A Forensic Comparison of NTFS and FAT32 File Systems
|
|
|
- Alannah Gordon
- 10 years ago
- Views:
Transcription
1 MARSHALL UNIVERSITY FORENSIC SCIENCE CENTER & FBI, HEART OF AMERICA REGIONAL COMPUTER FORENSICS LABORATORY A Forensic Comparison of NTFS and FAT32 File Systems Summer 2012 Kelsey Laine Rusbarsky # FSC 630 Forensic Science Internship MU Topic Advisor: Dr. Fenger Internship Agency Supervisor (SSA Lou Ann Stovall, FBI KC Division, Director HARCFL, (office), [email protected]) Internship Agency (HARCFL, 4150 N. Mulberry Drive, Suite 250, Kansas City, MO , (816) (fax)) Inclusive Dates: June 4 th, August 10 th, 2012 August 10 th, 2012 ABSTRACT The file system on any storage device is essential to the overall organization, storage mechanisms, and data control of the device. Knowing how these file systems work and the layout of key structures, storage mechanisms, associated metadata, and file system characteristics is essential to being able to forensically investigate a computer or other device. The New Technology File System (NTFS) and File Allocation Table (FAT32) are two key file systems that will be compared and contrasted, since both are still actively used and encountered often. Both systems offer forensic evidence that is significant and mandatory in an investigation.
2 INTRODUCTION The file system on any digital storage device is essential to the overall organization, storage mechanisms, and data control of the device. File systems allow computers and other similar digital devices to situate their data in different hierarchal structures through files and directories. Different file systems conduct these processes differently, and most often the file system can be utilized on multiple computers platforms. Even though a file system is usually not unique to a specific computer, a specific file system will have optimal functionality for certain computers and operating systems. Other types of storage devices that utilize file systems include; flash memory such as thumb drives, optical disks such as CD's and DVD's, floppy disks, and hard disk drives. A file system can be thought of as an index in a book, where the book can be broken down into sections and chapters. Without this breakdown of sections and chapters in a book, it would be nearly impossible to find the information that is stored. The same principle lies in the importance of file systems on a computer or storage device. 1 To expand on the book analogy, just as books can divide into sections and chapters, so can the file system be organized into data categories. There are five main existing categories which are file system, content, metadata, file name, and application. Generally, the five categories are able to be applied to a majority of the file systems, though this model must be applied loosely to the FAT file system. The file system category can tell you where data structures are and how big the data structures are. This is the general information of the file system. The content category has the data that describes the actual content of the file and generally contains the majority of the file data. The content category is divided into virtual containers, which are usually the clusters or blocks of a hard drive. The metadata category describes and holds the, in layman s terms, data Page 2 of 29
3 about data. In other words, the metadata is the data that describes the file data. The location, size, time and date stamps, and access control is all recorded in the metadata category. The file name category is responsible for giving a name to each file. The file name acts as an address for the file. Rather than the user having to remember the address for the file, the file name takes the place of the numbered code, just as a social security number numerically represents a person s name. Finally, the last category is the application category. The application category is not necessary for the organization or reading and writing of the files, but it is solely responsible for the special features in a file. An example of a special feature would be user quota statistics. Often the application category is not even utilized; this is the case for the FAT file system. 1 All of the components of these file systems have the potential to provide forensic evidence in an investigation. Some of the characteristics are helpful to an investigation and some can hinder the investigation due to their properties or method of operation. Digital evidence submitted into court will need all of the metadata possible to support or deny a claim. For instance, metadata can identify whether an action was human or computer and determine whether something was a mistake, misunderstanding, or on purpose. Metadata can be used to investigate fraud, abuse, and system failures. It can also help establish elements such as causation, timing, extent of knowledge or mens rea, which means guilty mind. Metadata can reveal information about the creation, authorship, history, and intent of documents and files. 14 The focus of this research is to differentiate and compare two file systems: NTFS (New Technology File System) and FAT (File Allocation Table), in seven areas. The seven areas are key structures, storage mechanisms, file names, directories, file date and time, file deletion, Page 3 of 29
4 encryption. The forensic implications of those areas will be discussed after each section. FTK Imager, a forensic extraction tool, will be utilized to give a visual of these differences between the file systems. By understanding the differences between these two file systems, it will be much easier to navigate and its use a forensic tool will be elevated. NTFS is a relatively newer file system, beginning with Windows NT and 2000, and has brought in many new features, including better metadata support and advanced data structures. 2 Some added features to NTFS are larger file size, large volume size, last accessed times for files, data access and organization efficiency. 23 FAT systems were originally used in DOS and Windows versions prior to windows XP. The 32 in FAT refers to the 32-bit numbers that represent the cluster values, which means that the table entry can have a maximum value of 2 32 values. Even though the FAT operating system is not utilized in many newer hard drives, it is still often used as a default file system in removable media and storage devices, as well as computers with multiple operating systems. FAT is good for these types of media because it is a very ubiquitous and versatile file system. FAT can also be easily joined with random operating systems, which is why the file system is simplistic when compared to NTFS. MATERIALS AND METHODS AccessData Forensic Toolkit (FTK) Imager, Version , 2011 AccessData Group, LLC Toshiba Satellite Intel Celeron M Laptop 2 PNY 4GB Thumb Drives To examine the two file systems on FTK Imager, two 4GB thumb drives were formatted, one for Page 4 of 29
