Hiding Data in Hard-Drive s Service Areas
|
|
|
- Byron Jackson
- 10 years ago
- Views:
Transcription
1 Hiding Data in Hard-Drive s Service Areas Ariel Berkman <[email protected]> Recover Information Technologies LTD February 14, 2013 Contents 1 Introduction 1 2 Service Areas and Service Area Modules 2 3 Service Area Sizes 3 4 Other Reserved Areas 3 5 Data Hiding and Sanitation 4 6 Proof of Concept 4 7 Summary 6 1 Introduction In this paper we will demonstrate how spinning hard-drives service areas 1 can be used to hide data from the operating-system (or any software using the standard OS s API or the standard ATA commands to access the hard-drive). These reserved areas are used by hard-drive vendors to store modules that in 1 Sometimes referred to as Reserved area, System Area, Negative sectors, Firmware area, Microcode Area, etc. 1
2 turn operate the drive, and in a sense, together with the ROM, serve as the hard-drive s internal storage and OS. By sending Vendor Specific Commands (VSCs) directly to the hard-drive, one can manipulate these areas to read and write data that are otherwise inaccessible. This should not be confused with DCO 2 or HPA 3 which can be easily detected, removed and accessed via standard ATA commands. 2 Service Areas and Service Area Modules A service area is a logical area on the hard-drive (residing on the platters) set aside by hard-drive vendors for internally managing the drive. These areas are outside the hard-drive s Logical Block Address (LBA) space and as such are inaccessible via the standard ATA commands. As the complexity of hard-drives grow, so does the software and data required to manage that complexity, and correspondingly, the need for larger service areas. The service area contains both code and data modules such as defect management modules, SMART data modules, self-test modules and much more. Due to their importance, there are usually two copies of these modules, such that if one copy gets damaged or corrupted, the drive could continue to operate. Since these modules are responsible for the operability of the drive, corruption of these modules could result in a drive failure. Professional datarecovery labs have been using, since the inception of the field, data-recovery tools (e.g., Ace Laboratory s 4 PC3000) to access these service areas and repair, when possible, the critically damaged modules. In order to access the service area, Programmable IO must be used to send VSCs directly to the hard-drive s IO port. These commands are unique to the hard-drive vendor and are not publicly disclosed. Hard-drive vendors often release tools for manipulating hard-drive s functionality; these tools use VSCs to modify certain elements of the drive. One such example is Western- Digital s wdidle3.exe 5 (and its open source counterpart idle3-tools 6 ) which changes the way the hard-drive s built-in activity timer operate. Another 2 configuration overlay 3 Protected Area
3 example is the hddhackr 7 tool which modifies the service area modules in charge of the hard-drive identification information. 3 Service Area Sizes Service area size and service area module sizes vary significantly across harddrive vendors, families, capacities and firmware versions. For example, a WD2500KS-00MJB0 drive (Western-Digital, Hawk family, 250GB, Firmware version 02AEC) has two copies of its service area modules (on platter surfaces mapped to heads 0 and 1), each around 6MB in size. The reserved-area size on each surface is approximately 23MB (720 sectors-per-track x 64 tracks). Furthermore, since this drive has 6 surfaces (heads 0 through 5) and the service area modules copies are on surfaces mapped to heads 0 and 1, the corresponding areas on surfaces mapped to heads 2 through 5 are reserved, but not in use by the drive. As such the total reserved area size on such drives is approximately 141MB, of which 12MB is in use. In comparison, a WD10EACS-00ZJB0 drive (Western-Digital, Hulk family, 1TB) has two copies of its service area modules, each approximately 26MB. The reserved-area size on each surface is approximately 56MB (1280 sectors-per-track x 86 tracks). This drive has 8 surfaces (heads 0 through 7) and the service area modules copies are on surfaces mapped to heads 0 and 1. The rest of the reserved area is not in use. As such, the total reserved area sizes on such drives is approximately 450MB, of which 52MB is in use. 4 Other Reserved Areas In addition to areas reserved for service area modules, other forms of ATAinaccessible locations that require VSCs might be available: The hard-drive s flash chip is used for boot-strapping the drive. While usually very small (around 1MB), could contain some available space. Unused tracks past the hard-drive s LBA. Some hard-drives have disabled head(s) which map to a whole surface. By sending VSCs, one could theoretically enable that head, use that 7 3
