Addendum Forensic Report for GOAA BP-S00132 Procurement

Size: px
Start display at page:

Download "Addendum Forensic Report for GOAA BP-S00132 Procurement"

Transcription

1 Addendum Forensic Report for GOAA BP-S00132 Procurement Case Number: CF-BC March 13 th, 2018 Internal Case #: CF-BC

2 Table of Contents I. Introduction... 3 II. Executive Summary... 4 III. Evidence Consideration... 5 IV. Examination of Robert Sanders Computer... 6 V. Examination of Martin Ineichen s GOAA Computer... 8 VI. Examination of Martin Ineichen s PMA Computer VII. Conclusion VIII. Appendix AXIOM Log Internal Case #: CF-BC

3 I. Introduction At the public hearing on February 27 th, 2018 regarding the BP-S00132 STC BHS procurement process, the Greater Orlando Aviation Authority (GOAA) decided to continue a supplemental forensic data investigation into the computer system assigned to Mr. Sanders, as well as the GOAA computer system assigned to Mr. Martin Ineichen and the PMA assigned computer system for Mr. Ineichen. This decision was, in part, based on the recommendations in the Forensic Report submitted by Data Analyzers on February 23rd, GOAA granted a two-week time duration to allow for this supplemental investigation. The scope of the supplemental data forensic investigations should accomplish the following: 1. Examine the computer system assigned to Mr. Robert Sanders, as it was not processed during the initial investigation due to time restrictions and it requiring a proprietary adapter. The goal of the examination of this computer system was to determine if any documents from Exhibit A) of the Revised Protocol which are related to the BP-S00132 STC BHS procurement process had been accessed and/or copied and if so, how they had been obtained. 2. Perform an extended examination on the GOAA computer system assigned to Mr. Martin Ineichen and determine why downloaded files from box.com could not be found on the computer system. If any of these documents existed on the computer system, Data Analyzers would draw a more substantial conclusion. 3. Perform an extended examination on the PMA computer system assigned to Mr. Martin Ineichen and determine why metadata affecting the timeline of interest was missing from this computer system. Internal Case #: CF-BC

4 II. Executive Summary Data Analyzers has conducted this supplemental investigation on the computer system assigned to Mr. Sanders and the two computer systems assigned to Mr. Ineichen. Due to the extended scope of this investigation and based on the metadata, system artifacts and additional data that had been analyzed, Data Analyzers has arrived at the following conclusions Data Analyzers did not find any evidence that the computer assigned to Robert Sanders possessed any documents outlined in Exhibit A) of the initial report. While Data Analyzers did find evidence (Appendix A) that the GOAA s box.com account was accessed with the web browser (Internet Explorer) from Mr. Ineichen s assigned GOAA computer, Data Analyzers did not find any evidence that any of the files in Exhibit A) have been downloaded onto this computer system. Data Analyzers did not find any direct evidence that the time clock on the PMA computer assigned to Mr. Ineichen was altered with the intent to conceal any information. None of the data that have been systematically examined have revealed any such evidence. Internal Case #: CF-BC

5 III. Evidence Consideration Data Analyzers collected data from three computer systems for this addendum. The Computer system utilized by Robert Sanders, the GOAA computer system assigned to Mr. Ineichen and the PMA Laptop computer assigned to Mr. Ineichen. Data Analyzers had physical access to all three computer systems. Custodian Laptop or Desktop Computer Name Model / Serial Number Robert Sanders Laptop OAR38 Lenovo X1 Carbon / PK-0PVFZ 13/08 Martin Ineichen Desktop OAR7 HP Compaq Elite 8300 / 2UA3330KGK Martin Ineichen Laptop LTMINEICHENT430 Lenovo T430 / PB295W5 The objective was to perform a collection and examination of Mr. Sanders s computer, as it was conducted on the computer systems of the previous investigation. The collection was limited to metadata and system files, which was the scope agreed upon during the initial investigation. The objective of the examination for the other two computer systems, the GOAA HP desktop computer and the PMA Lenovo laptop computer, was to perform a detailed investigation in addition to the previously conducted investigation that was limited to metadata and system files. All investigations conducted for this report were conducted at the laboratory of Data Analyzers. Internal Case #: CF-BC

