Computer Forensics Discipline
|
|
|
- Lawrence Palmer
- 10 years ago
- Views:
Transcription
1 Computer Forensics Discipline Technical Procedure Manual
2 Computer Forensics Discipline Technical Procedure Manual Approved By: Date: Reviewed By: Date: Reviewed By: Date:
3 Table of Contents General Flow Diagram for Forensic Computer Examination... 1 General Flow Diagram Forensic Computer Crime Scene Response... 2 Crime Scene / Field Response, Evidence Preservation Protocol... 3 Target Drive Preparation Protocol... 5 Hard Drive Removal Protocol... 6 Hard Drive Imaging Protocol... 7 Cable Acquisition Protocol Removable Media Imaging Protocol Evidence Search Protocol Results Approved Software for Forensic Computer Examinations Glossary...21 References... 26
4 General Flow Diagram for Forensic Computer Examination Target Drive Prepare Preparation image drive. Protocol Does the submitted evidence include a desktop computer? Remove Hard drive Drive from Removal suspects Protocol computer. YES NO Create Hard image Drive of Imaging suspects Protocol hard drive. Does the submitted evidence include a laptop computer? YES Can the hard drive be easily removed from the computer? NO NO YES Remove Hard drive Drive from Removal suspects Protocol computer. Create Cable image Acquisition of suspects Protocol hard drive. Create Hard image Drive of Imaging suspects Protocol hard drive. Does the submitted evidence include removable storage media? YES NO Removable Image removal Media media Imaging if necessary. Protocol Evidence Search Search Evidence Protocol Results 1
5 2
6 Arrive at crime scene. General Flow Diagram for Forensic Computer Target Drive Prepare Preparation image drive. Protocol Crime Scene Response Crime Scene Preservation Protocol Does the submitted evidence include a desktop computer? Remove Hard drive Drive from Removal suspects Protocol computer. YES NO Create Hard image Drive of Imaging suspects Protocol hard drive. Does the submitted evidence include a laptop computer? YES Can the hard drive be easily removed from the computer? NO NO YES Remove Hard drive Drive from Removal suspects Protocol computer. Create Cable image Acquisition of suspects Protocol hard drive. Create Hard image Drive of Imaging suspects Protocol hard drive. Does the submitted evidence include removable storage media? YES NO Removable Image removal Media media Imaging if necessary. Protocol Evidence Search Search Evidence Protocol 3
7 Results Crime Scene / Field Response, Evidence Preservation Protocol Upon arriving at the scene, ensure that the suspect is removed from the computer and is not allowed access to it. If the computer to be searched is on a network, ensure that all computers on the network are secured and that no one is allowed access to these computers until the crime scene search is completed. If computers are connected to an external network, safely remove any computer to be searched from the network. Caution: Caution: Simply unplugging a suspect computer from a network can cause data loss and damage to the network. Assistance in safely removing the computer from the network should be sought from the system administrator, so long as the system administrator is not a suspect in the case. If the system administrator is a suspect in the case, assistance should be sought from other personnel knowledgeable in the networks operation. Be sure that all computers involved in search are secured and that no one is allowed access to them. Important data can be quickly damaged or destroyed if a suspect is allowed access to the computer. Document the condition of all computers with photographs and notes. This should include any documents that are open or information that appears on the monitor. Save any open documents on the computer to a floppy disk. Some other type of media such as a Zip disk should be used if the computer does not have a floppy disk drive or if the files being saved are too large to fit onto a floppy disk. 4
8 Shut down the computer using the normal procedure for the OS used. Caution: If at any point while securing the computer the analyst believes that evidence may be being destroyed (i.e. delete, wipe, or defrag program running or an unusual delay in the shut down of the computer), the power cord should be pulled from the back of the computer. Note the hardware connections to the computer (mouse, keyboard, phone line, external drives, etc.). Crime Scene / Field Response, Evidence Preservation Protocol (continued) Note: It is important to document the condition of the computer before disassembling it. It is necessary to be able to put the computer back as it was when investigators arrived at the scene. Search the scene for removable media such as CDs, Zip disks, Jazz disks, floppy disks, and USB thumb drives. Sometimes the evidence in a case may only be found on the removable media. Search the area around the computer for any passwords, account numbers, or other pertinent information which may be written down. Note: If files on the computer are encrypted, finding the password written down near the computer may be the only way to access the information. 5
9 Target Drive Preparation Protocol Select a hard drive that is ready to be used in a case as a forensic copy. Hard drives to be used can be either new hard drives or a hard drive that contains data from a case which has been completed. This hard drive will be referred to in the following as the target drive. The selected target drive should have sufficient storage capacity to hold the image files generated from the suspect's hard drive. Attach a label to the target hard drive with the pertinent case information. Use an approved wipe utility to remove the information from the previous examination from the disk. This step should also be used for new hard drives. Caution: Failure to wipe the information from a previously used hard drive can lead to the possibility of data from old cases contaminating a new case. Run F-disk or G-disk on the image drive. Create the new primary DOS partition for the target drive. Run Format to reformat the target drive. At the end of the Format process, enter a suitable name for the drive to denote that this will be the image drive (ie. image, target, etc.). Directories for the hard drive or any other type of media can be created on the target drive in order to keep the evidence organized. Note: When responding to image a computer in the field the target drives may be prepared by this procedure prior to departing the Laboratory. This will speed up the process of imaging the computer and will result in a shorter down time for the suspect computers. 6