4 entire unused surface to store data and then disable the head to render that data inaccessible. 5 Data Hiding and Sanitation The common notion in data sanitation is that data sanitation software tools, when properly used, will completely purge all data on the hard-drive. However, this does not apply to the aforementioned reserved areas, regardless of the employed data destruction method (e.g. single pass, multiple passes with random data, nulls, etc.). It s important to emphasize that the only way data can be written to reserved areas is by using the hard-drive s VSCs. For that reason, it s very unlikely that data would, for example, be accidentally copied or leaked 8 to these areas. It is however possible, although non-trivial to accomplish, that a software designed for that purpose, would be able to copy data to reserved areas such that they would not be sanitized despite any software sanitation efforts. Furthermore, software designed to manipulate the reserved areas - via the drive s VSCs - could use the reserved areas as a hiding place. Not only that these areas can t be sanitized (via standard tools), they cannot be accessed via anti-virus software, computer forensics tools, etc. 6 Proof of Concept In order to demonstrate the ability to hide data in the service area, we ve developed a proof-of-concept designed to work on Western-Digital 250GB Hawk hard-drives (available for download at These drives have 6 surfaces, each with 64 tracks (with 720 sectors-per-track) reserved for service area. The first two surfaces contain copies of the service area modules and are therefore not used in the POC (despite the unallocated areas which can also be used). The POC can read and write a file of upto 94MB to the reserved area (4 x 64 x 720 x An exception to this is when a hard-drive decides to re-allocate a suspected bad-sector, and re-maps that logical address to a new sector, leaving the original sector inaccessible to the user. However, the risk is minor due to the small amount of reserved sectors for this purpose and the inability to control when and where it will take place. 4
5 bytes). The code can result in data loss, or hard-drive failure, therefore use it at your own risk! In this example we demonstrate how the POC can be used to hide data that will not be sanitized (or accessible) using standard tools: Generate a random file (94MB in size) and compute its MD5 hash value. Write the file to the service area. Sanitize the drive by dd-ing /dev/zero onto the entire drive (the block device of the relevant hard-drive). Our understanding is that a complete, successful single pass of nulls (or any other byte) would suffice for the data to be rendered unrecoverable. Read the service area content and calculate its MD5 value to see the random data file is intact. root@shafan1:~/sa# dd if=/dev/urandom count= > random-file ; md5sum random-file records in records out bytes (94 MB) copied, s, 7.4 MB/s 0baca7245e1efa160512a6217c13a7b0 random-file root@shafan1:~/sa#./sa-cover-poc -p 0x0170 -w./random-file using port address: 0x0170 Model: WDC WD2500KS-00MJB0 S/N: WD-WCANK F/W Ver: 02.01C03 LBA24: LBA48: Service area sectors-per-track (720) Service area tracks (64) Num of heads(6) Unused reversed space ( bytes) writing head(2) track(-1) writing head(2) track(-2) writing head(2) track(-3)... writing head(5) track(-62) writing head(5) track(-63) writing head(5) track(-64) 5
6 dd if=/dev/zero of=/dev/sdb bs=1m dd: writing /dev/sdb : No space left on device records in records out bytes (250 GB) copied, s, 52.8 MB/s root@shafan1:~/sa#./sa-cover-poc -p 0x0170 -r after-dding-dev-zero using port address: 0x0170 Model: WDC WD2500KS-00MJB0 S/N: WD-WCANK F/W Ver: 02.01C03 LBA24: LBA48: Service area sectors-per-track (720) Service area tracks (64) Num of heads(6) Unused reversed space ( bytes) reading head(2) track(-1) reading head(2) track(-2)... reading head(5) track(-62) reading head(5) track(-63) reading head(5) track(-64) root@shafan1:~/sa# md5sum after-dding-dev-zero 0baca7245e1efa160512a6217c13a7b0 after-dding-dev-zero 7 Summary Spinning hard-drives contain reserved areas with non-negligible sizes that are used by hard-drive vendors to store service area modules. These areas can only be accessed and manipulated via VSCs (Vendor Specific Commands). By using VSCs, one can store data in these areas such that it would be effectively hidden to the OS and other tools using standard ATA commands. 6
Forensic Imaging of Hard Disk Drives
This white paper explores the area of a hard disk drive not usually examined for data, what it is and how to access it Forensic Imaging of Hard Disk Drives -What we thought we knew By Todd G. Shipley and
Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice
Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice Gareth Davies, Iain Sutherland Faculty of Advanced Technology University of Glamorgan CF37 1DL +44(0)1443 480480 {gddavies,
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000
Applications of Data Recovery Tools to Digital Forensics: Analyzing the Host Protected Area with the PC-3000 Richard Leickly and David Angell Circle Hook Data Recovery { Richard, David}@CircleHookDR.com
The Impact of Hard Disk Firmware Steganography on Computer Forensics
The Impact of Hard Disk Firmware Steganography on Computer Forensics Iain Sutherland Faculty of Advanced Technology University of Glamorgan CF37 1DL +44(0)1443 654085 isutherl @glam.ac.uk Gareth Davies
1 of 10 2009-08-25 02:01
1 of 10 2009-08-25 02:01 Forum search Hot News! Home Products Contacts Support Order now Register Our certificates Our previous site 2 of 10 2009-08-25 02:01 PC-3000 for Windows What is PC-3000 for Windows?