6 IV. Examination of Robert Sanders Computer During the initial analysis, a Lenovo Laptop with the model number: X1 Carbon and serial number: PK- 0PVFZ 13/08 assigned to Mr. Robert Sanders was not processed and therefore, no examination was conducted on it. The computer system assigned to Mr. Sanders could not be examined, due to the laptop having been received within only two days of having to complete the examination and the Laptop containing an SSD drive with a proprietary interface. Picture of proprietary SSD interface. For this second examination attempt, Data Analyzers was able to order the proprietary adapter for this SSD drive and conducted its analysis of the procurement investigation pursuant to the Revised Protocol. Picture of the adapter and the proprietary SSD connected to its interface. Internal Case #: CF-BC

7 Data Analyzers searched and analyzed the PMA Laptop computer to identify only documents, data, fragments and artifacts that reasonably appeared to be related to the BP-S00132 procurements outlined in Exhibit A). During the analysis, Data Analyzers employed a methodology tailored to the particular facts of this case. Data Analyzers methodology included: 1. Extracting all available and potentially relevant metadata and system artifacts. These included the MFT, NTUser.dat, UsrClass.dat, LNK files, event logs, registry files as well as the Internet Explorer s WebCacheV01.dat file. 2. Consolidating, parsing, and converting the metadata into a readable format. The data for each artifact was parsed and the output was converted to either a csv file or body file format. 3. Reducing the timeframe of the data to search and analyze. The content of csv or body file of each artifact was reduced to only contain the data from November 1 st 2017 to February 21 st The reduced set of metadata was then imported into a database application called Splunk. A set of search queries was built to search for the names and variations of the file names in Exhibit A). 5. Performing additional manual metadata artifact review on key artifact areas to cross-verify results and proper due-diligence. A selection of metadata and system artifacts which included MFT entries, NTUser.dat and LNK files have been manually reviewed with either a text editor or a hexadecimal editor, depending on the specific artifact type. 6. The searches performed included the full name of the file, as well as variations of the file names in Exhibit A) to be able to capture variations of the file names, for example: The full name of the file Technical Proposal for DBOM Services for BP-S00132 BHS_archive.pdf was used to perform an exact search. A search with an asterisk character (*) was used instead of the.pdf extension. Example: Technical Proposal for DBOM Services for BP-S00132 BHS_archive.* The same query was executed with the asterisk at the beginning of the file. Example: *Technical Proposal for DBOM Services for BP-S00132 BHS_archive.pdf The asterisk character is what is called a wildcard character and can represent any unknown character or group of characters that the symbol represents in the search query. Therefore, the asterisk character replacing the pdf among other things would catch any other type of file Internal Case #: CF-BC

8 extension besides pdf, such as for word documents (doc, docx), Tiff files, and all other possible changed file formats. 7. In addition, a partial query for Technical Proposal, as well as for BP-S00132 was performed. Thereafter, a search for any pdf files within the time frame was conducted and reviewed. 8. Furthermore, the time line and event logs have been inspected for any suspicious activities that could relate to the documents in Exhibit A) and or the masking of such documents. 9. Registry artifacts that include most recent accessed documents, connected USB storage devices, and network connections have been manually reviewed. 10. On any abnormalities encountered, the process was re-run and further manual examination was performed. The examinations of this computer system have displayed regular and consistent user activity. MFT records, internet activity, and system artifacts, such as Jump Lists, Link files and the registry have not revealed any irregular activity or usage patterns. No indications that an access or download for any of the documents in Exhibit A) occurred could be found for this computer system. V. Examination of Martin Ineichen s GOAA Computer Data Analyzers had previously recommend a supplementary investigation of Mr. Ineichen s GOAA assigned computer system that would not be limited to a metadata only examination. The purpose of this extended examination was to determine why downloaded files from box.com could not be found on the computer system and to draw a more substantial conclusion as to whether any of these documents existed on the computer system. Data Analyzers has conducted a full examination of the computer hard drive. During the analysis, Data Analyzers employed three methods to determine if the document was downloaded onto this computer system. The results of each method are used to corroborate the findings of the other methods. Internal Case #: CF-BC

