Alternate Data Streams in Forensic Investigations of File Systems Backups

Size: px
Start display at page:

Download "Alternate Data Streams in Forensic Investigations of File Systems Backups"

Transcription

1 Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney and Abstract Backup utilities for the Windows environment are designed to work with the NTFS file format, but they typically provide only partial compatibility with Alternate Data Streams (ADSs) *. In particular, computer forensics tools are typically capable of discovering ADSs in the file system under investigation, but not necessarily in the backups of such file systems. We examined a number of commonly used backup utilities, and initially classified them into two broad categories: non-ads aware (ADS lost during backup), and ADS aware. Further, we discovered that within the "ADS aware" category different tools behave differently, provide varying amounts of information about ADSs during backup/restore process, and often lose data. We propose a new classification of backup software based on the treatment of ADSs during backup and restore operations, and discuss its implications for forensic investigation of file system backups. Keywords: computer forensics, Alternate Data Streams, NTFS, file systems, backup 1. Introduction Computer forensics is an emerging discipline that focuses on the gathering of evidence (often as part of a criminal investigation) from computers, computer networks, and in general from electronic media [5]. Alternate Data Streams (ADSs) are a unique feature of NTFS file systems introduced with Windows NT 3.1 in the early 1990s to provide compatibility between Windows NT servers and Macintosh clients which use Hierarchical File System (HFS). HFS uses streams named resource fork and data fork. Both streams (or forks) are linked to one name in the Macintosh file system. Resource forks are used to * Microsoft also uses the same acronym ADS in relation to Automated Deployment Services used in the Windows Server products range no connection to Alternate Data Streams. 1

2 store application metadata (icons, sounds, fonts, etc.). NTFS ADSs can provide additional descriptions for folders or files (creator, keywords, thumbnail preview, etc.), and can also be used to attach independent named data streams to an NTFS file or folder. Figure 1 shows a main unnamed stream has2ads.txt with two files cf.pdf and infoday.doc attached to the main file as two Alternate Data Streams. Figure 1 ADS visibility in NTFS and non-ntfs environments. Despite being a feature of the NTFS, ADSs are poorly documented by Microsoft. This may be the result of a conscious decision, as one can find statements in various Microsoft sources stating that ADSs may not be supported in future systems [3]. This statement of possible withdrawal of ADS support is meaningless for anyone working with a system using NTFS file format. NTFS went through many modifications and versions since ADSs were first introduced, and ADSs are still present in all current Windows Server editions, in Windows XP and in pre-release version of Windows Vista (to be released by the end of 2006). The volume of computer systems using NTFS is staggering, and it is a case of great concern for system administrators, computer forensic investigators, and indeed end users, that no standard graphic tools can show the NTFS streams. ADSs are also poorly supported by command line tools, standard file manipulation tools, and also backup utilities, both proprietary and third party. At the time this paper was written we were able to locate fewer than ten tools able to show ADSs, sometimes to add or extract an ADS. Some of them offer simple GUI interface, while some are command line based. Their description is beyond the scope of this paper. Most professional computer forensics tools are fully capable of investigating ADSs, but not in a fast, efficient way which could be compared to, say, copying a file using Windows Explorer. This paper concentrates on backup software capability to save and restore ADSs. We found that backup software provides very poor messages and log entries in relation to ADSs, and in many cases loses alternate streams completely without any warning. In other cases error or information messages are cryptic and difficult to understand. We propose a new classification of such software into five classes: Class 0 to Class 4. To determine which class a particular backup utility belongs to, we created a simple and reliable test environment. Our testing methodology is also presented in order to allow anyone to repeat the tests with any backup software, to determine its suitability to a specific task at hand, or to check what possible data loss has occurred already when the backup was done before the backup files reached the investigator. It should be stressed that the only aspect tested here is how ADSs are handled, as this is the main point of interest in the computer forensics field. The purpose of this paper is not to classify backup utilities according to their overall quality depending 2