5 NTFS and one for FAT32. Each were then imaged in FTK and compared to note the differences. The literature search was done through the Internet and related sources, such as operating system technical websites, technical journals, and a peer reviewed journal. RESULTS and DISCUSSION Key Structures The data structures in a file system are important, because it organizes and sorts all of the files and their data in a certain way to create an efficient system. There are a number of different types of data structures and each structure is typically utilized for a specific file system. NTFS structure starts in the first sector with a 512 byte record known as the boot record. This record has boot codes, disk signatures (this maintains and identifies the partitions), and a table of primary partitions. It becomes important in file system forensics to be able to identify a correct partition and types of partitions. 7 One major difference between the NTFS and FAT data structures is that NTFS utilizes a Journaling File System. 2 A journaling file system keeps track of changes in the system by use of a journal. This allows for a quicker reboot if there is a system crash or power failure and protects files from becoming corrupted. 21 The NTFS log ($LogFile) records any changes in the volume due to metadata (the data about data). However, the component that is the center of the NTFS file system is the Master File Table or MFT. MFT keeps data records of itself, so NTFS reserves the first 16 records for MFT data files. Any file names that start with a $ are MFT stored metadata files. The remaining record is used for file and folder records. (See Figure 2 for an example of a MFT entry.) $Mft contains a base file record for every file and folder in the NTFS volume. $MftMirr is a duplicate image of the first Page 5 of 29
6 four records of $Mft, and is a failsafe. 3 (See Figure 1 for metadata file descriptions. 3 ) The key thing to remember with NTFS is that every entry is a file. Thus, with the MFT it will contain an entry from every file and directory. An MFT entry is set up so that the first 42 bytes house the data, which acts as a header, and the remainder of the entry is made up of attributes. An attribute contains the actual file data. Only resident data that is 900 bytes or smaller are stored in an attribute. A good place for data to be hidden here is at the end of an entry where there is unused space. 8 This unused space is called slack, which will be described later in detail. Each entry is usually 1,024 bytes long and defined in the boot sector. The attributes are organized into a B- tree structure, which allows NTFS to group or index files in large folders, minimizing the number of disk access. Disk access is a driver that helps enhance the system s BIOS. The B-tree structure has records which points to external clusters, which may contain more data files. This is above and beyond the FAT file system, which has to scan all file names in a large folder in order to create a file listing. This is also referred to as a binary tree. 1, 3 (See Figure 4 to view a schematic on the NTFS Architecture.) The FAT file system is very simple in comparison to the NTFS. 6 The FAT file system has two main data structures; a file allocation table (or FAT) and directory entries. Every file and directory is allocated a data structure, specifically a directory entry. These directory entries are stored in clusters and if more than one cluster is used, then the FAT data structure is used to locate the individual entries. The FAT table will identify the next cluster in a file. (See Figure 5 to view a schematic of the FAT Architecture and Figure 3 to view an example of a FAT32 layout.) Page 6 of 29
7 The NTFS organizational structure helps make locating data in the file system easy and straightforward. Useful information can be extracted from the MFT metadata files, including where to locate certain attributes and possibly hidden spaces such as slack space. But in order to understand where this data can be hidden, one must first understand the structure. The FAT32 file system is significantly less complicated. It relies mainly on it FAT table to locate data. It can be possibly more complicated to extract data from the FAT table, but the final result will typically yield the same data as NTFS. Storage Mechanisms A disk drive can be described by the previous book model. The book represents a disk partition and as books can be a certain volume, so can a disk partition. A Disk Partition is created when a hard disk drive is dived up into logical storage units, or partitions. A Disk Partition can be viewed in two different places on the computer, one in disk management and the other in the command window. (See figures 8 and 9 to view disk partitions.) Within the partition are rings around the disk or tracks. A track is a physical division of data on a disk. These would be a section in the book. Inside the track lies clusters, which house sectors. These are chapters and paragraphs. The NTFS and FAT file systems both record data onto clusters which vary in size based on the volume size. NTFS utilizes smaller cluster sizes. With this, the smaller the cluster size the more efficient a disk can store information. This is due to unused space that is left on the end of the cluster when a small file is stored there. This is defined as slack, the term mentioned earlier. Slack space is the unused space at the end of a cluster that cannot be used by other data files. As noted in the key structures results, NTFS utilizes a Master File Table, Page 7 of 29