9 Method 1: 1. An exact copy of the file that was supposedly downloaded from GOAA s box.com account was provided to Data Analyzers. It contained a file named Technical Proposal for DBOM Services for BP-S00132 BHS_archive.pdf. Data Analyzers generated a MD5 hash signature for this file. The MD5 Hash is: 2f8d805894fdc78a731059e39eb076ca This MD5 hash signature is a unique identifier for that particular file. It is calculated based on a mathematical equation and the MD5 algorithm thereby generates a 128-bit hash signature. Changing the name or extension of the file would not change the MD5 hash signature. Once this signature was calculated, a raw recovery of any and every file that would include the identifier of a PDF file was performed. Each PDF document has a common signature which is called a header. The raw recovery technique performed a data recovery of all PDF files that could be found based on the header signature rather than relying on the computer s file system and metadata to dictate where PDF files are located. This process bypasses the limitations of working only with PDF files that the computer, via its metadata, can identify as being active and deleted. The benefit of this process is that it will search the entire hard drive for any active and deleted PDF files, including partial PDF files, as long as the PDF header is still intact. Therefore, it will generate a more in-depth method of searching for deleted PDF files. Once all PDF files have been carved out from the raw hard drive, a signature matching program was ran to scan all PDF files for any matches to the following MD5 Hash: Hash:2f8d805894fdc78a731059e39eb076ca This would capture PDF files that have been renamed, PDF files where the extension of the file was changed (example: Myfile.pdf to Myfile.jpg), as well as PDF files that have been deleted. This would include PDF files which may no longer exist in the metadata, which had previously already been examined. A total of 8747 PDF file signatures have been found on the hard drive. The MD5 hash was run against all of them to search for any matches of the document. No positive matches have been found for the MD5 Hash of 2f8d805894fdc78a731059e39eb076ca. Internal Case #: CF-BC

10 Method 2: A full examination of the hard drive has been performed using Magnet AXIOM, which is a digital forensic platform that can read a large variety of computer artifacts including deleted data, documents, artifacts, internet activity, metadata, registry and system information. It was used to run a full examination on the entire hard drive of this computer system. Activities produced by user and computer system for the day of January 19 th, 2018 included a total of 4162 results found by AXIOM, which does not include the Master File Table. The screenshot above displays a breakdown of artifacts found and identified for January 19 th 2018 Internal Case #: CF-BC

11 Some of these artifacts include Outlook s as indicated by the screenshot below. Others include Jump Lists, which display the most recent files opened which includes PDF files stored locally on the computer system, as well as some PDF files that have been opened from a network share. Internal Case #: CF-BC

12 As well as LNK Lists A total of 67 records relating to activity on the GOAA Box.com account on January 19 th 2018 have been found. These records are seen in the two screenshots below and are included in their entirety as Appendix. They have been converted to Eastern Standard Time and are similar to the time stamp activity provided by Box.com s own logs captured from their servers. Internal Case #: CF-BC

13 While the records clearly show that the GOAA s Box.com portal was accessed, that someone logged into the account from Mr. Ineichen s GOAA assigned computer and that files have been accessed, it also shows that neither of the records in Appendix indicate that any files from the box.com account have been downloaded on to the computer system. If any files would have been downloaded such activity would have been identifiable in the attached Appendix. Method 3: All internet activity within this time frame was conducted with Microsoft s Internet Browser named Internet Explorer. In addition to the more automated approach, as performed by Magnet AXIOM, a manual examination of the Internet Explorers Webcache and database file was conducted, to cross verify the results obtained in method 2 and to catch any potential exceptions and abnormalities that could have occurred. The database used by more recent versions of Internet Explorer, such as it is on this system, is an Extensible Storage Engine (ESE) database. This file for the user account mineichen which represents the first initial and last name of Mr. Martin Ineichen was found at the following location. Users\mineichen This file comprises of the ESE database with multiple containers and tables containing cookies, browser history, as well as various other browser related activities. Each container of this database file was manually examined searching for relevant activity to box.com and procurement documents. Several examples of what these containers and tables looks like can be seen in the screenshots below. Internal Case #: CF-BC