3 on the specific environments different criteria may be more relevant. However, awareness of how ADSs are treated by specific backup software is very important in any environment, as formalizing backup/restore procedure may overcome peculiarities of the specific tool used, and minimize the potential impact of the tool imperfections. No brand names of backup utilities tested are mentioned here because of legal reasons. 2. Testing Methodology We provide a detailed description of the test environment to reinforce the understanding of the ADSs mechanism, and to allow anyone to replicate our experiments. When an operating system opens a file containing an NTFS alternate stream, by default it executes only the main stream [2]. However if a command supports ADSs, an alternate stream can be accessed using the following argument: file_name:stream_name Referring to Figure 1, the argument to access the document infoday.doc contained in the second alternate stream would be (note the : separator): has2ads.txt:infoday.doc To ensure that no contamination is introduced by additional tools, the environment was created using Windows Command prompt as shown in Table 1. Initially (Table 1a) three test files are placed on a freshly formatted diskette. A directory ad was created on an NTFS formatted hard disk C (Table 1b). Next (Table 1c) we created the first Alternate Data Stream: the file small.txt from diskette A: is attached as a ADS to folder C:\ads. Note that the command type used here is ADS aware, but the directory listing command dir is not; it does not show that the folder C:\ads has the alternate stream small.tx. In the next step (Table 1d, command echo) we created two one line text files: clean.txt and has2ads.txt Finally (Table 1e) we attach two test files cf.pdf and infoday.doc as Alternate Data Streams to the file has2ads.txt. Note that the directory listing command dir shows the same directory contents in step 1d and in step 1e, however total bytes free disk capacity shown in step 1e is decreased by the size of files cf.pdf and infoday.doc copied from the diskette. We completed creating a simple Alternate Data Streams test environment on NTFS disk C, which consists of: directory (folder) C:\ads with one ADS attached to the folder, inside this folder we have two files: one without ADS, and the other one with two ADSs attached. 3

4 Table 1 Creating test environment (a) C:\>dir a: Volume in drive A has no label. Volume Serial Number is 1CBE-EF8B Directory of A:\ 04/01/ :09 PM 49,744 cf.pdf 03/01/ :37 PM 51,712 infoday.doc 09/01/ :48 AM 18 small.txt 3 File(s) 101,474 bytes 0 Dir(s) 1,355,264 bytes free (b) C:\>mkdir ads C:\>cd ads (c) (d) C:\ads>dir Volume in drive C is SYSTEM Volume Serial Number is 7845-E3F6 Directory of C:\ads 09/01/ :46 PM <DIR>. 09/01/ :46 PM <DIR>.. 0 File(s) 0 bytes 2 Dir(s) 16,491,720,704 bytes free C:\ads>type a:\small.txt > :small.txt C:\ads>dir Volume in drive C is SYSTEM Volume Serial Number is 7845-E3F6 Directory of C:\ads 09/01/ :47 PM <DIR>. 09/01/ :47 PM <DIR>.. 0 File(s) 0 bytes 2 Dir(s) 16,491,720,704 bytes free C:\ads>echo This file is clean (no ADS) > clean.txt C:\ads>echo this file has two ADS (cf.pdf and infoday.doc) > has2ads.txt (e) C:\ads>dir Volume in drive C is SYSTEM Volume Serial Number is 7845-E3F6 Directory of C:\ads 09/01/ :49 PM <DIR>. 09/01/ :49 PM <DIR>.. 09/01/ :48 PM 30 clean.txt 09/01/ :49 PM 49 has2ads.txt 2 File(s) 79 bytes 2 Dir(s) 16,491,720,704 bytes free C:\ads>type a:\cf.pdf > has2ads.txt:cf.pdf C:\ads>type a:\infoday.doc > has2ads.txt:infoday.doc C:\ads>dir Volume in drive C is SYSTEM Volume Serial Number is 7845-E3F6 Directory of C:\ads 09/01/ :49 PM <DIR>. 09/01/ :49 PM <DIR>.. 09/01/ :48 PM 30 clean.txt 09/01/ :52 PM 49 has2ads.txt 2 File(s) 79 bytes 2 Dir(s) 16,491,614,208 bytes free 4

5 Each backup software tool was tested in NTFS file format environment and non-ntfs (FAT32) environment as follows (refer to Figure 2): folder C:\ads and its contents were backed up to NTFS disk (path 1), o the backup was restored to NTFS disk (path 2), o the backup was restored to FAT32 disk (path 3). folder C:\ads and its contents were backed up to FAT32 disk (path 4), o the backup was restored to FAT32 disk (path 5), o the backup was restored to NTFS disk (path 6). A case when the original resides on a non-ntfs media is not tested here, as it is trivial: ADS can not originate from non-ntfs file format media. Again, only one aspect of backup software is of interest here: retention or loss of ADSs, and messages relating to ADSs. Other aspects of backup tools like compression rate, network scalability, speed, error correction, etc. etc., are not relevant to this paper. We propose classification of backup tools into four classes, as detailed below. 3. Classification of ADS Handling Capabilities of Backup Software We examined backup sets created in NTFS and non-ntfs (FAT32) environments (see Figure 2). Not all data contained in an ADS is retained when a backup set is created, and not all data contained in a ADS is recreated when a backup is restored. For a computer forensics investigator it is crucial to select a method of restoring which does not cause any data loss, and to know what can be expected when the contents of a backup created by a specific software is investigated. We classified backup software into five groups depending on the level of ADS-awareness and the handling of alternate streams. Figure 2 Backing up and restoring data Class 0 (Figure 3): non-ads aware software, ADSs are ignored, and not backed up. This is a trivial case, and will not be further analysed here. Around 50% of tested tools belong to this group, including some commercial products. 5