Case Study: Quick data recovery using HOT SWAP trick in Data Compass
Case Study: Quick data recovery using HOT SWAP trick in Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition Loss File loss or destruction Virus attack Accidental
Disk Imaging: A Vital Step in Data Recovery
White Paper Disk Imaging: A Vital Step in Data Recovery Andrei Shirobokov Chief Technology Officer DeepSpar Data Recovery Systems http://www.deepspar.com [email protected] Abstract Many data recovery
MRT Advanced HDD Repair and Data Recovery Training Course
MRT Advanced HDD Repair and Data Recovery Training Course The First Day A.M. Western Digital Course 1. The course overview based on the MRT data recovery 2. WD start-up procedures 3. How to handle due
Forensics and Hard Drive Data Imaging & Recovery: The Perils and Pitfalls of Working with Defective Hard Drives
Forensics and Hard Drive Data Imaging & Recovery: The Perils and Pitfalls of Working with Defective Hard Drives By Jonathan R. Yaeger April 22, 2013 Data Savers, LLC (770) 939-9363 [email protected]
Price/performance Modern Memory Hierarchy
Lecture 21: Storage Administration Take QUIZ 15 over P&H 6.1-4, 6.8-9 before 11:59pm today Project: Cache Simulator, Due April 29, 2010 NEW OFFICE HOUR TIME: Tuesday 1-2, McKinley Last Time Exam discussion
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
Tableau TD3 Forensic Imager 1.3.0. Test Results for Digital Data Acquisition Tool
Tableau TD3 Forensic Imager 1.3.0 Test Results for Digital Data Acquisition Tool July 23, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber
MFR IT Technical Guides
MFR IT Technical Guides Windows 7 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows Backup... 5 3.2 Windows System Image
Nasir Memon Polytechnic Institute of NYU
Nasir Memon Polytechnic Institute of NYU SSD Drive Technology Overview SSD Drive Components NAND FLASH Microcontroller SSD Drive Forensics Challenges Overview SSD s are fairly new to the market Whereas
Data recovery from a drive with physical defects within the firmware Service Area, unrecoverable using
SalvationDATA Data Recovery Example Application: Image from the HDD with serious bad sectors in the Data Area by Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition
Promise Pegasus R6 Thunderbolt RAID Performance
Introduction Promise Pegasus R6 Thunderbolt RAID Performance This document summarises the results of some performance testing I carried out on a Pegasus R6 Thunderbolt RAID drive from Promise Technologies
ATOLA INSIGHT. A New Standard In Data Recovery Equipment
ATOLA INSIGHT A New Standard In Data Recovery Equipment The Atola Insight is a brand new data recovery solution from Atola, creators of AFF Repair Station and HDD Unlock Wizard. It is a full, 360 degree
HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED?
Contact: James Lyle Computer Forensics Tool Testing Program Office of Law Enforcement Standards National Institute of Standards and Technology HAVE YOUR COMPUTER FORENSICS TOOLS BEEN TESTED? NIJ, DHS,
Media Disposition and Sanitation Procedure
Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...