14 Screenshot above shows a sample portion of the cache database Screenshot above shows a sample of the cookies database The content found during the manual examination of the database is equivalent with the entries produced by Method 2. While entries show that the GOAA s box.com account was accessed, there are no references of the files in questions having been downloaded via Internet Explorer, which was the only web browser used during that timeframe. In addition, no abnormal exceptions have been encountered during this process. Note that Data Analyzers had previously already determined that no USB storage devices had been accessed during that time duration, see page 4 of report submitted February 23 rd VI. Examination of Martin Ineichen s PMA Computer Data Analyzers had previously recommended a supplementary investigation of Mr. Ineichen s PMA assigned Laptop computer system that would not be limited to a metadata-only examination. The purpose of this extended examination was to determine why metadata affecting the timeline of interest was missing from this computer system. The initial examination was limited to only active metadata. In addition to having a limited time to complete the examination, the scope limitations prevented any final conclusions from being drawn and hence, the examination was extended to allow for additional time and additional access to the computer system which would not be limited to the active metadata. Internal Case #: CF-BC

15 Data Analyzers had, in the previous report, stated that computer records had been altered and that it usually encounters such activities in an attempt to hide and/or conceal activities that have occurred on the computer system. Data Analyzers also stated that it could not indefinitely determine the reason within the limited scope of investigation. The reasons for the previous conclusions had been the following: 1. Data Analyzers found that there was no metadata between August 2017 and January 26 th 2018, with an exception of a very limited amount of entries, far less than any type of usual computer activity would produce. On a Windows based computer system one should expect to see several hundred or even several thousand entries per day. Data Analyzers was not presented with any Affidavit or other statements, informing Data Analyzers that the computer system would have not been in use during that time frame. 2. Data Analyzers also found an unusual system time change. The time clock of the computer was changed by 144 days. Which suspiciously matched the time duration of missing metadata entries. 3. Such large adjustments to the computer system time are frequently made to change or alter system metadata and are known as anti-forensic techniques within the digital forensic community. When the time of a computer system is changed to another time that does not reflect the current time of existence, all metadata records after the time change will then reflect the inaccurate time. Such processes are often used to change the dates and times of certain activity so that they do not reflect the actual time of these activities. In addition, such processes are often used to aid in covering up or removal of certain records. The previous time and scope limitations of the initial forensic data investigation prevented further examination into these issues. Data Analyzers supplementary investigation examined the computer hard drive. During the analysis, Data Analyzers employed five methods to determine if there was an intentional change of system time and, sequentially, an alteration of metadata for reasons to conceal activity on the computer system. Internal Case #: CF-BC

16 Method 1: Data Analyzers revisited the event logs of the system and searched for any deleted event log files. No deleted event log files were found. Data Analyzers then reviewed the sequence of event logs. In particular, the sequence of event logs during the time duration of when the time change occurred. If event logs are tampered with, i.e. records deleted or changes of event logs time representation, due to intentional alteration of the system time clock, discrepancies between the time and the sequence number are usually found. Every entry has a sequential number that increases with every event log entry. Even if an event log entry has an altered time stamp, the sequence number would still continue with an accurate reflection of when and in which order the event log would have been generated. Screenshot of event log with consistent sequence numbers Method 2: A full examination of the hard drive has been performed using Magnet AXIOM, which is a digital forensic platform that can read a large variety of computer artifacts including deleted data, documents, artifacts, internet activity, metadata, registry and system information. It was used to run a full examination on the entire hard drive of this computer system. A thorough review of all activities has been performed; which included the examination of the Recycling Bin, Jump Lists, LNK files, Shellbags and time zone settings. During the examination conducted with this method, no additional artifacts that would have matched the time period of interest could be discovered. Internal Case #: CF-BC