10 Hard Drive Removal Protocol Record the system information from the suspect's computer on the notes sheet. If necessary, photograph the condition of the suspect's computer prior to opening the case. Add photograph to the case notes. Note: The hard drive from many laptop computers can be removed and by using an adapter, imaged with the same procedures as the hard drives removed from desktop computers. With some laptop computers however, the hard drives are very difficult to remove and are designed to only be removed by trained service personnel. It is permissible to image laptop computers without removing the hard drives by using the Cable Acquisition Protocol. Open the case on the suspect's computer. If necessary, photograph the internal contents of the suspect's computer prior to removing the hard drive(s). Add photograph to the case notes. Mark the cords connecting the hard drive to the suspects computer. These markings will enable the analyst to reassemble the computer correctly. Remove the hard drive(s) from the suspect's computer. Label the suspects hard drive as the original hard drive in order to prevent evidence contamination. The label should contain the case number, item number, date and the analysts initials. Record the drive information including make, model, serial number, number of sectors, number of heads, and jumper settings on the notes sheet. The date and time used by the suspects computer may become important in an investigation. In order to check the date and time information, the computer can be booted from a DOS boot floppy disk with the hard drive removed. During the boot process, enter the BIOS and note the date and time and compare to the actual date and time. Record the date and time information on the EnCase notes sheets. 7
11 Hard Drive Imaging Protocol Note: Making an image of the suspects hard drive is not the same as making a copy of the suspects hard drive. When a hard drive is copied, only the logical files are written onto the target drive. When an image is created of a drive, all of the information on the suspect hard drive is written to the target drive, including slack space, unallocated space, and deleted files. Insert the suspect hard drive and the target drive into the computer. Note: When working with the hard drive from a laptop computer, the smaller laptop hard drive can be imaged by using the adapter to connect it to the standard IDE connector. The same imaging procedures are used. Depending on the hardware used to image the suspect drive, the drive can be imaged in either the Windows or DOS environment. Note: In most situations, the Windows acquisition is preferable if the hardware allows it. Imaging in Windows is much faster than imaging in DOS. DOS Imaging Procedure The DOS imaging procedure must be used to image a hard drive when hardware to write protect the hard drive is not used. Caution: While the suspect's hard drive is in the computer and the hard drive is not write protected, the computer must not be booted in Windows mode. Booting in Windows can change files on the suspect's hard drive. While the suspect's hard drive is in the computer, the computer must only be booted in DOS. Boot the computer in DOS using an EnCase Boot Disk. Make a forensic image copy of suspect's hard drive onto the target drive using the DOS EnCase program located on the EnCase Boot Disk. In EnCase, ensure that the suspects drive is locked and unlock the target drive. Caution: Locking the suspects hard drive ensures that the target drive cannot be accidentally copied onto the suspects hard drive. Ensure that the 8
12 suspects hard drive is locked. Hard Drive Imaging Protocol (Continued) Image the suspects hard drive by choosing the Acquire button at the bottom of the screen. On the Acquire Evidence screen, choose the drive letter of the suspects hard drive. On the Evidence File Path screen, enter the correct path in order to have EnCase image the suspects drive to the target drive. Enter the case information that the program requests. This information will be used by the program in preparing the EnCase report. EnCase asks if you would like to compress the file. Compression may be used in the imaging of larger hard drives in order to require less CDs or DVDs to store the image at the completion of the analysis. Note: Using compression has NO damaging effects on the evidence. The files created are two to three times smaller than uncompressed files. However, creating compressed images may take fives times longer than creating uncompressed images. When asked if you would like to do a MD5 hash, choose YES. EnCase uses this hash to verify that the target drive is an exact forensic image of the suspects hard drive. EnCase offers the ability to password protect the image. The decision as to whether or not to use a password is left to the discretion of the analyst. The Maximum Desired Evidence File Size should be set to 640 Mb if the image is to be saved to CDs. Larger file sizes may be used if the images file will be written to DVDs. In some rare cases, EnCase is unable to create a forensic image of the suspects hard drive. In this case, make a forensic image copy of suspect's hard drive onto the target drive using approved imaging software such as SnapBack. Caution: When using imaging software other than EnCase, care should be used to ensure that the evidence data is not destroyed by copying the target drive 9