Frequently Asked Questions August 2013. s840z SAS SSD Enterprise-Class Solid-State Device. Frequently Asked Questions
August 2013 s840z SAS SSD Enterprise-Class Solid-State Device Frequently Asked Questions Frequently Asked Questions Q: In what applications do HGST s840z SAS SSDs benefit enterprise customers? A: s840z
Qsan Document - White Paper. Performance Monitor Case Studies
Qsan Document - White Paper Performance Monitor Case Studies Version 1.0 November 2014 Copyright Copyright@2004~2014, Qsan Technology, Inc. All rights reserved. No part of this document may be reproduced
HP Notebook Hard Drives & Solid State Drives. Identifying, Preventing, Diagnosing and Recovering from Drive Failures. Care and Maintenance Measures
HP Notebook Hard Drives & Solid State Drives Identifying, Preventing, Diagnosing and Recovering from Drive Failures Care and Maintenance Measures Technical White Paper Table of contents Identifying, Preventing,
ATOLA INSIGHT A New Standard in Data Recovery Technology
ATOLA INSIGHT A New Standard in Data Recovery Technology The Atola Insight is a brand new data recovery product from Atola Technology. It is a full 360 degree solution made by data recovery professionals
EaseUS Partition Master
Reviewer s Guide Contents Introduction... 2 Chapter 1... 3 What is EaseUS Partition Master?... 3 Versions Comparison... 4 Chapter 2... 5 Using EaseUS Partition Master... 5 Partition Manager... 5 Disk &
Recover data from a defective Fujitsu desktop drive
Data Compass - Case Study Recover data from a defective Fujitsu desktop drive Symptom: Data on the Fujitsu desktop drive is not accessible directly by the client. The initial diagnosis implies that the
How to Start a Data Recovery Business?
How to Start a Data Recovery Business? How to start a data recovery business? Who are the data recovery customers? What are their demands? Where to find the best data recovery equipments and tools? What
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later
NEC ESMPRO Manager RAID System Management Guide for VMware ESXi 5 or later 856-127900-613-G 7th Edition Jun. 2015 Copyright NEC Corporation 2015. Trademarks NEC EXPRESSBUILDER is trademarks of NEC Corporation.
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Intel Solid State Drive Toolbox
3.3.6 Document Number: 325993-027US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending
PC Boot Considerations for Devices >8GB
X3T10 95-321 Rev 1 PC Boot Considerations for Devices >8GB Overview This is a draft of a document proposed in the System Issues Study Group meeting held on 7/12/95 in Colorado Springs. It is intended to
Optimizing LTO Backup Performance
Optimizing LTO Backup Performance July 19, 2011 Written by: Ash McCarty Contributors: Cedrick Burton Bob Dawson Vang Nguyen Richard Snook Table of Contents 1.0 Introduction... 3 2.0 Host System Configuration...
QuickSpecs. HP Smart Array 5312 Controller. Overview
Overview Models 238633-B21 238633-291 (Japan) Feature List: High Performance PCI-X Architecture High Capacity Two Ultra 3 SCSI channels support up to 28 drives Modular battery-backed cache design 128 MB
IDE/ATA Interface. Objectives. IDE Interface. IDE Interface
Objectives IDE/ATA Interface In this part, you will -Learn about each of the ATA standards -Identify the ATA connector and cable -Learn how to set jumpers for master, slave and cable select configurations
Chapter 9: Peripheral Devices: Magnetic Disks
Chapter 9: Peripheral Devices: Magnetic Disks Basic Disk Operation Performance Parameters and History of Improvement Example disks RAID (Redundant Arrays of Inexpensive Disks) Improving Reliability Improving
Introduction to I/O and Disk Management
Introduction to I/O and Disk Management 1 Secondary Storage Management Disks just like memory, only different Why have disks? Memory is small. Disks are large. Short term storage for memory contents (e.g.,
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
Intel Solid State Drive Toolbox
3.3.5 Document Number: 325993-026US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending
Crash Proof - Data Loss Prevention
Crash Proof - Data Loss Prevention Software Crash Proof - Data Loss Prevention Crash Proof is data loss prevention software which once installed revives 100% data in the event of a data loss situation.
Introduction Disks RAID Tertiary storage. Mass Storage. CMSC 412, University of Maryland. Guest lecturer: David Hovemeyer.
