 www.etsu.edu/ats Table of Contents: Table of Contents:... 2 Overview... 1 Objectives...
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
12 NETWORK MANAGEMENT
12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking
Technical Procedure for Evidence Search
Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
USER MANUAL SlimComputer
USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: May 2008 Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 7 2. Installing the
USB Devices and Media Transfer Protocol. Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC
USB Devices and Media Transfer Protocol Identifying the Existence of Data Exfiltration Artifacts Nicole Ibrahim G-C Partners, LLC Importance Increasing adoption of MTP in portable devices Android Windows
File Management Windows
File Management Windows : Explorer Navigating the Windows File Structure 1. The Windows Explorer can be opened from the Start Button, Programs menu and clicking on the Windows Explorer application OR by
3 Ways to Restore Salesforce Data
White Paper 3 Ways to Restore Salesforce Data LEARN MORE AT WWW.SPANNING.COM OR CALL 512.236.1277 3 Ways to Restore Salesforce Data How do you know when you need to do more to protect your Salesforce data?
10 everyday things your data backup system should do. Data backup that is reliable, easy and fast is only the beginning
10 everyday things your data backup system should do Data backup that is reliable, easy and fast is only the beginning Table of Contents Backup and Restore 1 10 Everyday Challenges 1st People delete good
1. System Requirements
BounceBack Ultimate 14.2 User Guide This guide presents you with information on how to use BounceBack Ultimate 14.2. Contents 1. System Requirements 2. BounceBack Pre-Installation 3. How To Install The
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST
INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT
Introduction. There are several bits of information that must be moved:
Backup and restore on new hardware XProtect Professional VMS Products 2014: XProtect Enterprise 2014, XProtect Professional 2014, XProtect Express 2014, XProtect Essential 2014 Introduction This document
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Data Containers. User Guide
Data Containers User Guide Contents 1. Overview... 2 The backup... 2 The problem... 2 The solution... 2 Other advantages... 2 RDX granular restore... 2 Portable backups... 2 2. Creating a Data container
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC
WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5
Simple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
2013 Open Source Digital Forensics Conference
4 TH ANNUAL OSDF 2013 Open Source Digital Forensics Conference Doing More with Less Willi Ballenthin Consultant MANDIANT Introduc4on: Willi Ballenthin Professionally Incident response Malware analysis
Google Drive: Access and organize your files
Google Drive: Access and organize your files Use Google Drive to store and access your files, folders, and Google Docs, Sheets, and Slides anywhere. Change a file on the web, your computer, tablet, or
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Managing BitLocker With SafeGuard Enterprise
Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption
Carry it Easy. User Guide
Carry it Easy User Guide User Manual Version 3.2 2004-2010 CoSoSys Ltd. Carry it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 1 3. Installation...
Advanced Digital Forensics ITP 475 (4 Units)
Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Events Forensic Tools for Microsoft Windows
Events Forensic Tools for Microsoft Windows Professional forensic tools Events Forensic Tools for Windows Easy Events Log Management Events Forensic Tools (EFT) is a fast, easy to use and very effective
Life after Microsoft Outlook Google Apps
Welcome Welcome to Gmail! Now that you ve switched from Microsoft Outlook to, here are some tips on beginning to use Gmail. Google Apps What s Different? Here are some of the differences you ll notice
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service
CAS CLOUD WEB USER GUIDE UAB College of Arts and Science Cloud Storage Service Windows Version, April 2014 Table of Contents Introduction... 1 UAB Software Policies... 1 System Requirements... 2 Supported
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
A Guide to PST Files How Managing PSTs Will Benefit Your Business
A Guide to PST Files How Managing PSTs Will Benefit Your Business What are PST files? An unfamiliar term to those outside of IT, PST files are created by Outlook when the Auto Archive function is used.
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Chapter 5: Operating Systems Part 1
Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain
Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner
Use it or Lose it: Microsoft Windows Backup By Tom Dell, ntb group partner Learning to use a backup application is one of the most important things a user of a Windows computer can do. It is so important,
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile
Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile Even before being acquired by Microsoft in 2011, Skype had already established a strong presence in the VoIP and instant messaging
Recovering and Analyzing Deleted Registry Files
Recovering and Analyzing Deleted Registry Files Andrew Case Digital Forensics Solutions [email protected] / @attrc I had a case recently where I was asked to investigate any signs of data exfiltration
Cleaning your Windows 7, Windows XP and Macintosh OSX Computers
Cleaning your Windows 7, Windows XP and Macintosh OSX Computers A cleaning of your computer can help your computer run faster and make you more efficient. We have listed some tools and how to use these
ACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software.
INSTALLATION & CONFIGURATION The following pages describe the installation and configuration process of GPmicro s dinkum Backup Software. 1. System Requirements The following minimum system requirements