6 Class 1 (Figure 4): ADS-aware software, which handles ADSs properly only within NTFS environment. Around 30% of tested backup tools belong to this group. Class 2 (Figure 5): ADS-aware software, which provides good compatibility between NTFS and non-ntfs environments. It offers the functionality of Class 1, but additionally it can backup intact ADSs from NTFS to non-ntfs file system environment, and restore them to NTFS environment (Figure 5, paths 4-6). Around 20% of tested backup tools belong to Class 2. One tool was unable to backup ADSs attached to a folder (it correctly backed up ADSs attached to files). Class 3 ADS-aware software, which can be seen as an unfinished implementation of Class 4, and it does not warrant closer investigation. It has all the capabilities of Class 4 (see below) with the exception of one: o it is unable to restore ADSs from a backup created on NTFS file system to non-ntfs media (Figure 2 path 3), or: o it is unable to restore ADSs from a backup created on non-ntfs media to NTFS media (Figure 2 path 6). Class 4 (Figure 2): ADS-aware software, which has complete ADS awareness in any environment. It can backup and restore the ADS part to NTFS or non-ntfs media. No software was found which could be classified as Class 3 or Class 4. Figure 3 ADS handling by Class 0 backup software (non-ads aware) Figure 4 ADS handling by Class 1 backup software 6

7 Figure 5 ADS handling by Class 2 backup software 4. Partly ADS-aware Backup Software (Class 1 and Class 2) A Class 1 tool is able to backup and restore ADSs if the operation is within NTFS environment (Figure 4, path 1-2). It fails to backup ADSs from NTFS to non-ntfs environment (Figure 4, paths 3 and 4). It is crucial for a computer forensics specialist to notice that Class 1 software is perfectly able to restore data to a non-ntfs disk, but no messages warning about the loss of data contained in ADS data would be generated. This is a practical observation, not a theoretical restriction. It would be possible for Class 1 software to warn that backup and restore environments differ, and warn against possible data loss. However this means that such a tool would check for the presence of alternate streams before generating a warning message thus implementing Class 2 (or even Class 4) behavior as explained below would be easy. Class 2 backup software uses the old block format, originally created for tape magnetic media [1]. Data read from a disk is stored as a set of logically sequential blocks. Terminology can vary depending on a specific implementation. The older, generic terms for major backup components are: tape header, data sets, on tape catalog information, end of media. Modern tape backup specification allows the use any common media backup, for example hard disks, removable cartridges, flash drives, etc., but basic tape style logic of storing data is retained. Class 2 backup software retains ADS data, but is unable to restore it to non-ntfs media (see Figure 5, paths 3 and 5). It is particularly dangerous to attempt to restore a backup which contains ADSs to a non-ntfs media. For example a backup from a NTFS disk to a FAT32 disk creates one of the following situations: backup software does not show any warning messages, and ADS data is lost, backup shows a warning message, but ADS data is still lost. 7

8 Figure 6 Restoring to FAT32 media: various warning message When attempting to restore a backup containing alternate NTFS streams to a FAT32 disk most tools generated unclear warning messages, or no warning messages. Figure 6 shows three typical examples of such warning messages when attempting to restore a backup containing alternate NTFS streams to a FAT32 disk. The first example (Figure 6a) shows a message which is completely insufficient and confusing; it says filename, directory name or volume label syntax is incorrect. It does not explain that the real problem is potential loss of alternate data streams. When the Ignore option is selected, restore operation proceeds, and the restore process does not generate any additional warnings, losing ADS in the process. Thus a computer forensics investigator could incorrectly assume that the restore succeeded, and that no data was lost. Figure 6b shows an example of a proper warning message generated by software during an attempt to restore a backup which contains alternate NTFS streams to a FAT32 disk. The message only states that the target file system does not support all features of the original file system, thus some data may not be restored. It may still not be clear to a person doing the restore what are those some unsupported features, and it may not be obvious that proceeding with the restore will cause ADS loss in restored files and folders. A software tool used in this example was not designed to scan, discover and list ADS data, it only sensed that the backup created in NTFS environment is being restored to a different environment, and thus produces a generic warning. 8