Guest lecturer: David Hovemeyer November 15, 2004 The memory hierarchy Red = Level Access time Capacity Features Registers nanoseconds 100s of bytes fixed Cache nanoseconds 1-2 MB fixed RAM nanoseconds
Customizing Boot Media for Linux* Direct Boot
White Paper Bruce Liao Platform Application Engineer Intel Corporation Customizing Boot Media for Linux* Direct Boot October 2013 329747-001 Executive Summary This white paper introduces the traditional
Intel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Models Smart Array 6402A/128 Controller 3X-KZPEC-BF Smart Array 6404A/256 two 2 channel Controllers
Overview The SA6400A is a high-performance Ultra320, PCI-X array controller. It provides maximum performance, flexibility, and reliable data protection for HP OpenVMS AlphaServers through its unique modular
Siemens AG 2013. LOGO! App V1.0.0 LOGO! Edition 03/2013. Manual. Answers for industry.
LOGO! App V1.0.0 LOGO! Manual Edition 03/2013 Answers for industry. The free of charge LOGO! App enables you to monitor actual process values of your LOGO! 0BA7 application with a smart phone or a tablet
Support for Storage Volumes Greater than 2TB Using Standard Operating System Functionality
Support for Storage Volumes Greater than 2TB Using Standard Operating System Functionality Introduction A History of Hard Drive Capacity Starting in 1984, when IBM first introduced a 5MB hard drive in
NAND Flash & Storage Media
ENABLING MULTIMEDIA NAND Flash & Storage Media March 31, 2004 NAND Flash Presentation NAND Flash Presentation Version 1.6 www.st.com/nand NAND Flash Memories Technology Roadmap F70 1b/c F12 1b/c 1 bit/cell
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
USTM16 Linux System Administration
USTM16 Linux System Administration Lesson 4: Memory Management and Backups Instructor: Peter Chung ([email protected]) Peter Chung (cspeter) 1 GNOME System Monitor A graphical user interface to display
RAID Storage System of Standalone NVR
ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Hardware; Recording & Storage Model: XNR-4200, GNR-2000 Firmware: Software: Author: Ando.Meritee Published: 2011/05/04 Reviewed:
Solid State Drive (SSD) FAQ
Solid State Drive (SSD) FAQ Santosh Kumar Rajesh Vijayaraghavan O c t o b e r 2 0 1 1 List of Questions Why SSD? Why Dell SSD? What are the types of SSDs? What are the best Use cases & applications for
Installing a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD
In order to fulfil the operational needs, different web hosting providers offer different models of hard drives. While some web hosts provide Enterprise HDDs, which although comparatively expensive, offer
Computer Setup (F10) Utility Guide Business PCs
Computer Setup (F10) Utility Guide Business PCs Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
data recovery specialists
data recovery specialists Last year we helped thousands of clients to recover data from media including hard disk drives, RAID, USB drives, tapes and even mobile phones. This is why clients such as MITIE,
Chapter 10: Mass-Storage Systems
Chapter 10: Mass-Storage Systems Physical structure of secondary storage devices and its effects on the uses of the devices Performance characteristics of mass-storage devices Disk scheduling algorithms
The Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes
Intel Matrix Storage Manager 8.x
Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Solid State Drive Architecture
Solid State Drive Architecture A comparison and evaluation of data storage mediums Tyler Thierolf Justin Uriarte Outline Introduction Storage Device as Limiting Factor Terminology Internals Interface Architecture
Samsung Portable SSD T1
Samsung Portable SSD T1 1 LEGALITIES LEGAL DISCLAIMER SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE. Products and specifications discussed herein
QuickSpecs. Models HP Smart Array E200 Controller. Upgrade Options Cache Upgrade. Overview
Overview The HP Smart Array E200 is HP's first entry level PCI Express (PCIe) Serial Attached SCSI (SAS) RAID controller. The full size card has 8 ports and utilizes DDR1-266 memory. The E200 is ideal
Updating Your Firmware
Updating Your Firmware WARNING: This firmware update is only valid for OCZ VERTEX Solid State Drives Flashing your Vertex will result in complete data loss. Please back up your drive before proceeding
PC Base Adapter Daughter Card UART GPIO. Figure 1. ToolStick Development Platform Block Diagram
TOOLSTICK VIRTUAL TOOLS USER S GUIDE RELEVANT DEVICES 1. Introduction The ToolStick development platform consists of a ToolStick Base Adapter and a ToolStick Daughter card. The ToolStick Virtual Tools
COS 318: Operating Systems. Storage Devices. Kai Li Computer Science Department Princeton University. (http://www.cs.princeton.edu/courses/cos318/)
COS 318: Operating Systems Storage Devices Kai Li Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Today s Topics Magnetic disks Magnetic disk performance
Challenges and Solutions for Effective SSD Data Erasure
Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional
Forensic Analysis of a Sony Play Station 3 Gaming Console
Forensic Analysis of a Sony Play Station 3 Gaming Console Scott Conrad [email protected] Greg Dorn [email protected] J. Philip Craiger [email protected] ational Center for Forensic Science 12354
True Data Disaster Recovery. PRESENTATION TITLE GOES HERE Matthew Kinderwater icube Development (Calgary) Ltd.