8 whereas FAT uses the directory entries and the file allocation table. When NTFS assigns data to a cluster, it starts at sector zero. $Bitmap, an MFT metadata file, finds the first available cluster and assigns the file to that cluster. The $BadClus MFT metadata file holds a listing that identifies any bad clusters, so that these will be avoided in the search for empty space. 3, 8 (See figures 6 and 7 to see an example of the disk drive layout.) The FAT file system does not start recording data at sector zero, but after a set number of reserved sectors and FAT areas. 6 This reserved sector starts at sector zero. The FAT area contains one or more FAT structures, in which there are always two copies stored in the file system. The data area contains the file content that will be stored in the cluster, and starts after the FAT area. The FAT structure has an entry for every cluster in the file system. If the table has an entry value of 0, then the cluster is not allocated to a file. If it contains the value, 0x0fff fff7, then the cluster has been determined to be damaged and is not used. FAT is harder to locate files than NTFS, because cluster addresses do not start at the beginning of the file system and must be found through the use of sector addresses. Since the data size does not always match the cluster size, there can be extra sectors at the end of a data area that are not part of the cluster or slack. It is these areas that can be used to hide data or store data that is intended to be hid. This area will not have a cluster address. 1 The forensic significance of the storage mechanisms closely resembles that of the key structures. Since NTFS has reduced slack space due to its size control of the clusters, there is less potential for hidden data here. Whereas with the FAT file system, the cluster size space is typically larger and thus has more potential to hide the data in the slack space. The difficulty is that this is Page 8 of 29
9 unallocated space, meaning that the slack space has no addressing. Since FAT does not index the files, it will tend to fracture large files, which can cause some issues. However, FAT32 does typically have a mirrored copy of its file allocation table, which helps with data recovery. File Names and Directories A file name or directory would be like the page number in a book. These page numbers link back to an index for easy access to the data of interest. NTFS stores and records file names in the MFT file record. When data is stored in the MFT file record it is known as a resident attribute. File names are always stored as a resident attribute. [If any records are contained in an external (non-resident) cluster, then the B-tree structure points to those data entries.] There are three attributes that are important in forensics and are used in the NTFS file system and contain much of the metadata that a MFT entry records. They are the $STANDARD_INFORMATION attribute, the $FILE_NAME attribute, and the $DATA attribute. The $STANDARD_INFORMATION attribute contains all the core metadata for a file or directory. The $FILE_NAME attribute contains the file reference for the parent directory. The $DATA attribute is used to store any sort of data and contains no specific values. NTFS also has the capability to support multiple data streams. 10 A data stream is defined as a sequence of bytes, where an application can write data a specific spots along the stream and every file has an associated unnamed stream assigned to it. NTFS, however, allows that file to have alternate data streams that can be aligned with the unnamed stream. This allows related data to be managed as a single unit. 3 (See Figures 10 and 11 to view FTK Imager snapshots of metadata files shown.) Page 9 of 29
10 FAT file systems are a little different. FAT will save the data under both an 8.3 file name and a long file name. An 8.3 filename is a compressed version of the long filename. MS-DOS uses the 8.3 file name to find and access a file. The 8.3 file name is saved in one or more secondary folder entries for the data file. Each folder entry holds 13 characters of the long file name. FAT does not allow for multiple data streams per file. Each file is only assigned a single data stream. 6 If you try to move or copy an alternate data stream to a FAT volume, then an error message will be displayed. 3 The obvious significant component is the attributes in NTFS. These attributes house the locations and sizes of all these data records. Knowing how to utilize these attributes in a forensic investigation is priceless. Not only do they store this data, but even of the file is deleted, they can still be used to find and recover this data. The data streams are also useful for finding related data to a record of interest. The $Logfile as described in figure 1, records transactions and entries in case of system failure. The information stored here can be valuable in a forensic investigation. FAT has a disadvantage here, because it simply tracks the files by the 8.3 filename. If able to view a FAT table, it may be hard to piece together a large file, or view the list in a coherent state. File Date and Times A file date/time stamp is like a bookmark or ear-marked page, which identifies where the book was last opened. A file time represents the milliseconds elapsed since a certain time. In this case, the time is 12:00 am, January , which is referred to as UTC or Coordinated Page 10 of 29
11 Universal Time. One thing to be careful about is that some file systems will log time according to local time. This can cause problems, because when a forensic examiner is examining a computer, he needs to know how the computer records time. Especially if there is a time difference from where the computer was confiscated to where it is analyzed. If a computer stores time with UTC, then the time differences do not matter. If they do not, then the examiner must be careful about recording date/time stamps. NTFS is not affected by these time differences, since, NTFS stores the file times in UTC. FAT stores file times based on the computer's local time. 4 NTFS has four main time and date stamp attributes which are creation time, modified time, MFT entry modified time, and accessed time, or MACE. 22 The creation time is the time when the file was created. The modified time is the time that the content of the $DATA and/or $INDEX attributes were last modified. The MFT entry modified time is the time when the metadata of the file was last modified. The accessed time is the time that refers to when the content of the file was last accessed. The three main attributes discussed above are very important when considering date and time stamps. The $STANDARD_INFORMATION attribute is where the primary set of date and time stamps are located. The four date/time stamps are also recorded in the $FILE_NAME attribute, but usually correspond to when the file was created, renamed, or moved. The $DATA attribute has no defined values. 4, 5 In a FAT file system, there are three date/time stamps that a directory entry utilizes; last accessed, last written, and created. The time values in the FAT file system is non-essential and could be false under some circumstances, because there are few requirements in the FAT Page 11 of 29