9 Figure 6c shows an example of an informative warning message generated during an attempt to restore a backup containing alternate NTFS streams to FAT32 disk. While the term ADS is not used, the message clearly lists alternate data streams found in the backup set, the list uses correct syntax, and warns specifically which streams will be lost if the restore process continues. 5. Fully ADS-aware Backup Software (Class 3 and Class 4) Class 3 software can be seen as an unfinished or logically incomplete implementation of Class 4 software, with one path missing (Figure 2, path 3 or path 5 is not implemented). We did not find any Class 3 software; it appears likely that it could exist only as an intermediate development stage leading to a full Class 4 implementation. Class 4 software (for path references see Figure 2) is fully ADS-aware, and it should be able to: Backup files and folders with ADSs to NTFS environment (path 1), Restore the backup and all ADSs to both NTFS and non-ntfs environments (path 2 and path 3), Backup files and folders with ADSs to non-ntfs environment (path 4), Restore the backup and all ADSs to both NTFS and non-ntfs environments (path 5 and path 6). We did not find any Class 3 or Class 4 software. It would be relatively easy to implement Class 4, as all data structures required to handle ADSs are already internally defined by software which belongs to Class 2. Class 2 internals show definitions of blocks and headers needed to handle structures unique to NTFS file system, like sparse data, Alternate Data Streams, etc. As an example, Seagate Software tape format specification [4] provides definitions for Windows NT Stream structures to be stored within its data set, and allocates a label within a stream header named NTFS_ALT_STREAM. Despite that there are no backup utilities capable of restoring ADSs outside the NTFS file system environment. 6. Recommended Forensic Methodology The role of backup is different for the end user and for a computer forensics investigator. The end user, or a person responsible for an organisation system data backup policy, sees a backup as a mechanism to save, and later to restore selected files and folders. The process is completed once the data has been restored [7]. For a computer forensics investigator on the other hand, restoring data is only the first step in the process of analysing what the files and folders contain [6]. It is not immediately known what software was used to create a backup being analysed; this 9

10 has to be discovered by looking at the backup contents with forensic tools. Typically the procedure used to create the backup is also not known. This information, however, is typically not hidden and is easy to discover even without knowing the internal structure of software: for example checking the backup file contents with a HEX editor shows readable sections which include the backup software name and version. Once the name and version of the backup software used is known, an investigator can find more information about its internal data structure. Using the same software an investigator can also run tests confirming which class of software it is, what are its peculiarities, and how to restore the backup without loosing ADSs. While in theory it would be possible to develop tools to read the contents of a backup set without restoring it, the amount of work and cost involved in developing such a tool could not be justified. There are too many different software packages with different backing up and compression algorithms. Moreover there are often considerable differences between different versions of the same software. Thus, in a process of forensic discovery where a backup has to be restored, the restored data has to be scanned to determine the presence of ADSs, and ADSs need to be extracted. Various tools can be used to achieve this, though their description and extraction process is not described here. The only safe procedure when using Class 1 or Class 2 software is to restore into NTFS file system target. If a backup set is restored to non- NTFS media, ADSs will be lost, and the whole computer forensics process invalid. Class 4 backup software would speed up the process of ADS extraction, and make it more reliable. Restoring a backup which includes ADSs to non-ntfs environment would allow for the extraction of all ADSs in a single restore step into specified folders. This would eliminate the need to use separate steps and tools for ADS discovery and extraction. If the same software which had been used to originally create the backup is used to restore, and also to extract ADSs, the ADS extraction is formally more trustworthy. There is no need to prove in a court of law that correct additional scanning and extracting tools were selected. 7. Conclusions and Future Work ADSs are widely used, but poorly documented and poorly supported by existing tools. ADS-awareness in all types of software utilities is generally very low. NTFS alternate streams create a perfect mechanism to hide huge amount of information; the main, visible stream can be a small file, but ADSs attached to it can be of any format and size limited only by other system factors. It is also possible to hide executables and malicious code in alternate streams. Unexpected behaviour of backup software when handling ADSs is of particular relevance in the computer forensics field, where in order to analyse files contained in a backup image an investigator needs to perform a restore. Backup software typically uses data compression, often proprietary, and it is usually not practical to analyse the contents of the original backup file without restoring it first. We demonstrated that if an incorrect approach is used, restored data might differ considerably from the original; thus crucial potential evidence may be lost. We presented a new 10

