Data Erasure. Alex Applegate. Mississippi State University Digital Forensics 1
|
|
- Dwayne Miller
- 6 years ago
- Views:
Transcription
1 Data Erasure Alex Applegate 1
2 Overview Simple File Deletion Permanent File Deletion Data Wiping Can Wiped Data Be Recovered? Deletion on Solid State Drives 2
3 Simple File Deletion When a file is deleted in a GUI, either by using the delete key or using the rightclick menu (or its equivalent) leaves a file completely intact on the hard drive. Only the location pointer is updated by the file system Windows -> Recycle Bin Macintosh -> Trash Can Linux -> Trash 3
4 Permanent File Deletion A file can be deleted from the file system, but the underlying file is still largely, if not completely, unchanged on the actual hard drive File pointer deleted from the file table and associated clusters on hard drive marked as unallocated Those clusters are then available to be overwritten 4
5 Data Wiping An application can be used to intentionally overwrite clusters deallocated by file deletion Writes binary zeroes, ones, or random data for one or more passes Still no file associated with clusters Clusters are still marked as unallocated 5
6 Can Wiped Data Be Recovered? In 1996, Peter Gutmann wrote a paper discussing data recovery using magnetic force microscopy (MFM) and the possibility to detect data leakage Described 35 possible write patterns that would ensure maximal effectiveness on any hard drive Paper in 2000 demonstrated that even the recovered information was almost completely unusable; fractional bytes and not all the time 6
7 Gutmann s Whisker Data Leakage 7
8 Can Wiped Data Be Recovered? (cont d) Gutmann published follow-up in 2001 indicating new drive technology made data leakage as indicated by the 1996 paper highly unlikely In 2006, perpendicular storage was introduced making the possibility even more remote 8
9 MFM Images Between 2000 and
10 Perpendicular Storage 10
11 Perpendicular Storage (cont d) 11
12 MFM Image After
13 Why Is There Still Concern? Solid State Hard Drives complicate the issue instructions still written for spinning disks, SSD controllers do not necessarily do what they re told DoD Standard requires 3 pass wipes for secret data, 7 passes for top secret indicating unknown government technique for recovering wiped data Additionally, a 2009 paper analyzed the actual results of commercial tools, and even wiped data was able to be recovered most of the time 13
14 Deletion on Solid State Drives Most new drives perform deletion via a garbage collection routine or by TRIM Storage is in fixed sized blocks Data is all or nothing, no slack space or overwrites Whether by GC or TRIM, removal of unallocated blocks (controlled by OS) happens every few minutes Forensics has traditionally been able to access historical artifacts even when a file location has been properly wiped These get cleaned up by SSDs Newer operating systems are making logs and building snapshots Even if something is deleted by the user, it isn t deallocated if it s referenced in a snapshot 14
15 Summary Simple File Deletion Permanent File Deletion Data Wiping Can Wiped Data Be Recovered? Deletion on Solid State Drives 15
16 Data Erasure QUESTIONS? 16
17 References Gutmann, P., 1996, Secure Deletion of Data from Magnetic and Solid State Memory, Proceedings of the 6 th Conference on USENIX Security Gutmann, P., 2001, Data Remanence in Semiconductor Devices, Proceedings of the 10 th Conference on USENIX Security Wright, C. and D. Kleiman, 2008, Overwriting Hard Drive Data: The Great Wiping Controversy, Information Systems Security Pajek, P. and E. Pimenidis, 2009, Antiforensics and Their Impact on Computer Forensic Investigations, ICGS3 DoD/NIST Standard
FILE SYSTEMS, PART 2. CS124 Operating Systems Winter , Lecture 24
FILE SYSTEMS, PART 2 CS124 Operating Systems Winter 2015-2016, Lecture 24 2 Files and Processes The OS maintains a buffer of storage blocks in memory Storage devices are often much slower than the CPU;
More informationFILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24
FILE SYSTEMS, PART 2 CS124 Operating Systems Fall 2017-2018, Lecture 24 2 Last Time: File Systems Introduced the concept of file systems Explored several ways of managing the contents of files Contiguous
More informationAdvancements in SSD Forensics
Advancements in SSD Forensics Jeff Hedlesky, Guidance Software David Sun, S34A Chris Bross, DriveSavers www.encase.com/ceic www.s34a.com www.drivesavers.com Presentation Overview Introduction Background
More informationWipeDrive Home 9. IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive Overview... 3 System Requirements...