12 specification of date/time stamps. When FAT creates a directory entry for a new file it also creates a date/time stamp. This time value stays the same even if a copy of the original entry is moved to a different location. If a file is renamed or moved the original date/time stamp remains the same. The only exception is if the move is done from the windows 2000/XP system to a new or different volume, it will generate a new creation time. The written date/time stamps are created when new content is added to the file. The original written values stay with the data files, even when the file is moved or copied. The time is only updated when content is written or it is an automatic or manual save. If a file is moved, both creation and written values stay the same, but if you copy a file, the written time will stay the same and the creation time will be new. The accessed date/time stamp is accurate to the day, and also the time that is most frequently updated. So, if the file is opened or properties viewed a new access time will be created. Moving or copying the file will also update the time. 1 (See figures to view FTK Imager snapshots of metadata shown.) Some of the most significant forensic evidence is found in this category. If properly recorded and maintained, date/time stamps can reveal a lot about a specific file or folder. Both systems record these stamps, minus the entry modified time for FAT. Again the NTFS attributes house a lot of this metadata, plus additional data that FAT does not. Such metadata is permissions, encryptions, $Mft entry location, and that additional date/time stamp. Although FAT has these date/time stamps, like discussed above, they are not always true. One must take a careful approach in determining the validity of theses stamps to assure accuracy. File Deletion Page 12 of 29
13 The best way to associate file deletion with a book would be to mark a page as unused or place an indicator on the corner, then roll the page towards the binding. The page is still there, but you can t read the page. The page would not be torn out until another page replaces it. When considering file deletion in NTFS, the master file table is the key structure. A MFT entry, as discussed above, is created for every file or folder. This MFT entry holds the metadata for that file, including location, time/date stamps, etc. The location is accurate down to the start cluster and how long the data file is. When a file is deleted in NTFS, a special indicator file is unmarked. This special indicator shows up as used when marked. This allows the file system to allocate another file to this location. However, the data is still recoverable in the file system until it is overwritten by new data. Recoverability in NTFS is generally better than in the FAT file system. 12 There are a number of issues that can cause the file to not be able to be deleted. One problem is that some files use an Access Control List (ACL), which means the user does not have the permission to delete the file. Some other issues that may exist is that the file is in use, there is file system corruption preventing access, or the file name has a reserved or invalid name. 13 The FAT file system deletes files in a similar fashion to NTFS deletion system. When a FAT file is deleted the first character of the directory entry is replaced by a HEX E5h special character entry, which tells the operating system that the file can be ignored. Clusters that are assigned to the file as data entries are marked as available in the File Allocation Table. If new data is wrote over this area the old files can no longer be recovered or undeleted. Prior to rewriting data over the deleted information, undelete software can be used to recover old data. This data can Page 13 of 29
14 also be recovered manually. Another component that really assists in recovering intact data is that the file s data must be in consecutive clusters. 12 This is not a requirement, but greatly helps. Both systems have the added bonus that the files can be recovered as long as the clusters have not been reused with new data entries. The file system permissions that NTFS has could be an advantage to forensic recovery, because it may block some deletion. However, in both cases, care must be taken so as not too overlook these files. The addresses of these files no longer exist, so data may be found in the unallocated space or slack spaces. Encryption Encryption for a book would be like a locked diary, with only one person with a special key able to unlock it. NTFS was designed with access control and security as a priority. NTFS utilizes an improved security system over FAT, which insures authorized access. However, this security only works properly if Windows is opened correctly. It is possible for a person to access NTFS by using a low-level disk utility, allowing a person to bypass all security measures. 9 The system put into place to accomplish the encryption is the Encryption File System or EFS. This encrypts the files and folders and allows the user access to these encrypted files when they log in. There are two encryption mechanisms used by the EFS; the public and private keys. 11 Each user has their own public and private key. The public key can be made known to others, and the private key is only for select individuals. When a file is encrypted, the EFS uses the public key. When the file needs to be decrypted, a private key must be used. NTFS utilizes the BitLocker Drive encryption system. BitLocker is a logical volume encryption system that allows for full Page 14 of 29