11 classification of backup software into five classes: Class 0, Class 1, Class 2, Class 3 and Class 4, and described a straightforward test which allows any person to repeat our tests and to allocate a class to any backup software using our environment. Finally, a safe methodology was presented for handling backups in order to avoid information loss, which is relevant in both forensics cases and in file systems maintenance in general. Future work in this area is required to better formalize requirements for Class 4 backup utilities. Currently (beginning of 2006) we were unable to locate any software which would pass Class 4 criteria. As new software products come to the market we expect to be able to refine our classification and forensic methodology. We also intend to broaden the scope of our research to include the impact of data compression on handling ADSs. References [1] Microsoft Knowledge Base, Description of Microsoft Tape Format (MTF), Article ID: , Last Modified: October 29, 2003, Accessed: January 19, 2006, [2] Microsoft TechNet, Windows Server 2003 Technical Reference, How NTFS Works, Last Modified: March 28, 2003, Accessed: December 10, 2004, chref/8cc5891d-bf8e d-dac5418c5948.mspx [3] Microsoft Knowledge Base, How To Use NTFS Alternate Data Streams, Article ID: , Last Modified: July 13, 2004, Accessed: November 11, 2004, [4] Microsoft Tape Format Specification, Version 1.00a - document rev. 1.8, Seagate Software, Inc., [5] E. CASEY, Digital Evidence and Computer Crime, Elsevier Academic Press, London, UK, 2004, ISBN [6] K. MANDIA, C. PROSIE and M. PEPE, Incident Response & Computer Forensics, Second Edition, McGraw-Hill/Osborne, Emeryville, CA, 2003, ISBN X. [7] W. C. PRESTON, Unix Backup and Recovery, O'Reilly, Sebastopol, CA, 1999, ISBN

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1 File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New

More information

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

Help System. Table of Contents

Help System. Table of Contents Help System Table of Contents 1 INTRODUCTION...1 2 GETTING STARTED!... 2 2.1 Installation...2 2.2 Wizard...3 2.3 Browse Method:...7 2.4 Search Method:...7 2.5 Surface Scan Method:... 8 3 RECOVERING DELETED

More information

LTFS for Microsoft Windows User Guide

LTFS for Microsoft Windows User Guide LTFS for Microsoft Windows User Guide Abstract This guide provides information about LTFS for Microsoft Windows, which is an implementation of the Linear Tape File System (LTFS) to present an LTO-5 or

More information

4 II. Installation. 6 III. Interface specification. 9 1. Partition selection view. 9 1.1. Partition selection panel. 9 1.2.

4 II. Installation. 6 III. Interface specification. 9 1. Partition selection view. 9 1.1. Partition selection panel. 9 1.2. Contents 2 I. Introduction 4 II. Installation 6 9 1. Partition selection view 9 1.1. Partition selection panel 9 1.2. Information panel 11 1.2.1. Current configuration 11 1.2.2. Storage information 12

More information

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation

More information

Can Computer Investigations Survive Windows XP?

Can Computer Investigations Survive Windows XP? Can Computer Investigations Survive? An Examination of Microsoft and its Effect on Computer Forensics December 2001 by Kimberly Stone and Richard Keightley 2001 Guidance Software All Rights Reserved Executive

More information

A Technical Best Practices White Paper

A Technical Best Practices White Paper Group Logic White Paper October 2009 The Best of Both Worlds Sharing Mac Files on Windows Servers A Technical Best Practices White Paper Group Logic Inc 1100 North Glebe Road Suite 800 Arlington, VA 22201

More information

Best Practices for Implementing Autodesk Vault

Best Practices for Implementing Autodesk Vault AUTODESK VAULT WHITE PAPER Best Practices for Implementing Autodesk Vault Introduction This document guides you through the best practices for implementing Autodesk Vault software. This document covers

More information

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide Stellar Phoenix SQL Database Repair 6.0 Installation Guide Overview Stellar Phoenix SQL Database Repair software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server

More information

Microsoft Vista: Serious Challenges for Digital Investigations

Microsoft Vista: Serious Challenges for Digital Investigations Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