Table of Contents IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive... 3 Overview... 3 System Requirements... 3 Key Features... 4 Secure Removal of HPA and DCO... 4 Secure Erase
More informationGuide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems
Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic
More informationCSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems
CSE 4482 Computer Security Management: Assessment and Forensics Computer Forensics: Working with Windows and DOS Systems Instructor: N. Vlajic,, Fall 2010 Required reading: Guide to Computer Forensics
More informationEI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)
EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:
More informationFile System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT)
File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT) 1 FILE SYSTEM CONCEPTS: FILE ALLOCATION TABLE (FAT) Alex Applegate
More informationReport For Algonquin Township Highway Department
Report For Algonquin Township Highway Department Prepared For: Prepared By: Robert Hanlon Attorney at Law robert@robhanlonlaw.com Andy Garrett Garrett Discovery Inc agarrett@garrettdiscovery.com Date:
More informationASSESSING TRACE EVIDENCE LEFT BY SECURE DELETION PROGRAMS
Chapter 15 ASSESSING TRACE EVIDENCE LEFT BY SECURE DELETION PROGRAMS Paul Burke and Philip Craiger Abstract Secure deletion programs purport to permanently erase files from digital media. These programs
More informationTable of Contents. ShredIt X Read Me.
ShredIt X Read Me www.mireth.com support@mireth.com Table of Contents The Right Software For The Job About ShredIt X... 3 System Requirements...3 All about shredding... 4 ShredIt Safety Features...4 How
More informationDisk Geometry and Layout
Disk Geometry and Layout Alex Applegate 1 Overview Secondary Storage Disk Addressing Master Book Record ATA Interface Host Protected Area Device Configuration Overlay Bad Blocks 2 Secondary Storage Usually
More informationCapturing RAM. Alex Applegate. Mississippi State University Digital Forensics 1
Capturing RAM Alex Applegate 1 Overview Capture Problems Causing a Process Dump Full Manual Memory Dump Binary Block Copy Tribble Cold Boot Recovery Firewire DMA Attack 2 Capture Problems RAM has many
More informationCS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2015 Lecture 25
CS24: INTRODUCTION TO COMPUTING SYSTEMS Spring 2015 Lecture 25 LAST TIME: PROCESS MEMORY LAYOUT! Explored how Linux uses IA32! All processes have a similar layout Each process has its own page table structure
More informationFile Shredders. and, just what is a file?
File Shredders. File shredders delete a file but they do that in a way that is different from how the Windows operating system (and all regular Windows applications) delete files. To understand the difference,
More informationSentient Storage: Do SSDs have a mind of their own? Tom Kopchak
Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak :: @tomkopchak About me Why we're here Current forensic practices for working with hard drives are well-defined Solid state drives behave
More informationThe forensic effectiveness of virtual disk sanitization
The forensic effectiveness of virtual disk sanitization Joshua Sablatura Department of Computer Science Sam Houston State University Huntsville, Texas, 77341 Email:jds088@shsu.edu Umit Karabiyik Department
More informationSome reasons to repair your boot-loader might include installing Microsoft Windows after you have installed Ubuntu, adding or removing a hard drive.
How To Recover Linux After Install Windows 7 Over If you have Windows 7 dual booting with Ubuntu and you want Windows 7 To do this I am going to show you how to create a system recovery disk, how to After
More informationComputer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase
Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files
More informationDisk Drill by LaWanda Warren
Disk Drill by LaWanda Warren GOAL OF PROJECT If you're a forensic investigator or even an everyday computer user and you want to recover some files or images from corrupt hard drive or even an external
More informationThe ability to reliably determine file timestamps on modern filesystems using copy-on-write
The ability to reliably determine file timestamps on modern filesystems using copy-on-write The specifics of storing metadata on filesystems without copy-on-write Old filesystems like NTFS, FAT, and EXT,
More informationChapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.
Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems
More informationCHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.
CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File
More informationHow to Rescue a Deleted File Using the Free Undelete 360 Program
R 095/1 How to Rescue a Deleted File Using the Free Program This article shows you how to: Maximise your chances of recovering the lost file View a list of all your deleted files in the free Restore a
More informationRunning head: FTK IMAGER 1
Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although
More informationBlancco File Eraser Security Target. For the Common Criteria Certification of Blancco File Eraser Version
Blancco File Eraser Security Target For the Common Criteria Certification of Blancco File Eraser Version 2.0 www.blancco.com Table of Content 1 Security Target Introduction... 3 1.1 ST Reference... 3 1.2
More informationForensic and Anti-Forensic on modern Computer Systems
Forensic and Anti-Forensic on modern Computer Systems Alexander Krenhuber 1 and Andreas Niederschick 1 Johannes Kepler Universität Linz, Institut für Informationsverarbeitung und Mikroprozessortechnik
More informationSome Basic Terminology
Some Basic Terminology A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Here are a few terms you'll run into: A Application Files Program files environment where you can create and edit the kind of
More informationOntrack EasyRecovery 11 New Features Guide. S.M.A.R.T. Analysis Recovering from a VMware VMDK image Secure Data Erasure
Ontrack EasyRecovery 11 New Features Guide S.M.A.R.T. Analysis Recovering from a VMware VMDK image Secure Data Erasure S.M.A.R.T. Analysis S.M.A.R.T. Scan identifies the amount and type of data being used,
More informationSMORE: A Cold Data Object Store for SMR Drives
SMORE: A Cold Data Object Store for SMR Drives Peter Macko, Xiongzi Ge, John Haskins Jr.*, James Kelley, David Slik, Keith A. Smith, and Maxim G. Smith Advanced Technology Group NetApp, Inc. * Qualcomm
More informationForensic Discovery. Wietse Venema IBM T.J.Watson Research, USA
Forensic Discovery Wietse Venema wietse@porcupine.org IBM T.J.Watson Research, USA Overview Information on retired disks. Information on overwritten disks. Persistence of deleted file information. Persistence
More informationSSD (Solid State Disk)
SSD (Solid State Disk) http://en.wikipedia.org/wiki/solid-state_drive SSD (Solid State Disk) drives Most SSD drives gives very good performance 4x ~ 100x No noise, low weight, power and heat generation
More informationPage Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices
Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Ilhoon Shin Seoul National University of Science & Technology ilhoon.shin@snut.ac.kr Abstract As the amount of digitized
More informationThe What, Why and How of the Pure Storage Enterprise Flash Array. Ethan L. Miller (and a cast of dozens at Pure Storage)
The What, Why and How of the Pure Storage Enterprise Flash Array Ethan L. Miller (and a cast of dozens at Pure Storage) Enterprise storage: $30B market built on disk Key players: EMC, NetApp, HP, etc.
More informationIRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]
IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The
More informationTODAY AND TOMORROW. Storage CHAPTER
1 TODAY AND TOMORROW 3 Storage CHAPTER Storage Systems Characteristics All storage systems have specific characteristics Storage medium (what data is stored on) Can be removable or nonremovable from the
More informationGoogle Cloud Whitepaper September Data deletion on Google Cloud Platform
Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion
More informationChapter 10: Mass-Storage Systems
Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space
More informationChapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition
Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space
More informationInfoWatch CryptoStorage. User Guide
InfoWatch CryptoStorage User Guide I N F O W A T C H C R Y P T O S T O R A G E User Guide ZAO InfoWatch Phone/fax: +7(495)22-900-22 http://www.infowatch.com Last edited: December 2008 Table of Contents
More informationOverprovisioning and the SanDisk X400 SSD
and the SanDisk X400 SSD Improving Performance and Endurance with Rev 1.2 October 2016 CSS Technical Marketing Western Digital Technologies, Inc. 951 SanDisk Dr. Milpitas, CA 95035 Phone (408) 801-1000
More informationHard facts. Hard disk drives
Hard facts Text by PowerQuest, photos and drawings Vlado Damjanovski 2004 What is a hard disk? A hard disk or hard drive is the part of your computer responsible for long-term storage of information. Unlike
More informationC13: Files and Directories: System s Perspective
CISC 7310X C13: Files and Directories: System s Perspective Hui Chen Department of Computer & Information Science CUNY Brooklyn College 4/19/2018 CUNY Brooklyn College 1 File Systems: Requirements Long