PRESENTATION TITLE GOES HERE Matthew Kinderwater icube Development (Calgary) Ltd. Who We Are: Provide data recovery / data redundancy / disaster plan consulting services worldwide. Operate one of the largest
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Atola Insight Forensic
Atola Insight Forensic Manual Revision 1.0 Package contents Please make sure that you have the following items in the package: DiskSense unit Power supply 4x HDD esatap cables 1x IDE interface cable 1x
Chapter 12: Mass-Storage Systems
Chapter 12: Mass-Storage Systems Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure
AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures
AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
udrive-usd-g1 Embedded DOS micro-drive Module Data Sheet
4D SYSTEMS udrie-usd-g1 Embedded DOS micro-drive Module Document Date: 2nd April 2009 Document Revision: 2.0 Page 1 of 9 udrie-usd-g1 Embedded DOS micro-drive 4D SYSTEMS Description Features The is an
Taurus Super-S3 LCM. Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives. User Manual March 31, 2014 v1.2 www.akitio.
Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives User Manual March 31, 2014 v1.2 www.akitio.com EN Table of Contents Table of Contents 1 Introduction... 1 1.1 Technical Specifications...
Programming NAND devices
Technical Guide Programming NAND devices Kelly Hirsch, Director of Advanced Technology, Data I/O Corporation Recent Design Trends In the past, embedded system designs have used NAND devices for storing
Frequently Asked Questions: EMC UnityVSA
Frequently Asked Questions: EMC UnityVSA 302-002-570 REV 01 Version 4.0 Overview... 3 What is UnityVSA?... 3 What are the specifications for UnityVSA?... 3 How do UnityVSA specifications compare to the
N8103-149/150/151/160 RAID Controller. N8103-156 MegaRAID CacheCade. Feature Overview
N8103-149/150/151/160 RAID Controller N8103-156 MegaRAID CacheCade Feature Overview April 2012 Rev.1.0 NEC Corporation Contents 1 Introduction... 3 2 Types of RAID Controllers... 3 3 New Features of RAID
Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
FRM301 SNMP Upgrade Procedure
The information within this document is intended for experienced service personnel with knowledge of TCP/IP networking, PC networking configuration, serial terminal configuration and operation. Failure
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant
HP Smart Array 5i Plus Controller and Battery Backed Write Cache (BBWC) Enabler
Overview HP Smart Array 5i Plus Controller and Battery Backed Write Cache (BBWC) Enabler Models Smart Array 5i Plus Controller and BBWC Enabler bundled Option Kit (for ProLiant DL380 G2, ProLiant DL380
Lecture 16: Storage Devices
CS 422/522 Design & Implementation of Operating Systems Lecture 16: Storage Devices Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
HP Z Turbo Drive PCIe SSD
Performance Evaluation of HP Z Turbo Drive PCIe SSD Powered by Samsung XP941 technology Evaluation Conducted Independently by: Hamid Taghavi Senior Technical Consultant June 2014 Sponsored by: P a g e
File Recovery: Find Files You Thought Were Lost F 2/1. Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin!
File Recovery: Find Files You Thought Were Lost F 2/1 Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin! With the information in this article you can: Save yourself
COS 318: Operating Systems. Storage Devices. Kai Li and Andy Bavier Computer Science Department Princeton University
COS 318: Operating Systems Storage Devices Kai Li and Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall13/cos318/ Today s Topics! Magnetic disks!
Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization
Lesson Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization AE3B33OSD Lesson 1 / Page 2 What is an Operating System? A
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
PL2775 JBOD / BIG / RAID0 / RAID1 Mode Application
Application Note PL2775 USB 3.0 to Dual SATA Bridge Controller User Manual (JBOD/BIG/RAID0/RAID1 Mode Features) Introduction The PL2775 is a low-power single-chip SuperSpeed USB 3.0 to Dual SATA II compliant
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