AccuGuard Desktop and AccuGuard Server User Guide

AccuGuard Desktop and AccuGuard Server User Guide AccuGuard Desktop and AccuGuard Server User Guide 1 2 Table of Contents Welcome 4 Backup Simplified 5 Features 6 Protection Plans 7 Archived Data Viewing 8 Archived Data Restoring 9 Best Practices 11 Getting

More information

Active @ UNDELETE Users Guide

Active @ UNDELETE Users Guide Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer

More information

Windows NT Backup Software

Windows NT Backup Software TechNet Home > Products & Technologies > Windows NT Server > Maintain Windows NT Backup Software Topics on this Page TBU Advantages and Disadvantages Backup and Restore User Accounts Starting the TBU GUI

More information

NTFS Undelete User Manual

NTFS Undelete User Manual NTFS Undelete User Manual What is NTFS Undelete? NTFS Undelete is a small utility that scans your hard drive for all files that can be undeleted and attempts to recover them for you. Sounds like magic?

More information

Release Notes P/N 300-003-623 REV A05

Release Notes P/N 300-003-623 REV A05 EMC NetWorker Module For Microsoft Exchange Server Release 5.0 Release Notes P/N 300-003-623 REV A05 April 8, 2008 These release notes contain supplemental information about EMC NetWorker Module for Microsoft

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

The Best of Both Worlds Sharing Mac Files on Windows Servers

The Best of Both Worlds Sharing Mac Files on Windows Servers The Best of Both Worlds Sharing Mac Files on Windows Servers March, 2008 1110 North Glebe Road Suite 450 Arlington, VA 22201 phone: 800.476.8781 or +1.703.528.1555 fax: +1.703.527.2567 or +1.703.528.3296

More information

Are Mailboxes Enough?

Are Mailboxes Enough? Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day

More information

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014 Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security

More information

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer 1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts

More information

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured

More information

Authoring for System Center 2012 Operations Manager

Authoring for System Center 2012 Operations Manager Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack

More information

Help File. Version 1.1.4.0 February, 2010. MetaDigger for PC

Help File. Version 1.1.4.0 February, 2010. MetaDigger for PC Help File Version 1.1.4.0 February, 2010 MetaDigger for PC How to Use the Sound Ideas MetaDigger for PC Program: The Sound Ideas MetaDigger for PC program will help you find and work with digital sound

More information

IMF Tune v7.0 Backup, Restore, Replication

IMF Tune v7.0 Backup, Restore, Replication IMF Tune v7.0 Backup, Restore, Replication Contents WinDeveloper IMF Tune v7.0 Backup, Restore, Replication... 3 1. IMFTBak Requirements... 3 2. Using IMFTBak... 3 3. Backing-Up Configuration Settings...

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Active @ UNDELETE Users Guide

Active @ UNDELETE Users Guide Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer

More information

Events Forensic Tools for Microsoft Windows

Events Forensic Tools for Microsoft Windows Events Forensic Tools for Microsoft Windows Professional forensic tools Events Forensic Tools for Windows Easy Events Log Management Events Forensic Tools (EFT) is a fast, easy to use and very effective

More information

XenData Video Edition. Product Brief:

XenData Video Edition. Product Brief: XenData Video Edition Product Brief: The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on a single Windows 2003 server to create a cost effective digital

More information

IN this paper we examine the application of the virtual

IN this paper we examine the application of the virtual SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 1, NO. 1, JUNE 2007 1 Analysis of USB Flash Drives in a Virtual Environment Derek Bem and Ewa Huebner Abstract This paper is a continuation of our previous

More information

Office of History. Using Code ZH Document Management System

Office of History. Using Code ZH Document Management System Office of History Document Management System Using Code ZH Document The ZH Document (ZH DMS) uses a set of integrated tools to satisfy the requirements for managing its archive of electronic documents.

More information

Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software

Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on

More information

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

CatDV Pro Workgroup Serve r

CatDV Pro Workgroup Serve r Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5 Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

3.2 Install, configure, optimize and upgrade operating systems references to upgrading from Windows 95 and NT may be made

3.2 Install, configure, optimize and upgrade operating systems references to upgrading from Windows 95 and NT may be made Page 1 of 7 Jeff has 27 workstations that need to have a clean installation of Windows 2000 Professional placed on them by the end of the week. Which imaging tool should he use? Xcopy Clone i Sysprep Prepsys

More information

Recover data from a defective Fujitsu desktop drive

Recover data from a defective Fujitsu desktop drive Data Compass - Case Study Recover data from a defective Fujitsu desktop drive Symptom: Data on the Fujitsu desktop drive is not accessible directly by the client. The initial diagnosis implies that the

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Forensic Analysis of Internet Explorer Activity Files

Forensic Analysis of Internet Explorer Activity Files Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones keith.jones@foundstone.com 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The

More information

BackupAssist Common Usage Scenarios

BackupAssist Common Usage Scenarios WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with

More information

Install SQL Server 2014 Express Edition

Install SQL Server 2014 Express Edition How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.