15 drive encryption capabilities. There are three authentication mechanisms that BitLocker uses, but are not essential to this disscussion. 20 The FAT file system was not designed for encryption and has no internal security measures. The only way to encrypt a FAT file is through external or third-party encryption programs. Since FAT is mostly used in storage devices like Thumb drives, it really has no need for a security system like NTFS, because it was designed for versatility. With a robust encryption system in place, FAT would not be able to go between systems as easily. Obviously, gaining data from an unencrypted system is an advantage with the FAT32 file system. However, the NTFS encryption can help the evidence there to be preserved and not tampered with. The issue is having the appropriate permissions to access the file. With forensic tools though, this is not often an issue. CONCLUSIONS When considering the FAT32 file system, it has many good qualities in areas other than the strong areas of NTFS. These qualities are such things as versatility and compatibility. FAT32 has very little security, and if one has access to the drive, can access any files or folders there. FAT32 is much more susceptible to disk errors and do not recover as readily as NTFS. FAT32 does not support file compression, which helps greatly with organization. Since NTFS allows smaller cluster sizes than FAT32, it wastes less disk space, and has less potential for hidden files. However, again FAT32 has its uses. It is compatible with any Windows Operating System, Apple s HFS and file system, and many nix file systems (ext 2/3/4) 22 and can be converted to Page 15 of 29
16 NTFS without reformatting. If NTFS were to be converted to FAT32 for some reason, the NTFS would have to be reformatted. 17 NTFS was designed to be a robust file system. With its added features, such as, data streams, hierarchical storage, file compression and encryption, plus a very high performance level, NTFS has proved to be a very capable system. 7 However, if an older Windows system, earlier than Windows NT (2003), is used, NTFS may not be compatible with it. Also, older software programs may not be able to function with NTFS. Permissions are allowed in NTFS to control file and folder access, but this puts the chance for errors in the system way up. 16 To visualize the future and most recent developments of the respective file systems, two file systems will be discussed; Extended File Allocation Table (exfat) and the Resilient File System (ReFS). ExFAT was introduced in November 2006, but is the most recent of the FAT file Systems. exfat was designed as an upgrade and successor to the FAT file system family. As mobile technology grows and expands, file systems competent to support these devices are needed. ExFAT was designed with this in mind and has the capability of supporting large files for media storage. It also has seamless interoperability between computers and these devices, allowing easy copying and moving of files and folders. External media greater then 32GB can also be formatted with exfat. ExFAT has some improvements over the FAT32 file system, while keeping the simplicity of the FAT family. Some of these improvements are support for large files and storage devices, support for performance improvement, support for future innovation, Page 16 of 29
17 and greater compatibility with flash media. In addition to this, exfat adds in a cluster bitmap, per-file contiguous bit, better on-disk layout, and support for UTC time stamps. Metadata structures that are template-based were also added to support custom extensions. 19 The Resilient File System was created for the new Windows 8 operating system coming out in October ReFS was built upon the foundation of NTFS, utilizing much of its features. Some features include BitLocker Encryption, access-control lists, USN (update sequence number) Journal or change journal (records changes in the volume), and file IDs (an archive of content description). 18 The change in the new file system comes in the on-disk store engine that implements on-disk structures like the MFT file table. Some of the features that are not supported in ReFS from NTFS is named streams, object IDs, short filenames, file compression, file level encryption, user data transactions, sparse files, hard-links, extended attributes, and disk quotas. FUTURE RESEARCH Future research into different file systems will always be a necessity, especially in the forensics arena. With constantly changing technology, operating systems and file systems will be constantly updating to support the technology. As a forensic examiner it is important to keep up with and understand these new file systems. The next step is a look into ReFS, and how it compares to past file system forensic analysis. Also, since ReFS will be introduced with the new Windows 8 server, an analysis on data extracted from the OS could be looked at, with respect to the control and organization of the resilient file system. Page 17 of 29
18 ACKNOWLEDGEMENTS SSA Lou Ann Stovall, SA Cindy Smith, Sgt. Jeff Owen, RCFL Examiners, Josh Brunty, & Dr. Terry Fenger REFERENCES 1. Carrier, Brian. File System Forensic Analysis. Chapters Pearson Education NTFS. Copyright [accessed June 9 th, 2012] 3. Windows Server. File System Technologies, NTFS Technical Reference. [accessed June 14 th, 2012] 4. Windows. File Times. [accessed July 3 rd, 2012] 5. Where is Your Data?. Dates: NTFS Created, Modified, Accessed, Written [accessed July 3 rd, 2012] 6. Windows Server. File System Technologies, FAT Technical Reference. [accessed June 14 th, 2012] 7. Medeiros, Jason. NTFS Forensics: A Programmers View of Raw Filesystem Data Extraction. Grayscale Research [accessed June 7 th, 2012] 8. Kozierok, Charles M. The PC Guide. NTFS Architecture and Structures. Copyright [accessed July 10 th, 2012] 9. Kozierok, Charles M. The PC Guide. Other NTFS Features and Advantages, Encryption. Copyright [accessed July 12 th, 2012] 10. Kozierok, Charles M. The PC Guide. NTFS Directories and Files. Copyright [accessed July 12 th, 2012] 11. AccessData. Forensic Toolkit: Sales and Promotional Summary. AccessData Corp. [accessed July 12 th, 2012] 12. DIY DataRecovery. Undelete: deleted file recovery. Created [accessed July 16 th, 2012] 13. Microsoft Support. You cannot delete a file or folder on an NTFS file system volume. [accessed July 16 th, 2012] 14. Ruhnka, John; Bagby, John. The CPA Journal, Forensic Uses of Metadata. June [accessed July 19 th, 2012] 15. Forensic Data Recovery. Forensic Data Recovery vs Data Recovery. [accessed July 19 th, 2012] 16. Yousef, Mohammad. Tech Junkeez. File Systems Exposed (Part 2). August [accessed July 24 th, 2012] 17. Foley, Jim. The Elder Geek. FAT32 or NTFS: Making the Choice. Copyright Page 18 of 29