More informationTricky issues in file systems
Tricky issues in file systems Taylor Riastradh Campbell campbell@mumble.net riastradh@netbsd.org EuroBSDcon 2015 Stockholm, Sweden October 4, 2015 What is a file system? Standard Unix concept: hierarchy
More informationMulti-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity
Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity Mohammed Alhussein, Duminda Wijesekera Department of Computer Science George Mason University Fairfax,
More informationTRANSACTIONAL FLASH CARSTEN WEINHOLD. Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong Zhou
Department of Computer Science Institute for System Architecture, Operating Systems Group TRANSACTIONAL FLASH Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong Zhou CARSTEN WEINHOLD MOTIVATION Transactions
More informationManually Wipe Hard Drive Software Windows 7 Clean
Manually Wipe Hard Drive Software Windows 7 Clean How to format a hard drive in Windows Vista, 7 or 8: plus how to format hard drive from This program will totally erase and format your hard disk, allowing
More informationManually Wipe Hard Drive Windows 7 Command Prompt Format
Manually Wipe Hard Drive Windows 7 Command Prompt Format Pro tip: Use Windows 8's Format command to perform a secure disk wipe He asked me what program I would recommend for securely wiping a disk. Microsoft
More informationSECUDRIVE Sanitizer Portable User Guide
SECUDRIVE Sanitizer Portable User Guide Doc Ver. 2.0.27.238 2014-04-24 Brainzsquare, Inc. TABLE OF CONTENTS 1 Overview... 3 1.1 Features... 3 2 PC Sanitization... 5 2.1 Program Package... 5 2.2 Running
More informationFile Systems: Interface and Implementation
File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition
More informationTesting the Date Maintenance of the File Allocation Table File System
Abstract Testing the Date Maintenance of the File Allocation Table File Tom Waghorn Edith Cowan University e-mail: twaghorn@student.ecu.edu.au The directory entries used in the File Allocation Table filesystems
More informationShredIt Read Me www.mireth.com support@mireth.com Table of Contents The Right Software For The Job About ShredIt... 2 System Requirements...2 All about shredding... 3 ShredIt Safety Features...3 How a
More informationWhy SaaS isn t Backup
EBOOK LOGO HERE Why SaaS isn t Backup Yes, You need to backup your cloud data. 1 One of the most business friendly innovations in recent years has been the proliferation of cloud apps like Google Apps,,
More informationThe Villages Computer Club - no meeting Friday 7/5/2013 due to Holiday. The next ipad meeting will be on Tuesday July 2,2013 at 1:30, Colony Cottage.
The Villages Computer Club - no meeting Friday 7/5/2013 due to Holiday. The next ipad meeting will be on Tuesday July 2,2013 at 1:30, Colony Cottage. We will be discussing various apps and then a Basic
More informationMachine Language and System Programming
زبان ماشين وبرنامه نويسی سيستم Machine Language and System Programming جلسه دوازدھم دانشگاه صنعتی ھمدان پاييز 1389 Objectives Explain the purpose and structure of file systems Describe Microsoft file structures
More informationDefense Security Service Office of the Designated Approval Authority Process for Clearing a Blackberry
Defense Security Service Office of the Designated Approval Authority Process for Clearing a Blackberry This process is recommended for use by Industry when a Blackberry must be cleared as a result of a
More informationDynamic Storage Allocation
6.172 Performance Engineering of Software Systems LECTURE 10 Dynamic Storage Allocation Charles E. Leiserson October 12, 2010 2010 Charles E. Leiserson 1 Stack Allocation Array and pointer A un Allocate
More informationVirtual Swap Space in SunOS
Virtual Swap Space in SunOS Howard Chartock Peter Snyder Sun Microsystems, Inc 2550 Garcia Avenue Mountain View, Ca 94043 howard@suncom peter@suncom ABSTRACT The concept of swap space in SunOS has been
More informationRavi Kant Chaurasia *1, Dr. Priyanka Sharma 2 *1 M.Tech Cyber Security, Raksha Shakti University, Ahmedabad, Gujarat, India ABSTRACT I.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Solid State Drive (SSD) Forensics Analysis : A
More informationMicrosoft File Allocation Table
Microsoft File Allocation Table CSC362, Information Security originally appeared in late 1970s for small disks with simple folder structures uses a FAT to index files (naturally) the original FAT- 12 gave
More informationSecure Erasure of Flash Memory
Secure Erasure of Flash Memory Adrian Caulfield, Laura Grupp, Joel Coburn, Ameen Akel, Steven Swanson Non-volatile Systems Laboratory Department of Computer Science and Engineering University of California,