13 onto the suspect's hard drive. Hard Drive Imaging Protocol (Continued) Windows Imaging Procedure The Windows imaging procedure may be used to image a hard drive when hardware to write protect the hard drive is used. Note: The SBI Computer Forensics Unit is equipped with forensic towers purchased from Forensic Computers.com. These computers have a drive bay which is connected to the computer with a read only Firewire connection. Hard drives which are placed in this drive bay are write protected and may be imaged in the Windows environment. Place the forensic drive and the Target drive into the computer and boot the computer into Windows. Make a forensic image copy of suspect's hard drive onto the target drive using the EnCase forensic program in Windows. Image the suspects hard drive by choosing the Acquire button on the tool bar. On the Acquire Evidence screen, choose the suspects hard drive. Enter the case information that the program requests. This information will be used by the program in preparing the EnCase report. EnCase asks if you would like to compress the file. Compression may be used in the imaging of larger hard drives in order to require less CDs or DVDs to store the image at the completion of the analysis. Note: Using compression has NO damaging effects on the evidence. The files created are two to three times smaller than uncompressed files. However, creating compressed images may take fives times longer than creating uncompressed images. Check the check box for Generate image hash. EnCase uses this hash to verify that the target drive is an exact forensic image of the suspects hard drive. 10
14 EnCase offers the ability to password protect the image. The decision as to whether or not to use a password is left to the discretion of the analyst. Hard Drive Imaging Protocol (Continued) The Maximum Desired Evidence File Size should be set to 640 Mb if the image is to be saved to CDs. Larger file sizes may be used if the images file will be written to DVDs. In some rare cases, EnCase is unable to create a forensic image of the suspects hard drive. In this case, make a forensic image copy of suspect's hard drive onto the target drive using approved imaging software such as SnapBack. The target drive can be checked with an approved anti-virus program to ensure that it has not been infected by the suspects hard drive. After verifying that the copy has been successfully completed, remove the suspect's hard drive from the computer. Note: There may be some instances when the suspects hard drive cannot be successfully imaged. In the event that an image cannot be made of the suspects hard drive due to either hardware or software problems, the attempts to image the hard drive should be completely documented before doing any examination on the suspects original hard drive. 11
15 Cable Acquisition Protocol EnCase allows the remote acquisition of evidence in DOS through the use of a nullmodem parallel (lap-link) cable or a network crossover cable. This procedure can be followed when the hard drive of the evidence computers hard drive is difficult or impossible to remove, especially in the case of some laptop computers. Always set up the server (suspect computer) first, as follows: 1. Boot the evidence computer in DOS using an EnCase boot floppy. Caution: Check the suspect computer prior to booting up to ensure the boot order is to the floppy drive first. Also, disable any power saving features in the BIOS. Note: In order to use a network crossover cable, the suspect computer must be equipped with a network interface card and the forensic boot disk must contain the DOS drivers for that network interface card. Otherwise, the parallel cable must be used. 2. Connect the suspect computer and forensic computer using a network crossover cable between the network interface cards or connect the lap-link cable from the parallel port of the evidence computer to the parallel port of the forensic computer (running through the dongle if a parallel port dongle is used). 3. Once the suspect computer is booted, run EnCase in DOS. 4. The suspect computer will display its hard drive information on the screen and you will note that the suspect drive is locked. 5. Choose server mode from the choices at the bottom of the screen. 6. A window will be displayed showing Server Mode and the message waiting to connect. Next, set up the client (forensic computer) as follows: 7. After installing the target drive in your forensic computer, run EnCase in DOS and make sure that the screen shows client mode in the title bar. 8. The information that you now see on the screen will be from the suspect 12
16 computer. Cable Acquisition Protocol (continued) 9. You may now acquire the evidence following the steps in the normal manner. 10. When acquisition has started, the server (suspect) computer window will show that a connection has been established and the data being transferred. Note: This is a very slow method of data acquisition. Using a network crossover cable is a faster method of imaging a hard drive than using a parallel cable. A large hard drive (>20 gigs) may take several days to acquire using a parallel cable. 13
17 Removable Media Imaging Protocol For the purposes of this section, removable media includes floppy disks, CDs, Zip disks, Jazz disks, LS120 disks, flash memory cards, and any other type of portable digital storage media. This also includes digital cameras and PDAs. If possible write protect any removable media. The evidence can be copied to a blank copy of the same media type. The original media should be labeled as the original, and the copies should be used for examination. Note: If working with a suspect's CD-R or CD-RW disks, reading them in read only CD drives is preferred. This will prevent changes from being made to the evidence. The Sony CD-R/DVD-R drive on the computer forensic units have been validated to ensure that changes will not be made to suspect media. If using EnCase for the examination, the removable media can be added to the case and copied to the image drive. Note: Hard drives must only be imaged in DOS if write protection hardware is not in use. Likewise, removable media which can be write protected, can be imaged in the Windows based EnCase program. High density and double density floppy disks should be batch imaged separately. Note: When batch imaging floppy disks, EnCase chooses the disk capacity of the first floppy imaged as the capacity of all floppies in the batch. If a double density disk is imaged first, EnCase will not see all of the data on any high density disks which are imaged later in the batch. When using EnCase to image CD-RW disks, care must be used to ensure that EnCase can read the data on the disk. Note: EnCase has problems reading the format used by some computers to write to CR-RW disks. If a CD-RW is imaged or previewed in EnCase and shows no data on the disk, the disk should be examined in Windows Explorer. If there is data on the disk and EnCase doesnt recognize it, Windows Explorer will read it. If a disk is found that contains data but is not recognized by EnCase, the data on the disk should be copied to a CD-R disk and this copy used in EnCase. It should be noted that this method will 14