19 [accessed July 24 th, 2012] 18. MSDN Blogs. Building Windows 8: An Inside Look from the Windows Engineering Team. Building the next generation file system for Windows: ReFS. Pub. January 16 th, for-windows-refs.aspx [accessed July 24 th, 2012] 19. Microsoft Support. Description of the exfat file system driver update package. [accessed July 25 th, 2012] 20. Microsoft Windows. BitLocker Drive Encryption. Copyright Overview [accessed July 25 th, 2012] 21. Corbet, Jonathan. Barriers and Journaling Filesystems. Copyright [accessed June 9 th, 2012] 22. Brunty, Josh. NTFS Filesystem PowerPoint. Fall Fenger, Terry, Ph.D. NTFS (New Technology File System) Foundations and Fundamentals. Fall FIGURES Figure 1: Table of Metadata File Types System File Master file table Master file table mirror File Name MFT Record Purpose of the File $Mft 0 Contains one base file record for each file and folder on an NTFS volume. If the allocation information for a file or folder is too large to fit within a single record, other file records are allocated as well. $MftMirr 1 Guarantees access to the MFT in case of a single-sector failure. It is a duplicate image of the first four records of the MFT. Log file $LogFile 2 Contains information used by NTFS for faster recoverability. The log file is used by Windows Server 2003 to restore metadata consistency to NTFS after a system failure. The size of the log file depends on the size of the volume, but you can increase the size of the log file by using the Chkdsk command. Volume $Volume 3 Contains information about the volume, such as the volume label and the volume version. Attribute $AttrDef 4 Lists attribute names, numbers, and descriptions. definitions Root file 5 The root folder.. name index Cluster $Bitmap 6 Represents the volume by showing free and unused bitmap clusters. Boot sector $Boot 7 Includes the BPB used to mount the volume and additional Page 19 of 29
20 bootstrap loader code used if the volume is bootable. Bad cluster $BadClus 8 Contains bad clusters for a volume. file Security file $Secure 9 Contains unique security descriptors for all files within a volume. Upcase table $Upcase 10 Converts lowercase characters to matching Unicode uppercase characters. NTFS extension file $Extend 11 Used for various optional extensions such as quotas, reparse point data, and object identifiers Reserved for future use. Windows Server. File System Technologies, NTFS Technical Reference. [accessed 7/24/2012] Figure 2: MFT Entry A represents a 42 byte header that contains entry data B, C, and D represent attributes An attribute contains the actual resident file data E = Slack Space Figure made in Microsoft word 8/6/2012 Figure 3: FAT Structure Figure made in Microsoft word 8/6/2012 Page 20 of 29
21 Figure 4: NTFS Architecture The Master Boot Record has boot codes, disk signatures (this maintains and identifies the partitions), and a table of primary partitions. Contains machine code that is loaded into RAM. This NTLDR loads the operating system during the boot process. Windows Server. File System Technologies, NTFS Technical Reference. [accessed 6/21/2012] Page 21 of 29
22 Figure 5: FAT Architecture As can be seen, FAT has a similar architecture to NTFS. The major differences are the OS loader and how the disk drive is organized. Windows Server. File System Technologies, FAT Technical Reference. [Accessed 6/21/2012] Figure 6: Example of a Disk Drive Track on Disk Drive Cluster Sectors Track- A circular track on a disk drive that is a physical division of data. Cluster (Size changes based on file system) Sector- subdivision of a track. Figure made in Microsoft word 7/24/2012 Page 22 of 29
23 Figure 7: Hard Disk Model A=Track B= Geometrical Sector C= Track Sector D= Cluster Tracks (Disk Drive). Updated July [accessed 7/18/2012] Figure 8: Disk Partition for a Windows 7 OS with NTFS File System Attributes in the Volume C Drive Only one partition visible to the user on this computer Screen Shot off of Toshiba Laptop 7/25/2012 Page 23 of 29
24 Figure 9: Disk Partition description Can remove mount point or drive letter here. Volume 2 is most likely the Recovery partition shown in the Disk Manager. Screen Shot off of Toshiba Laptop 7/25/2012 Page 24 of 29
25 Figure 10: Thumb drive disk description in FTK Imager This data can be found in the computer information as well. This describes the component sizes on the hard drive. Screen Shot of FTK Imager screen off of Toshiba Laptop 8/6/2012 Page 25 of 29
26 Figure 11: Root Directory File types displayed in FTK Imager The files seen here are most likely from the header data in the FAT reserved sectors. These are the metadata files associated with each file system. The metadata files discussed with NTFS can be seen here. Screen Shot of FTK Imager screen off of Toshiba Laptop 8/6/2012 Page 26 of 29
27 Figure 12: Metadata File associated with NTFS in FTK Imager FTK refers to a folder as a directory, this can be seen here. The Attribute file $I30 is unique to NTFS. In particular, it describes the storage location of a directory, probably the directory shown above. It is a non-resident attribute, which locates the directory on the B-tree. Screen Shot of FTK Imager screen off of Toshiba Laptop 8/6/2012 Figure 13: No metadata files associated with FAT; all are stored in reserved sectors As can be seen above, there are no location attributes here. FAT32 must use its File Allocation Table to locate the location of the same directory above. Screen Shot of FTK Imager screen off of Toshiba Laptop 8/6/2012 Page 27 of 29
28 Figure 14: Data associated with the FAT File System Associated date/time stamps with FAT. Here the 8.3 filename is shown. The long filename is Internship, whereas the 8.3 file name is INTERN~1. This is the filename that FAT will use when looking up the file. Screen Shot of FTK Imager screen off of Toshiba Laptop 8/6/2012 Page 28 of 29