More informationHow Do I Delete Files From My Startup Disk Macbook Pro
How Do I Delete Files From My Startup Disk Macbook Pro If your Apple/Mac computer is displaying the error message that the hard You need to make. The one place I least like to see a beach ball is on my
More informationSteganos Safe Professional th June 2007
Steganos Safe Professional 2007 26 th June 2007 Contents Page Introduction 4 Installation and Deployment 5 Managing and Policies 6 Recovery Using EDK 8 Setting Up Network Shares 8 Creating A Key Pair 8
More informationMemory - Paging. Copyright : University of Illinois CS 241 Staff 1
Memory - Paging Copyright : University of Illinois CS 241 Staff 1 Physical Frame Allocation How do we allocate physical memory across multiple processes? What if Process A needs to evict a page from Process
More informationUser Guide. Version Number 1.1
User Guide Version Number 1.1 Copyright 2002, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work
More informationTechnical concepts. Some basics of computers today. Comp 399
Technical concepts Some basics of computers today. Comp 399 Admin Anyone new?. http://www.cnn.com/2013/07/12/tech/social-media http://tv.msnbc.com/2013/08/13/pre-trial-hearings- Locard's Exchange Principle
More informationForensic Analysis of Windows 10 Volume Shadow Copy Service
Forensic Analysis of Windows 10 Volume Shadow Copy Service Ahmad Ghafarian, Ph.D. Dept. of Computer Science & Information Systems Mike Cottrell College of Business University of North Georgia Dahlonega,
More informationCS720 - Operating Systems
CS720 - Operating Systems File Systems File Concept Access Methods Directory Structure File System Mounting File Sharing - Protection 1 File Concept Contiguous logical address space Types: Data numeric
More informationHow to Restore a Windows System to Bare Metal
This article refers to the Barracuda Backup Legacy Release firmware or newer, except where noted. Bare metal recovery allows you to restore a complete Microsoft Windows system, including data, settings,
More informationFile Systems: Allocation Issues, Naming, and Performance CS 111. Operating Systems Peter Reiher
File Systems: Allocation Issues, Naming, and Performance Operating Systems Peter Reiher Page 1 Outline Allocating and managing file system free space File naming and directories File volumes File system
More informationHeap Management. Heap Allocation
Heap Management Heap Allocation A very flexible storage allocation mechanism is heap allocation. Any number of data objects can be allocated and freed in a memory pool, called a heap. Heap allocation is
More informationData Erasure Software Changes
Data Erasure Software Changes Current Process Permanent data erasure goes beyond basic file deletion and format commands which only remove part of the information stored on a device. The Secure Data Erasure
More informationStackVsHeap SPL/2010 SPL/20
StackVsHeap Objectives Memory management central shared resource in multiprocessing RTE memory models that are used in Java and C++ services for Java/C++ programmer from RTE (JVM / OS). Perspectives of
More informationComputer Forensics CCIC Training
Computer Forensics CCIC Training Chapter 7: Recycle Bin Lauren Pixley and Cassidy Elwell May 2017 (Version 1) This work by California Cyber Training Complex is licensed under a Creative Commons Attribution-NonCommercial
More informationJOURNALING FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 26
JOURNALING FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 26 2 File System Robustness The operating system keeps a cache of filesystem data Secondary storage devices are much slower than
More informationChapter 11: Implementing File-Systems
Chapter 11: Implementing File-Systems Chapter 11 File-System Implementation 11.1 File-System Structure 11.2 File-System Implementation 11.3 Directory Implementation 11.4 Allocation Methods 11.5 Free-Space
More information1:1 Drive Duplicator and Eraser for 2.5in / 3.5in SATA Drives
1:1 Drive Duplicator and Eraser for 2.5in / 3.5in SATA Drives Product ID: SATDUP11 The SATDUP11 standalone hard drive duplicator eraser enables you to copy 1-to-1, or erase up to 2 SATA hard drives simultaneously
More informationDiskClon : Disk duplicator and wiper. A Windows Embedded Partner
: Disk duplicator and wiper Summary of product Disk wiping function Introduction of product Efficiency of wiping process Various additional service User interface Appearance: Portable Appearance: DC3000-16HL
More informationThe Google File System
October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single
More information6.172 Performance Engineering of Software Systems Spring Lecture 9. P after. Figure 1: A diagram of the stack (Image by MIT OpenCourseWare.