18 only capture the Logical files on the CD-RW, and not the deleted files or slack space. Removable Media Imaging Protocol (continued) Zip disks cannot be write protected and should be imaged in DOS only. Note: Zip disks can be imaged using the DOS version of EnCase, The forensic towers see the Zip drive as a floppy drive and assign the drive a drive letter of B. EnCase treats the Zip disks the same as floppy drives and images them in a batch process. EnCase write blocks the Zip drives by default. If media can be write protected and keyword searches are not needed on the media, it is permissible to preview the original media without making a copy first. For PDA examination, a docking cradle made for the particular make and model of PDA is required. When the PDA is attached to the forensic tower using the cradle, EnCase see the PDA as a piece of removable media. The data contained on the PDA can then be acquired by EnCase in the same method as with any other type of removable media. Caution: When a case is submitted to the laboratory which contains a PDA, great care should be taken to ensure that the batteries do not go dead. The volatile memory in a PDA can be lost when the batteries are totally discharged. PDAs which use AA or AAA batteries should have new batteries placed into the PDA. PDAs with rechargeable batteries should charged if the charger is submitted. If these things cannot be done to ensure the safety of the evidence on the PDA, the evidence should be imaged and then worked at the appropriate time. For examination of digital cameras, the flash memory cards should be removed from the camera. A flash media card reader is then attached to the computer and the media inserted. EnCase sees the flash media as a piece of removable media. The data contained on the flash media card can then be acquired by EnCase in the same method as with any other type of removable media. 15
19 Evidence Search Protocol Install the system hard drive and the target hard drive in the computer workstation. Insure that the system hard drive is installed as the primary master and the target drive is installed as either the primary slave, secondary master, or secondary slave. Caution: If the system drive is not installed as the primary master, the computer may boot from the target drive. This may destroy evidence. Boot computer workstation from the system hard drive. Run software to undelete any deleted files and recover files or file fragments from unallocated space. The forensic image of the evidence drive should be examined for the presence of any deleted partitions on the hard drive. If any deleted partitions are noted, these partitions should be recovered. If the evidence drive used a FAT file system, the forensic image of the evidence drive should be examined for the presence of any deleted folders on the hard drive. Any deleted folders should be recovered. A signature analysis should be run on all of the files in the case prior to the examination of these files. The signature analysis checks the file header information to ensure that the files have not been misidentified with an incorrect file extension. Cases involving photos or images: Computer search software or graphics thumbnail software can be used to view images on an image drive. A file search can be run to find files with graphics or movie file extensions (.jpg,.gif,.bmp,.mov,.mpg,.avi, etc.). Note: In EnCase,.art, asf,.max,.mpe,.mpeg,.mpg,.mov,.rm,.ram and.avi files as well as image files in unallocated space are not shown in the gallery view. These files should be searched for and viewed with external viewers. 16
20 Evidence Search Protocol (Continued) EnCase does not display images inside of.zip files in the gallery view. The examiner should search for.zip files. These files should be opened manually or with the Zip opener EnScript in EnCase and any images found inside examined. This can be done by the examiner or recovered for examination by the submitting officer. EnCase does not display images that are attached to files ( i.e. Outlook Express and AOL files ). If images may be important in a case, the files should be recovered to the target drive. These files can be examined by restoring the s to an account on another computer so that the images attached to the can be viewed. This examination can be done by the examiner or recovered for examination by the submitting officer. Examine files found for data useful to the investigation. Make note of any files found with valuable information. Data searches: Use forensic search software or the Windows search program to perform keyword searches on the image drive. Enter in key words such as names, addresses, dates or other pertinent key words which may be used in a file containing data of evidentiary value. Examine files found for data useful to the investigation. Make note of any files found with valuable information. Note: Due to the size of modern hard drives, it is not possible to read all of the data recovered in a case. Every effort should be made to search by relevant dates or file types and search by relevant keywords in order to find information pertinent to the case. At times, it will be necessary to view the subjects computer just as they would have viewed it at the time it was in use. To do this, it is acceptable to image the 17
21 drive again with an approved DOS based imaging program such as SnapBack or to use the restore function in EnCase to restore the EnCase image to a target hard drive. This second image can then be used to boot the subjects computer. 18