29 Figure 15: Data associated with the NTFS File System As can be seen, a lot more metadata is extracted from NTFS. An additional date/time stamp. The 8.3 filename The MFT record number, which identifies where the $MFt metadata file is located. All of the file permissions, encryption information, and security. Screen Shot of FTK Imager screen off of Toshiba Laptop 8/6/2012 Page 29 of 29
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer
New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good
The Windows File System @ Articles -> Software Oct 07 2004, 00:45 (UTC+0)
select a site 6 forums 6 juice: USS Cole Automatic network monitoring with GFI Network Server Monitor. Dld Free Trial! Main Exploits Links Forums Register features You're not registered and logged, please
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000 Table of Contents List of Figures... iv Introduction...1 The Physical Disk...1 File System Basics...3 File
Windows OS File Systems
Windows OS File Systems MS-DOS and Windows 95/98/NT/2000/XP allow use of FAT-16 or FAT-32. Windows NT/2000/XP uses NTFS (NT File System) File Allocation Table (FAT) Not used so much, but look at as a contrast
Copyright 2014 http://itfreetraining.com
This video looks at the four file systems supported by Windows. These are ReFS, NTFS, FAT and exfat. The video looks at what each file system is capable of and its limitations. Resilient File System (ReFS)
Installing a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
Operating Systems CS-384. File Systems. NTFS and FAT32. Submitted To: Dr. Chris Taylor. Submitted By: Aditya Sitani
Operating Systems CS-384 File Systems NTFS and FAT32 Submitted To: Dr. Chris Taylor Submitted By: Aditya Sitani Date: 02/3/2003 Table of Contents Introduction... 0 Physical Disk... 1 Files... 2 Files concept...
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch
3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Forensically Determining the Presence and Use of Virtual Machines in Windows 7
Forensically Determining the Presence and Use of Virtual Machines in Windows 7 Introduction Dustin Hurlbut Windows 7 has the ability to create and mount virtual machines based upon launching a single file.
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Determining VHD s in Windows 7 Dustin Hurlbut
Introduction Windows 7 has the ability to create and mount virtual machines based upon launching a single file. The Virtual Hard Disk (VHD) format permits creation of virtual drives that can be used for
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
Ans.: You can find your activation key for a Recover My Files by logging on to your account.
Faqs > Recover Q1. I lost my activation key Ans.: You can find your activation key for a Recover My Files by logging on to your account. Q2. I purchased on-line, when will my activation key be sent to
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
Chapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
Alternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney [email protected] and [email protected]
Windows 7: Current Events in the World of Windows Forensics
Windows 7: Current Events in the World of Windows Forensics Troy Larson Senior Forensic Program Manager Network Security, Microsoft Corp. Where Are We Now? Vista & Windows 2008 BitLocker. Format-Wipes
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY
COMPUTER FORENSICS. DAVORY: : DATA RECOVERY Supervised By: Dr. Lo ai Tawalbeh New York Institute of Technology (NYIT)-Amman-2006 TOPICS Definition Recovery from what?? Davory SOFTWARE. Restore Software.
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Chapter 12 File Management
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Overview File organisation and Access
Chapter 12 File Management. Roadmap
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 12 File Management Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Overview Roadmap File organisation and Access
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
IFSM 310 Software and Hardware Concepts. A+ OS Domain 2.0. A+ Demo. Installing Windows XP. Installation, Configuration, and Upgrading.
IFSM 310 Software and Hardware Concepts "You have to be a real stud hombre cybermuffin to handle 'Windows'" - Dave Barry Topics A+ Demo: Windows XP A+ OS Domain 2.0 Chapter 12: File and Secondary Storage
EaseUS. EaseUS Data Recovery Wizard User guide
EaseUS Data Recovery Wizard User guide 1 Introduction... 3 Welcome... 3 How to use this manual... 3 About EaseUS Data Recovery Wizard... 3 Edition statement... 3 New Features in EaseUS Data Recovery Wizard
1 File Management, Virus Protection, and Backup 2 File Basics Every file has a name, and might also have a filename extension You must provide a valid filename that adheres to rules or file-naming conventions
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Crash Proof - Data Loss Prevention
Crash Proof - Data Loss Prevention Software Crash Proof - Data Loss Prevention Crash Proof is data loss prevention software which once installed revives 100% data in the event of a data loss situation.
File Systems Management and Examples
File Systems Management and Examples Today! Efficiency, performance, recovery! Examples Next! Distributed systems Disk space management! Once decided to store a file as sequence of blocks What s the size
Optimizing and Protecting Hard Drives Chapter # 9
Optimizing and Protecting Hard Drives Chapter # 9 Amy Hissom Key Terms antivirus (AV) software Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates VirusScan
70-271. Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A. DEMO Version
Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration
Computer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual
STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual Copyright 2001 by Stellar Information Systems Ltd. All Rights Reserved The information contained in this documentation is subject to
NTFS Undelete User Manual
NTFS Undelete User Manual What is NTFS Undelete? NTFS Undelete is a small utility that scans your hard drive for all files that can be undeleted and attempts to recover them for you. Sounds like magic?