6.172 Performance Engineering of Software Systems Spring 2009 Lecture 9 MIT OpenCourseWare Dynamic Storage Allocation Stack allocation: LIFO (last-in-first-out) Array and pointer A used unused P before
More informationFrequently Asked Questions
Frequently Asked Questions CB-ISA225-U3 - IDE/SATA TO USB 3.0 Adapter 1. Will the CB-ISA225-U3 works with my Windows 8, 8.1, 10 or Mac OS X (10.6 or newer)? Yes, it will work correctly. 2. Does this device
More informationOverview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition
William Stallings Computer Organization and Architecture 6th Edition Chapter 4 Cache Memory Overview IN this chapter we will study 4.1 COMPUTER MEMORY SYSTEM OVERVIEW 4.2 CACHE MEMORY PRINCIPLES 4.3 ELEMENTS
More informationForensic Discovery. Wietse Venema IBM T.J.Watson Research, USA
Forensic Discovery Wietse Venema wietse@porcupine.org IBM T.J.Watson Research, USA Global hard disk market (Millions of units, source: Dataquest) 250 200 150 100 Retired Shipped 50 0 1997 1998 1999 2000
More informationChapter 14: File-System Implementation
Chapter 14: File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery 14.1 Silberschatz, Galvin and Gagne 2013 Objectives To describe
More informationComputer Architecture and System Software Lecture 09: Memory Hierarchy. Instructor: Rob Bergen Applied Computer Science University of Winnipeg
Computer Architecture and System Software Lecture 09: Memory Hierarchy Instructor: Rob Bergen Applied Computer Science University of Winnipeg Announcements Midterm returned + solutions in class today SSD
More informationEaseUS Partition Master
EaseUS Partition Master User Guide Table of content Table of content... - 2 - Overview... - 1 - Welcome... - 1 - Edition comparison... - 1 - Getting started... - 2 - Hardware requirements... - 2 - Supported
More informationAnalyzing the Impact of a Virtual Machine on a Host Machine
Publications 2009 Analyzing the Impact of a Virtual Machine on a Host Machine Greg Dorn Chris Marberry Scott Conrad Philip Craiger University of Central Florida, craigerj@erau.edu Follow this and additional
More informationForensic Discovery. Lesson 1 Reference: Farmer & Venema. Mississippi State University Digital Forensics 1
Forensic Discovery Lesson 1 Reference: Farmer & Venema 1 The Spirit of Forensic Discovery Now, a few words on looking for things: When you go looking for something specific, your chances of finding it
More informationFFS: The Fast File System -and- The Magical World of SSDs
FFS: The Fast File System -and- The Magical World of SSDs The Original, Not-Fast Unix Filesystem Disk Superblock Inodes Data Directory Name i-number Inode Metadata Direct ptr......... Indirect ptr 2-indirect
More informationPerform page replacement. (Fig 8.8 [Stal05])
Virtual memory Operations and policies Chapters 3.4. 3.7 1 Policies and methods Fetch policy (Noutopolitiikka) When to load page to memory? Placement policy (Sijoituspolitiikka ) Where to place the new
More informationUsing WinDirStat to Find Large Files
Using WinDirStat to Find Large Files Ronald Ross rross@spkaa.com WinDirStat is a utility which can be used on Windows to locate large files as candidates for deletion (or for whatever reason). The contents
More informationFile Carving Using Sequential Hypothesis Testing
File Carving Using Sequential Hypothesis Testing Anandabrata (Pasha) Pal, Taha Sencar and Nasir Memon Introduction File Carving: recovery without file system meta-data. Recovery based on file structure/content
More informationDownloaded from various sources on the NET
Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various
More informationInstalling Windows 7 Lesson 2
Installing Windows 7 Lesson 2 Objectives Select the appropriate installation option Perform a clean installation of Windows 7 Migrate user files and settings to Windows 7 Perform an upgrade to Windows
More informationPartition External Hard Drive Without Losing Data Mac Os X
Partition External Hard Drive Without Losing Data Mac Os X If your Mac's hard drive is small and your Time Machine hard drive is big, At the same time, external hard drives are cheaper and roomier than
More informationFile systems, databases, cloud storage
File systems, databases, cloud storage file: a sequence of bytes stored on a computer content is arbitrary (just bytes); any structure is imposed by the creator of the file, not by the operating system
More informationCMSC 330: Organization of Programming Languages
CMSC 330: Organization of Programming Languages Memory Management and Garbage Collection CMSC 330 - Spring 2013 1 Memory Attributes! Memory to store data in programming languages has the following lifecycle
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 11: File System Implementation Prof. Alan Mislove (amislove@ccs.neu.edu) File-System Structure File structure Logical storage unit Collection
More informationMicrosoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010
Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.
More informationFile Systems and Volumes
File Systems and Volumes Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Data organization in storage systems! File deletion and recovery!
More information