22 Results Make a copy of the files which were found to be of evidentiary value onto a CD or DVD. Any CD or DVD that has pornographic images of children copied on it as part of the examination will be labeled to reflect the following: This media may contain contraband and is intended for use by law enforcement in an official criminal investigation. Dissemination of this material may result in a criminal violation. If desired, print a hard copy of files which were found during the examination and were found to be of evidentiary value. Be sure to note on the printout the location on the hard drive where the file can be found. These printouts can be placed into the analysts notes and/or returned to the investigating officer. If desired, print the EnCase report that is prepared by EnCase. Make a copy of the forensic image onto a set of CDs or DVDs. These CDs or DVDs will be returned to the submitting agency. If any further analysis needs to be done, the set of CDs or DVDs can be returned to the lab. The target hard drive used to make the image may be wiped and reused in further casework examinations. Note: In cases where the forensic image is exceptionally large (image files that are many Gigabytes in size) it may not be practical to copy the image to CDs or DVDs. In these cases the analyst may elect, at his discretion, to eliminate this procedure. If so, the report must clearly state that no copy of the forensic image was prepared and that if additional searches of the computer are anticipated, it should be held as evidence rather than being returned to the owner. In these instances the original computer must be re-submitted to the lab in order for any additional analysis to be conducted. Caution: Only CD-R, DVD-R or DVD+R disks may be used to copy recovered files and the forensic image. CD-RW or DVD-RW disks should never be used because the data on the disk may be altered. Note: When creating a CD or DVD, the session should be finalized. This will help prevent accidental damage to the CD. 19
23 Results (continued) Evidence determined to have pornographic images of children on it will be labeled: This media may contain contraband and is intended for use by law enforcement in an official criminal investigation. Dissemination of this material may result in a criminal violation. 20
24 Approved Software for Forensic Computer Examinations Note: EnCase is a very powerful forensic software package which is used by the NC SBI Crime Laboratory Computer Forensics Unit. The standard protocols used by the NC SBI Computer Forensics unit are written for investigations using EnCase. Other approved forensic software may be used as necessary, at the analysts discretion. This is a list of the software which is owned by and approved for use in the NC SBI Crime Laboratory Computer Forensics Unit. Hard Drive Imaging EnCase SnapBack Anti-Virus Software Norton Anti-Virus Deleted File Recovery EnCase Norton Unerase Slack and Unallocated Space Recovery EnCase Norton Diskedit Text String Searches EnCase 21
25 Windows 98 Find function Approved Software for Forensic Computer Examinations (Continued) Text Viewers EnCase Quick View Plus Microsoft Word Wordpad Notepad Outlook Express Adobe Acrobat Reader AOL Graphics Viewers EnCase Thumbs Plus Quick View Plus Outlook Express AOL IrfanView XnView 22
26 Password Recovery Access Data 23
27 Glossary (Continued) Glossary BIOS Browser Cache CDFS Cluster bitmaps Clusters Compressed file Compression Cookie Cylinder Disk Basic Input Output System. A number of machine code routines that are stored in ROM and available for execution at boot time. Browser is short for Web Browser. A browser is a computer program that locates and displays pages from the Internet. A computers cache is an area where the computer can temporarily store frequently used data that would otherwise have to be loaded from a slower source. The computers cache speeds up the operation of the computer. The standard used to describe the file structure on a CD. Used by NTFS to keep track of free clusters by using a bitmap. This file contains one bit for every cluster on the volume. A group of sectors in a logical volume that is used to store files and folders. A file that has been reduced in size via one or more compression techniques. A method of storing files resulting in great savings in disk storage space. Compressed blocks are checked for validity in the same way as uncompressed one. A cookie is a short piece of data that Web servers place on your computer to help identify Web users. Cookies can be used by Web servers to track your Internet browsing habits. The set of tracks on the drive platters that are at the same head position. An actual piece of hardware that you can hold in your hand. It could be a floppy disk, hard disk, ZIP disk, etc. 24
28 Glossary (Continued) DOS Drive Geometry EXT2 Fdisk File entries File slack File signature File allocation table (FAT) Format Head Disk Operating System - usually refers to MS-DOS. Operating system which was developed by Microsoft for IBM compatible PCs. Still used today to help control operation on computers, operating beneath the Windows environment. The number and position of the bytes, sectors, tracks located on the physical drive. The primary file system used on the Linux operating system. DOS program that provides information about and editing of the partitions on a hard drive. Each folder contains starting cluster and can be expanded or contracted as files are added or removed from the folder. Each file in the folder is represented by a 32 byte entry in the table. The content of a folder file is an array of records containing information about the files in the folder. Each entry in the folder can be either a file or another folder. In this way a tree structure can be built. The space between the logical end and the physical end of a file. A few bytes at the beginning of some files (such as graphic or document files) that constitute a unique signature of the file type, regardless of the file extension used. An array of numbers that sits near the beginning of a DOS volume. The length of the numbers is determined by the size of the volume. Each entry in the FAT corresponds directly to one cluster and there is always one FAT entry for every cluster. DOS command used to prepare a storage medium (hard drive, floppy disk) for reading and writing. Format does not erase data on the disk. It checks for bad sectors and resets the internal address tables (FAT). A device that ride very close to the surface of the platter and allows information to be read from and written to the platter. 25