More information

CommVault Simpana Archive 8.0 Integration Guide

CommVault Simpana Archive 8.0 Integration Guide CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009

More information

Copyright 2014 http://itfreetraining.com

Copyright 2014 http://itfreetraining.com This video looks at the four file systems supported by Windows. These are ReFS, NTFS, FAT and exfat. The video looks at what each file system is capable of and its limitations. Resilient File System (ReFS)

More information

Prinergy Workflow System

Prinergy Workflow System Prinergy Workflow System Version 4 and 5 Mac Client File-Sharing Protocols English Excerpt from Prinergy System Administration Guide, 731-00463C Rev I, October 2008 Contents 1 Qualified tertiary servers

More information

Microsoft s SBS 2003 Best Practice Guide

Microsoft s SBS 2003 Best Practice Guide Microsoft s SBS 2003 Best Practice Guide For use with StorageCraft ShadowProtect Disclaimer This guide is for End Users and Resellers to provide some guidance when building an SBS 2003 Server for best

More information

NovaBACKUP. User Manual. NovaStor / May 2014

NovaBACKUP. User Manual. NovaStor / May 2014 NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Backup and Restore with 3 rd Party Applications

Backup and Restore with 3 rd Party Applications Backup and Restore with 3 rd Party Applications Contents Introduction...1 Backup Software Capabilities...1 Backing up a Single Autodesk Vault Site...1 Backup Process...1 Restore Process...1 Backing up

More information

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT Page 1 of 44 Quick Start - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications

More information

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

TUXERA NTFS for Mac USER GUIDE 2/13. Index

TUXERA NTFS for Mac USER GUIDE 2/13. Index 2/13 Index 1. Introduction to Tuxera NTFS for Mac... 3 1.1 What is a file system driver?... 3 1.2 How does it work?... 3 2. Installation... 5 2.1 Installing Tuxera NTFS for Mac... 5 2.2 Uninstalling Tuxera

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Lab 20: Cryptography

Lab 20: Cryptography CompTIA Security+ Lab Series Lab 20: Cryptography CompTIA Security+ Domain 6 - Cryptography Objective 6.1: Summarize General Cryptography Concepts Document Version: 2013-08-02 Organization: Moraine Valley

More information

Overview. Windows Alternate Data Streams How code and data can be hidden within files and directories

Overview. Windows Alternate Data Streams How code and data can be hidden within files and directories Overview Introduction Importance Origin NTFS Stream Basics Usages Demo Issues API Tools Introduction A file is more than one file A file can act as container for other files One visible None or several

More information

Determining VHD s in Windows 7 Dustin Hurlbut

Determining VHD s in Windows 7 Dustin Hurlbut Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista

For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista Article ID: 822158 - Last Review: September 4, 2009 - Revision: 11.0 Virus scanning recommendations for computers that are running Windows Server 2008 Windows Server 2008, Windows Server 2003, Windows

More information

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology COURSE FILE (COURSE PLAN) Year : 2012-13 Sem: ODD Faculty Details Name of the Faculty : Mullai.P & Yaashuwanth.C Designation : Assistant Professor ( OG. ),Assistant Professor (OG) Department : Information

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Forensic Toolkit. Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR

Forensic Toolkit. Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR Forensic Toolkit Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR What is AccessData s Forensic Toolkit? Also known as FTK, this application enables you to perform complete and thorough computer

More information

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.

More information

HP StorageWorks Library and Tape Tools FAQ

HP StorageWorks Library and Tape Tools FAQ HP StorageWorks Library and Tape Tools FAQ Other languages: French, German, Spanish, Italian, Korean, Japanese, Chinese This document: www.hp.com/support/lttfaq Windows GUI version This document is a brief,

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez

File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez File Systems for Flash Memories Marcela Zuluaga Sebastian Isaza Dante Rodriguez Outline Introduction to Flash Memories Introduction to File Systems File Systems for Flash Memories YAFFS (Yet Another Flash

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

How To Backup A Database In Navision

How To Backup A Database In Navision Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Actualtests.com - The Power of Knowing

Actualtests.com - The Power of Knowing Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All

More information

Using Microsoft Windows Encrypted File System (EFS)