17 The screenshot above displays a breakdown of system artifacts found and identified on the computer system. Method 3: The MFT (Master File Table) is a database that keeps track of files stored on the computer system, such as their location, size, as well as the creation and modification of dates and times. A detailed analysis has been conducted of the MFT, which included utilizing several different tool sets, as well as a manual inspection of certain entries. This also included searching and parsing for any potential old and deleted MFT tables, as well as any fragments that could be located. The MFT also has a sequence number for each entry. Special attention was given to the sequence numbers, as tampering with the MFT often will cause disruptions to the sequential order of the entries. The sequence numbering continued on January 12 th 2018 where the sequence numbers have left off on August 21 st Internal Case #: CF-BC

18 Method 4: When a Laptop computer is set to hibernation mode, it will store all currently open and active files, programs and processes in a type of a memory file called the hibernation file (hiberfil.sys). On this computer system, this was a file of approximately 6GB. This file is compressed and once uncompressed was approximately 8GB in size. An examination of the content was performed and no activity between August 21 st 2017 and January 12 th 2018 could be found. This correlated with the time frames seen in the event log. Method 5: An additional raw recovery was performed to specifically search for deleted LNK files. LNK is the file extension of a Windows Shortcut file. It is used by Microsoft Windows to link to multiple types of information, such as, files and network shares that have been previously opened. LNK files are artifacts that can be very useful to determine files that may no longer exist on the system. Therefore, even if a file no longer exists, the content of the LNK file can still reveal a location of a file and access time stamps even if the file is no longer found in the MFT or other metadata artifacts. Once a raw recovery was performed and the entire system was scanned for the signature of the LNK files, all found LNK files had been extracted to a folder. The content was then parsed with a third-party software tool called LECmd, which has been developed by Eric Zimmerman a former Special Agent with the FBI. The found LNK files did not reveal any activity during August 21 st 2017 and January 12 th Internal Case #: CF-BC

19 VII. Conclusion Data Analyzers has not found any evidence that the computer system assigned to Mr. Sanders has contained any documents outlined in Exhibit A). Neither internet activity, system artifacts, nor file system records revealed the access of such files. Data Analyzers found that while the computer assigned to Mr. Ineichen did login to GOAA s box.com account and access files, as shown in the log provided by box.com, there was no evidence of the files having been downloaded to the assigned GOAA desktop computer system. Plausible explanations for this activity include: 1. The download, while logged on box.com, was never fully executed or blocked by the Internet s browser configuration features. 2. The download of the file was blocked by a Firewall or Proxy security service utilized by GOAA. Data Analyzers determined that there was no evidence of intentional tampering of metadata on Mr. Ineichen s assigned PMA computer system. Although Data Analyzers did find that there was a system time change on this computer system, further examinations have not revealed any intentional changing or altering of system time stamps and metadata. The typical anti-forensic reasons for such system time changes, such as restoring an old backup set to conceal or overwrite existing data have been ruled out during this investigation. All common indicators for such activities have been investigated and have not revealed any evidence of deliberate modifications. While the activity that occurred is certainly unusual, Data Analyzers has not been able to confirm what exactly caused the change in the system time clock. None of the further-investigated methods and techniques have revealed the exact cause, and even PMA s Forensic Expert, Halock Security Labs s, examination did not sufficiently explain the MFT records that have been identified from October 16 th 2017, December 6 th 2017, January 2 nd 2018 and January 5 th Typically, if the computer is in a sleep or hibernation mode, there is no activity that occurs, not even Microsoft Windows updates. Data Analyzers has considered potential causes of such behaviors which included CMOS battery issues and Windows system bugs, which could have caused the time change, but was unable to confirm the exact cause in this instance. Nevertheless, this supplemental examination has been able to rule out any intentional alterations of metadata or files. I declare under penalty of perjury that the foregoing is true and correct. Andrew von Ramin Mapp Internal Case #: CF-BC