29 Hyperlink Image drive Glossary (Continued) A hyperlink is a text phrase (which often is a different color than the surrounding text) or a graphic that conceals the address of a Web Site. Clicking on the hyperlink takes you to the Web Site. Same as the target drive. Internet The Internet is a world wide network with more than 100 million computer users that are linked for the exchange of data, news, conversation and commerce. The Internet is a decentralized network that no one person, organization or country controls. ISDN Line Logical file size Integrated Services Digital Network - A phone line that connects two computers to transmit a digital signal between them, as opposed to the analog signal transmitted over normal phone lines. This allows data to be transferred more than twice as fast as with an analog phone line with a 56kbps modem. The exact size of a file in bytes and is the number represented in the properties for a file. This is different than physical file size. Logical drive Master boot record MD5 hash NTFS Partition table PGP A drive named by a DOS drive specifier, such as C: or D:. A single physical drive can act as several logical drives, each with its own specifier. The very first sector of a physical disk (sector zero) is referred to as the MBR It contains machine code that allows the computer to find the partition table and the operating system. A 128 bit number that uniquely describes the contents of a file. This is the standard hash code used in forensics. NT File System. The file descriptors for for every file on an NTFS volume are stored in the Master File Table. Describes the first four partitions, their location on the disk, and which partition is bootable. Pretty Good Privacy - Program used to encrypt data on a computer, such as messages on the Internet. 26
30 Glossary (Continued) Physical drive Physical file size Plug-Ins RAM slack RAM ROM Root folder Sector Spam Suspect drive System drive Target drive Track A single disk drive. A single physical drive may be divided into multiple logical drive. The amount of space that a file occupies on a disk. A file or folder always occupies a whole number of clusters even if it does not completely fill that space. A piece of computer hardware or software that adds a specific feature or service to a larger system. The space from the end of the file to the end of the containing sector. Before a sector is written to disk, it is stored in a buffer somewhere in RAM. Random Access Memory. Volatile read/write memory whose contents are lost when the power is turned off. Read Only Memory. Chips that contain a permanent program that is burned on the chip at the factory and maintained when the power is turned off. The information on these chips can be read but not written to. Stored in a known location, this is a tree structure that supports files and folders within folders to an arbitrary depth. A group of bytes within a track and is the smallest group of bytes that can be addressed on a drive. The number of bytes in a sector can vary, but is almost always 512. Unsolicited junk which is sent to persons who did not request it. It is usually commercial . The drive (or drives) that are removed from a suspects computer or in the possession of the suspect that will be imaged for later analysis. This drive is never analyzed; rather is copied so the analysis can be conducted on the image. The forensic hard drive used to boot the forensic tower. This is the drive which contains the forensic search tools. The drive that information from the suspect drive is being written to. Each platter on a disk is divided into thin concentric bands 27
31 Glossary (Continued) called tracks. Tracks are established when the disk is low level formatted. Upload URL Volume World Wide Web To send or transmit data from your computer to another computer or network. Universal Resource Locator - An address at which documents or other resources can be found on the Web. A mounted partition. There may be only one volume on a floppy or ZIP disk, or there may be several on a hard disk. A group of Internet servers that support HTML formatting. The World Wide Web is one part of the Internet. 28
32 References How Computers Work, Millennium Edition: Ron White: Que, A Division of Macmillan Computer Publishing, USA: 1999: ISBN Upgrading and Repairing PCs, 12 th Edition: Scott Mueller: Que, A Division of Macmillan Computer Publishing, USA: 2000: ISBN Using Microsoft Windows 95, Fourth Edition: Kathy Ivens: Que, A Division of Macmillan Computer Publishing, USA: 1998: ISBN DOS for Dummies EnCase Version 2, User Manual: Guidance Software, Inc.: Revision 2.0: Copyright Microsoft MS-DOS, Users Guide and Reference Version 5.0: Microsoft Corporation: Document No. SY07661/ Cybershock, Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption: Winn Schwartau: Thunders Mouth press, New York: 2000: ISBN I-Way Robbery, Crime on the Internet: William C. Boni and Dr. Gerald L. Kovacich: Butterworth-Heinemann: 1999: ISBN Digital Evidence and Computer Crime ; Forensic Science, Computers and the Internet: Eoghan Casey: Academic Press: 2000: ISBN X High Technology Crime Investigators Handbook, Working in the Global Information Environment: Dr. Gerald L. Kovacich, William C. Boni: Butterworth- Heinemann: 2000: ISBN X EnCase Version 3.0, User Manual: Richard Keightley : Guidance Software, Inc.: Revision 3.18 EnCase Intermediate Analysis and Reporting: Guidance Software, Inc. : Intermediate Revision 3.05 : Copyright 2002 EnCase Intermediate Analysis and Reporting: Guidance Software, Inc. : Intermediate Revision 4.01 : Copyright
33 30
Technical Procedure for Evidence Search
Technical Procedure for Evidence Search 1.0 Purpose - The purpose of this procedure is to provide a systematic means of searching digital evidence in order to find data sought by the search authorization.