Using Microsoft Windows Encrypted File System (EFS) Using Microsoft Windows Encrypted File System (EFS) Agenda Protecting our Data Types of Data What is EFS How to use EFS Best Practices Protecting our Data Two types of disk encryption: Full Disk Encryption

More information

Upon completion of this chapter, you will able to answer the following questions:

Upon completion of this chapter, you will able to answer the following questions: CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the

More information

PeerSync, Peer-To-Peer Folder Synchronization Utility, Version 7.4

PeerSync, Peer-To-Peer Folder Synchronization Utility, Version 7.4 What's New v7.4.1 PeerSync, Peer-To-Peer Folder Synchronization Utility, Version 7.4 To upgrade, double-click on the installation file (ps74.exe) in the Explorer window, or choose "Run" from the Start

More information

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY

COMPUTER FORENSICS. DAVORY: : DATA RECOVERY COMPUTER FORENSICS. DAVORY: : DATA RECOVERY Supervised By: Dr. Lo ai Tawalbeh New York Institute of Technology (NYIT)-Amman-2006 TOPICS Definition Recovery from what?? Davory SOFTWARE. Restore Software.

More information

ACTIVE@ UNDELETE 7.0 USER GUIDE

ACTIVE@ UNDELETE 7.0 USER GUIDE ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative

More information

How To Backup Your Computer With A File Copy Engine

How To Backup Your Computer With A File Copy Engine Secondary Backup Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Secondary Backup Data Archival Backup Secondary Backup

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Impact of Digital Forensics Training on Computer Incident Response Techniques

Impact of Digital Forensics Training on Computer Incident Response Techniques Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,

More information

VERITAS NetBackup BusinesServer

VERITAS NetBackup BusinesServer VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1

More information

Digital Evidence Search Kit

Digital Evidence Search Kit Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University

More information

BACKUP & RESTORE (FILE SYSTEM)

BACKUP & RESTORE (FILE SYSTEM) Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following

More information

EXACT Network Backups

EXACT Network Backups User's Guide EXACT Network Backups EXACT Network Backups rev 1, 17/02/2014 page 1 of 16 Copyright 2014 Software of Excellence International. All rights reserved The software contains proprietary information

More information

LG External HDD Hard Disk Drive XG1

LG External HDD Hard Disk Drive XG1 LG External HDD Hard Disk Drive XG1 - Thank you for purchasing this product. - This user manual contains instructions on how to use the product properly. - Please read this manual carefully. - Be sure

More information

RECOVERING FROM SHAMOON

RECOVERING FROM SHAMOON Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past

More information

Stellar Phoenix SQL Recovery

Stellar Phoenix SQL Recovery Stellar Phoenix SQL Recovery 4.1 Installation Manual Overview Stellar Phoenix SQL Recovery software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server database (.mdf

More information

Ans.: You can find your activation key for a Recover My Files by logging on to your account.

Ans.: You can find your activation key for a Recover My Files by logging on to your account. Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to

More information

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data

More information

Implementing a Digital Video Archive Based on XenData Software

Implementing a Digital Video Archive Based on XenData Software Based on XenData Software The Video Edition of XenData Archive Series software manages a digital tape library on a Windows Server 2003 platform to create a digital video archive that is ideal for the demanding

More information

NASA Workflow Tool. User Guide. September 29, 2010

NASA Workflow Tool. User Guide. September 29, 2010 NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011 W H I T E P A P E R Symantec Enterprise Vault and Exchange Server 2010 November 2011 Introduction... 3 Enterprise Vault Support and Compatibility for Exchange Server 2010... 3 So What Is New In Exchange

More information

Database Management Tool Software User Guide

Database Management Tool Software User Guide Database Management Tool Software User Guide 43-TV-25-29 Issue 5 February 2015 Database Management Tool Software Licence Agreement Refer to the Database Tool installer for the software licence agreement.

More information

Q. If I purchase a product activation key on-line, how long will it take to be sent to me?

Q. If I purchase a product activation key on-line, how long will it take to be sent to me? Page 1 of 6 Frequently Asked Questions (FAQ) Q. If I purchase a product activation key on-line, how long will it take to be sent to me? A. When you purchase on-line your product activation key is provided

More information

Appointment Scheduler

Appointment Scheduler EZClaim Appointment Scheduler User Guide Last Update: 11/19/2008 Copyright 2008 EZClaim This page intentionally left blank Contents Contents... iii Getting Started... 5 System Requirements... 5 Installing

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information