20 Appendix Internal Case #: CF-BC

21 Forensic Examination Report Report generated Thursday, March 08, 2018 Case generated Wednesday, February 28, 2018 Case number CF-BC Evidence numbers Martin-Ineichen-GOAA-Desktop.E01 Martin-Ineichen-GOAA-Desktop.E01

22 Cloud Services URLs Record 1 URL Date/Time - UTC-05:00 1/19/2018 8:49:09 AM Artifact ID 4b4ad36e42424c479ce3da9546e1905d Location Table: Container_2 (EntryId: 22282) Record 2 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box goaa.box.com_folder_ futm-5fsource-3 Dtrans-26utm-5Fmedium-3D -26utm-5Fcampaign-3Dcollab-252Bauto-2520accept-2520user&d=DwMFaQ&c=- NtS L06WDZoKOqkhIdSxyw&r=MaxCn_9-BQUU1IvuvZBxx3slTYags06bPMZ9FjVfwhU&m=lIZctF8ksVQ60i6Dh09mvoB2mNo9SiST Y1Dm_wtMMs&s=fxY2jnm5EENJzj2Uh5UHJqBneqTYF_Nx6gZzkssQ5ys&e= 1/19/2018 8:49:09 AM Internet Explorer Main History 8da0e581aefb b6bfcd92c7c Location Table: Container_2 (EntryId: 22284) Record 3 URL Date/Time - UTC-05:00 1/19/2018 8:49:09 AM Artifact ID dc74bff2a3e04212bf740e99b269c813 Location Table: Container_2 (EntryId: 22281) Record 4 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box 20accept%20user 1/19/2018 8:49:09 AM Internet Explorer Main History cf26dc6c4db14459b4059cb480a3a29d Location Table: Container_2 (EntryId: 22280) CF-BC Thursday, March 08,

23 Cloud Services URLs Record 5 URL Date/Time - UTC-05:00 1/19/2018 8:49:10 AM Artifact ID b4720ee fa1e757efbab4636a Location Table: Container_2 (EntryId: 22283) Record 6 URL Date/Time - UTC-05:00 1/19/2018 8:49:10 AM Artifact ID f39a439efd2c436a9cd112361d356b24 Location File Offset Record 7 URL Date/Time - UTC-05:00 1/19/2018 8:49:10 AM Artifact ID 1e da04d0383bee a2 Location Table: Container_11 (EntryId: 61713) Record 8 URL Date/Time - UTC-05:00 1/19/2018 8:49:26 AM Artifact ID c0206ac678044a628c8b9fd192a0e295 Location File Offset Record 9 Tags Site Name URL Evidence Box CF-BC Thursday, March 08,

24 Cloud Services URLs Date/Time - UTC-05:00 1/19/2018 8:49:26 AM Artifact ID a8ab1e8eb0d34e568e5ec116d0ef3499 Location Table: Container_11 (EntryId: 61715) Record 10 URL Date/Time - UTC-05:00 1/19/2018 8:49:26 AM Artifact ID a2ae395e496043a78a51120d03ee9baa Location Table: Container_2 (EntryId: 22285) Record 11 URL Date/Time - UTC-05:00 1/19/2018 8:49:44 AM Artifact ID 1e cd94a9e9d0829b59094ec20 Location Table: Container_11 (EntryId: 61716) Record 12 URL Date/Time - UTC-05:00 1/19/2018 8:49:47 AM Artifact ID 6888b13f14a84d32ad724472b160cd03 Location Table: Container_11 (EntryId: 61717) Record 13 URL Date/Time - UTC-05:00 1/19/2018 8:49:47 AM Artifact ID 83ba5913bf0e4e eb89ea6de35 CF-BC Thursday, March 08,