VAIO Computer Recovery Options Guide
VAIO Computer Recovery Options Guide This guide provides information about restoring individual software programs, software drivers, drive partition(s), or the hard disk drive to the original factory settings.
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Q. If I purchase a product activation key on-line, how long will it take to be sent to me?
Page 1 of 6 Frequently Asked Questions (FAQ) Q. If I purchase a product activation key on-line, how long will it take to be sent to me? A. When you purchase on-line your product activation key is provided
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1.
2.5" XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (X Series) 1. The suggested interface for your computer is USB2.0 to have better
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Operating Instructions - Recovery, Backup and Troubleshooting Guide
Personal Computer Operating Instructions - Recovery, Backup and Troubleshooting Guide Please create your recovery discs immediately after setup. Please read this manual carefully before using your product.
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Getting Started. rp5800, rp5700 and rp3000 Models
Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
Chapter 4. Backup / Restore
Recovery Guide 9 Restoring with the OS CD (Only for models that ship with the operating system CD) 98 Samsung Recovery Solution (Optional) 00 Recovery Guide 9 This section describes how to restore your
USB Bare Metal Restore: Getting Started
USB Bare Metal Restore: Getting Started Prerequisites Requirements for the target hardware: Must be able to boot from USB Must be on the same network as the Datto device Must be 64 bit hardware Any OSs
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Installing a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
FAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1.
XTreme Files OS & Data Backup/Restore User Manual Please read the Instruction manual before using the XTreme Files (F Series) 1. The suggested interface for your computer is USB2.0 to have better speed
Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
EaseUS Partition Master
Reviewer s Guide Contents Introduction... 2 Chapter 1... 3 What is EaseUS Partition Master?... 3 Versions Comparison... 4 Chapter 2... 5 Using EaseUS Partition Master... 5 Partition Manager... 5 Disk &
Active@ Boot Disk User Guide
Active@ Boot Disk User Guide Copyright 2008, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers
Integration Note October 2000 Prepared by OS Integration Engineering Compaq Computer Corporation Contents Introduction...3 Requirements...3 Minimum Requirements...4 Required Information...5 Additional
HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8
HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8 This document pertains to HP business notebook computers to be upgraded from Windows 7 using a digital copy of Windows 8. You
Chapter 8 Memory Units
Chapter 8 Memory Units Contents: I. Introduction Basic units of Measurement II. RAM,ROM,PROM,EPROM Storage versus Memory III. Auxiliary Storage Devices-Magnetic Tape, Hard Disk, Floppy Disk IV.Optical
Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global
CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit
Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
How To Store Data On A Computer (For A Computer)
TH3. Data storage http://www.bbc.co.uk/schools/gcsebitesize/ict/ A computer uses two types of storage. A main store consisting of ROM and RAM, and backing stores which can be internal, eg hard disk, or
Types Of Storage Device
Types Of Storage Device by AA A POG D EE SRM U Outline Categorizing Storage Devices Magnetic Storage Devices Optical Storage Devices Categorizing Storage Devices Storage devices hold data, even when the
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Developing Computer Forensics Solutions for Terabyte Investigations
Developing Computer Forensics Solutions for Terabyte Investigations Eric Thompson Corporation Orem, Utah USA www.accessdata.com Overview Computer Forensic Definition, Objectives and Policies History of
Hi-Speed USB 2.0 Flash Disk. User s Manual
Hi-Speed USB 2.0 Flash Disk User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Before Use... 4 Driver Installation... 5 Driver Installation for Windows 98/98SE... 5 Disk Partitions
Data Storage and Backup. Sanjay Goel School of Business University at Albany, SUNY
Data Storage and Backup Sanjay Goel School of Business University at Albany, SUNY Data Backup 2 Data Backup Why? Files can be accidentally deleted Mission-critical data can become corrupt. Natural disasters
Computer Forensics Processing Checklist. Pueblo High-Tech Crimes Unit
Computer Forensics Processing Checklist Pueblo High-Tech Crimes Unit Cmdr. Dave Pettinari Pueblo County Sheriff's Office [email protected] The purpose of this document is to provide computer forensic technicians
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Tech Times. Back-up and Storage
Tech Times Back-up and Storage Back-up and Storage Why? Avoid loss of personal information, settings and software. Save time, resources and sanity by storing data so it is easily retrievable. Be proactive.
Understanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
Chapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
McGraw-Hill Technology Education McGraw-Hill Technology Education
McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
Remote Network Accelerator
Remote Network Accelerator Evaluation Guide LapLink Software 10210 NE Points Drive Kirkland, WA 98033 Tel: (425) 952-6000 www.laplink.com LapLink Remote Network Accelerator Evaluation Guide Page 1 of 19
USB FLASH DRIVE. User s Manual 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS...