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
TUXERA NTFS for Mac USER GUIDE 2/13. Index
2/13 Index 1. Introduction to Tuxera NTFS for Mac... 3 1.1 What is a file system driver?... 3 1.2 How does it work?... 3 2. Installation... 5 2.1 Installing Tuxera NTFS for Mac... 5 2.2 Uninstalling Tuxera
Understanding the Boot Process and Command Line Chapter #3
Understanding the Boot Process and Command Line Chapter #3 Amy Hissom Key Terms 1. Active Partition the primary partition on the hard drive that boots the OS. Windows NT/2000/XP calls the active partition
(b) slack file space.
Hidden Files A Computer Forensics Case Study Question Paper 1. Outline the meaning of the following terms: (a) cookie, [2 marks] A cookie is data stored locally that is used by some websites for data that
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
Chapter 13 File and Database Systems
Chapter 13 File and Database Systems Outline 13.1 Introduction 13.2 Data Hierarchy 13.3 Files 13.4 File Systems 13.4.1 Directories 13.4. Metadata 13.4. Mounting 13.5 File Organization 13.6 File Allocation
File Recovery: Find Files You Thought Were Lost F 2/1. Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin!
File Recovery: Find Files You Thought Were Lost F 2/1 Clever Tricks to Recover Deleted Files Even if They ve Been Emptied from the Recycle Bin! With the information in this article you can: Save yourself
Review NTFS Basics. Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh. Bardsir Branch, Islamic Azad University, Bardsir, Iran
Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University,
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
Chapter 12 File Management
Operating Systems: Internals and Design Principles Chapter 12 File Management Eighth Edition By William Stallings Files Data collections created by users The File System is one of the most important parts
Up-to-the-minute Data Protection
User s Manual Undelete for Windows Up-to-the-minute Data Protection July 2007 This document describes the installation and operation of the Undelete file recovery solutions. It applies to the Server, Desktop
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
Volume Serial Numbers and Format Date/Time Verification
Volume Serial Numbers and Format Date/Time Verification Written by Craig Wilson, MSc MBCS CITP Digital Detective Group October 2003 (updated June 2005) Table of Contents Table of Contents... 2 Introduction...
File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez
File Systems for Flash Memories Marcela Zuluaga Sebastian Isaza Dante Rodriguez Outline Introduction to Flash Memories Introduction to File Systems File Systems for Flash Memories YAFFS (Yet Another Flash
LESSON 4 - FILE MANAGEMENT
LESSON 4 - FILE MANAGEMENT Objective Create a Folder Rename a Folder Create a folder structure Learn how to select files and folders Learn contiguous and non-contiguous selection Learn how to move or copy
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING
ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Data Recovery Wizard
Data Recovery Wizard User guide - 1 - Table of contents Introduction...- 3 - Welcome...- 3 - How to use this manual...- 3 - About EaseUS Data Recovery Wizard...- 5 - Edition Statement...- 5 - New Features
QUICK RECOVERY FOR RAID
Quick Recovery for RAID Features File Systems Supported Who suffers most Recovery Modes De-Stripper File Recovery Frequently Asked Questions QUICK RECOVERY FOR RAID Quick Recovery for RAID 0, RAID 5. Quick
2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
User Guide. Version 3.0
Kaseya Backup and Disaster Recovery User Guide Version 3.0 October 12, 2009 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT
Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A
Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the
AMD Radeon RAMDisk. User's Manual and FAQ
AMD Radeon RAMDisk User's Manual and FAQ Revision Tracker Revision Number Software Version Description Revision Date 03 V4.0.1 Initial Release October 2012 1 Contents 1. Introduction to RAMDISK... 3 What
Designing and Deploying Connected Device Solutions for Small and Medium Business
Designing and Deploying Connected Device Solutions for Small and Medium Business HPATA Connected Devices Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common desktop virtualization technologies
Symantec Drive Encryption for Windows
Symantec Drive Encryption for Windows Technical Note 10.3 Released January 2014. Legal Notice Copyright (c) 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo,
NTFS Documentation. Richard Russon Yuval Fledel
NTFS Documentation Richard Russon Yuval Fledel NTFS Documentation by Richard Russon and Yuval Fledel Abstract This is technical documentation, created to help the programmer. It was originally written
Acronis Disk Director Server 10.0. User s guide
Acronis Disk Director Server 10.0 User s guide Copyright Acronis, Inc., 2000 2010. All rights reserved. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights
2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
Multicam 8.04.33 Installation guide. Table of Contents
Print: 09/11/2007 Page: 1/6 Multicam 8.04.33 Installation guide Table of Contents 1. INSTALLATION ON MTPC A1/A2 (A1, A1/R, A1/R2)... 2 1.1. DOS 6.22 OPERATING SYSTEM... 2 1.2. MULTICAM SOFTWARE... 2 1.2.1.
MBR and EFI Disk Partition Systems
MBR and EFI Disk Partition Systems Brought to you by www.rmroberts.com Computer technology is constantly evolving. The hard disk drive partition system has become quite complicated in recent years because
NovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Active@ Password Changer for DOS User Guide
Active@ Password Changer for DOS User Guide 1 Active@ Password Changer Guide Copyright 1999-2014, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form