25 Cloud Services URLs Location Table: Container_2 (EntryId: 22286) Record 14 URL Date/Time - UTC-05:00 1/19/2018 8:49:47 AM Artifact ID 1023f6f538a648c88f9c80b0a773f73c Location File Offset Record 15 URL Date/Time - UTC-05:00 1/19/2018 8:51:40 AM Artifact ID 1fb0230b179d4a4fbc98ea dd3 Location File Offset Record 16 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box IGVQstib9oZC6l4Nm63Zf0hSxysxBKVrSK55xAgFoGc98XemekoHY_2- CGu4Ewd7NAJmpO87VbD9B64s1fc89SA8Hjd36TOxWtkg BDI08gtcwMpIoA8D63fytzJIyq5N8ekNSoY-poEeeHHD4CHMCZQVDwhuXet-2B0uuDbNq8- C5oMD_1BnYndo87960EyWU9dRZjZJ 7dw0pes3WZr2enyVp62twQxX3r-LsvwPzXlo1PK83IrowKlCDZtM-Umj40Rvc6v3djps1feij5do4TP6JPt7E0UtjwQ2wlOgZRh FyEq8H6LOBclMGzrGtEs31g.. 1/19/2018 8:51:41 AM Internet Explorer Content 28bbb29f d82add781096c8cca Location File Offset Record 17 URL Date/Time - UTC-05:00 1/19/2018 8:51:42 AM Artifact ID ed651a97b5b54662be508370be4340c0 CF-BC Thursday, March 08,

26 Cloud Services URLs Location File Offset Record 18 URL Date/Time - UTC-05:00 1/19/2018 8:51:42 AM Artifact ID 61c59ebcd2af4b61b9a45a5f1dd3da98 Location File Offset Record 19 URL Date/Time - UTC-05:00 1/19/2018 8:51:42 AM Artifact ID 6bb4342f9a024ab59daf a6f76 Location File Offset Record 20 URL Date/Time - UTC-05:00 1/19/2018 8:51:50 AM Artifact ID 3c5b7d37cf6d4c489fc61f1466dea036 Location File Offset Record 21 URL Date/Time - UTC-05:00 1/19/2018 8:52:34 AM Artifact ID 92de57d74d0648aaa2e c0 Location Table: Container_11 (EntryId: 61721) Record 22 Tags Evidence CF-BC Thursday, March 08,

27 Cloud Services URLs URL Date/Time - UTC-05:00 1/19/2018 8:52:34 AM Artifact ID 16d6c2e8783c4b26a5353c078eb56467 Location File Offset Record 23 URL Date/Time - UTC-05:00 1/19/2018 8:52:34 AM Artifact ID f1fabc2b1bef49acbf8ca479d21ec964 Location Table: Container_2 (EntryId: 22290) Record 24 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box hf536p3uh5ypnvgbe9lgjpq9hjgragk6rkhzh4xfwfpvucqip4btxx-hnsboevc3195cmmzyqyegver-fwkndhm61df6kjw3q8a _hawb8qgeciqaal2fzf_qrxhz_fuu6rva7oojaj7r_ue9uh1mawik58anmum3uciawoxxm6b216cnk1- qdxhjdsq6ehl3muutq_b GJxVPliYi5CIFFHk9w2hSi5oTZ rtotc18cm-mkcdblyvlm4e8mjkr-e0ryxefybb4ir2v2ttmc5-1gfhw3wkyx3rfalbeoiewf btbjd99_zhm0-pfsrju7r7w.. 1/19/2018 9:00:47 AM Internet Explorer Content e79e84973bce41e82b3e59ab6 Location File Offset Record 25 Tags Site Name URL Evidence Box gkhk- UYqqknBp5ikYmfLaimfAh32iONpGQrqtUYfZ787EgaTZ4fG1mG1AswK1WGNvd51HTGdRP_3HyfHVA7HASgT7KHxToSGDZJZ AgFFLu6PbMe0S8Oj7nKWiwmrl6f_zKIy-iOuZVw1jjaXw1yq1o5poYT6isJhiYLGdS51n_GmfLLaCPwMrrqUhFYLdqfS2obvhEw o_d8teufgfneuz8gqcrv0k7i0mlowy86pprfwcya64npukujytdxlpk_o92n11ykzokibszu3zki69kqvfxggkquzffowi7fjoei Date/Time - UTC-05:00 Artifact Artifact ID HrGOE-18PeX1DxoHyDvY-Pg.. 1/19/2018 9:00:56 AM Internet Explorer Content 4ffb7018adc54c109c6be601c77c4bd6 CF-BC Thursday, March 08,