Table of Contents 1. INTRODUCTION...1 1.1. FEATURES...1 1.2. SPECIFICATIONS...2 1.3. PACKAGE CONTENTS...2 1.4. SYSTEM REQUIREMENTS...2 2. INSTALLATION PROCEDURE...3 2.1. INSTALL USB FLASH DRIVE ON WINDOWS
Simple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
Computer Basics: Chapters 1 & 2
Computer Basics: Chapters 1 & 2 Definition of a Computer What does IPOS stand for? Input Process Output Storage Other types of Computers Name some examples of other types of computers, other than a typical
Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Norton Save and Restore
Norton Save and Restore Norton Save and Restore User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
Recovers Lost or Deleted Pictures from: Any Memory Card Type Any Brand Using Any Mass Storage Reader
Recovers Lost or Deleted Pictures from: Any Memory Card Type Any Brand Using Any Mass Storage Reader Reader and Media not included Image Recovery - Recovers lost or deleted image files (JPEG, TIFF and
Cloning Utility for VersaView Industrial Computers
Technical Data Cloning Utility for VersaView Industrial Computers Overview The Cloning Utility lets you create a backup image of your computer s hard drive. If your system becomes unstable or corrupt,
Excerpts from EnCase Introduction to Computer Forensics
Guidance Software, Inc. 572 East Green Street #300 Pasadena, CA 91101 Tel: (626) 229-9191 Fax: (626) 229-9199 e-mail: [email protected] web: www.guidancesoftware.com Excerpts from EnCase Introduction
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
NCTE Advice Sheet Storage and Backup Advice Sheet 7
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Ultra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
Infiniium Upgrade and Recovery Guide
Infiniium Upgrade and Recovery Guide For detailed upgrade and recovery instructions, find the section of this document that pertains to your particular model number. If your model number is not printed
Reborn Card NET. User s Manual
Reborn Card NET User s Manual Table of Contents Notice Before Installation:... 2 System Requirements... 3 1. First Installation... 4 2. Hardware Setup... 4 3. Express Installation... 6 4. How to setup
UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu
25 UTILITIES PastPerfect provides a variety of utilities to help you manage your data. Two of the most important are accessed from the Main Menu Backup and Reindex. The other utilities are located within
Operating System Installation Guidelines
Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document
2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Backup and Recovery User Guide
Backup and Recovery User Guide Copyright 2009 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Product notice This user guide describes features
Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation
Technology Assessment Checklist for Small Businesses A quick way to help your small-business customers get the best technology. Today's small-business owners want reliable technology that helps them do
VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0
VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all
Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
Preparations for and making a system back-up V2.8
Preparations for and making a system back-up V2.8 The PC user is responsible for all the maintenance and making backups. Please, for the best result use the given order as much as possible. 1. Free Internet
HOSTED DESKTOP MANUAL
HOSTED DESKTOP MANUAL TABLE OF CONTENTS REMOTE DESKTOP MANUAL Last revision August 18, 2005 WHAT IS A REMOTE DESKTOP... 1 Security... 1 Terminals...2 SETTING UP YOUR REMOTE DESKTOP... 2 Installing Remote
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
Loss of data can happen in many ways. One of the most common causes is hard drive failure. Hard drives can die without warning.
Backing up Important Data Data Backup Procedures for Medford High School Faculty & Staff Backup Procedures for saving to: Zip Drives CD-ROM Drives Floppy Disks Data Travelers And how to use the Windows
Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual
Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual Installing a hard disk 1. Power off the unit. 2. Remove the bottom cover from the unit by removing four screws. 3. Insert the 2.5 HDD to the
Acronis True Image 2015 REVIEWERS GUIDE
Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment
Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment Version 2.0 This tutorial will walk you through how to create a bootable USB drive to enter into a WINPE
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition.
Introduction The process of updating virus definitions on workstations protected by Deep Freeze Enterprise involves three fundamental steps: 1. Rebooting the workstations into a Thawed state so the updates
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
User Guide Replica Automatic Backup System
User Guide Replica Automatic Backup System 2009 Seagate Technology Contents 1 Getting Started with the Seagate Replica Automatic Backup System...4 Replica s First Steps...4 Safely Disconnect...4 Using
Host Connectivity Kit PVCAM for PI Cameras Installation
4411-0074 v1b Host Connectivity Kit PVCAM for PI Cameras Installation Introduction After confirming that your computer meets all hardware and software requirements, install the Host Connectivity Kit (HCK)
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2
2 Active@ KillDisk User Guide
User Guide Copyright 2006, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation,
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
Administrator Guide. HP Backup and Recovery Manager
Administrator Guide HP Backup and Recovery Manager Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft and Windows are
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual
Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...
Software Update, Backup, and Recovery
Software Update, Backup, and Recovery User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. The information contained herein
Table of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
C6 Easy Imaging Total Computer Backup. User Guide
C6 Easy Imaging Total Computer Backup User Guide Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation. Other product names used in this guide are recognized
Installing a fresh version of Windows 95b
What you will need Page 2 Summary of what will be involved Page 3 Configuring the BIOS to boot from A: Page 4 Partitioning and formatting the hard disk Partitioning the hard disk (FDISK) Page 5 Formatting