28 Cloud Services URLs Location File Offset Record 26 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box 2-bkYwJ29UY35Poe0ph1yHqcTidfAL4XCIU-yaSk2NmxhRDMG9YKqad5FLlYS73LzSsjKm-jq4P61FXZYKmceJOxC99- vwjjtgfa zfghxn-3t3zc1yljgll4k1slcuasc-ivd6t8utnum4mg4mxe- GZApyDPOUNWIWCQAgvHs7WJr0ahx28cA46uwUN3fuBi68USU1MW LN03b5-6cQgjZfpO4tvrOb7Qvvi_z2RTv8d3hpK4MHdWvfFBQr3yLIFT7A5YNiFU_Kq5aCSIqVuxJ84ZdZmcPqB3XEUlRyu0bNl 7IWkwrNHEdKqcXpun7wtX2w.. 1/19/2018 9:02:49 AM Internet Explorer Content e397580cd11b47b38ab3660b014b56a9 Location File Offset Record 27 URL Date/Time - UTC-05:00 1/19/2018 9:02:55 AM Artifact ID 85947d0d27d24ef2a8810b62ee6a0d3d Location File Offset Record 28 URL Date/Time - UTC-05:00 1/19/2018 9:02:55 AM Artifact ID e814440ccb68ad5eefe80c415 Location File Offset Record 29 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box 1/19/ :47:27 PM Internet Explorer Main History b03b58af1d3f d8c506c4 CF-BC Thursday, March 08,

29 Cloud Services URLs Location Table: Container_11 (EntryId: 61782) Record 30 URL Date/Time - UTC-05:00 1/19/ :47:28 PM Artifact ID ea2d09c5f d170bb34bd21 Location Table: Container_2 (EntryId: 22323) Record 31 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box goaa.app.box.com_files_ _mineichen-40goaa.o rg_0_f_ _1_f-5f &d=dwmfaq&c=-ntsl06wdzokoqkhidsxyw&r=maxcn_9- BQUU1IvuvZBxx3slTY ags06bpmz9fjvfwhu&m=e-hpilq- NzS1InOU9Sd7HdB5xPXq06svfIBm8qLyG6I&s=p8HkDueN3DIy7a1VgPZ1Nit8hCxwpQKfQD g6uag5wdo&e= 1/19/ :47:28 PM Internet Explorer Main History b0301ae651774ec19d25e Location Table: Container_2 (EntryId: 22325) Record 32 URL Date/Time - UTC-05:00 1/19/ :47:29 PM Artifact ID da1c796b77ea41c98fc8c a78 Location Table: Container_2 (EntryId: 22324) Record 33 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box 1/19/ :47:29 PM Internet Explorer Main History 30abbe7ae23e401f9a760f77f0cb7c9f CF-BC Thursday, March 08,

30 Cloud Services URLs Location Table: Container_11 (EntryId: 61783) Record 34 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Record 35 Evidence Box goaa.app.box.com_link_-3flp-3dhunhpsraila767pe- 5FCwE5pgC6x5gq1E6VMkiWwjiXubV1Y7eeZGVP2taXP5yj2zV6RU- 2DFTCqaNWgFIc22O662tds70E7bBsf2VrbJJgWARNTasznL t5jmpnxqrnmccjqx-5fwzvguf1ccglf-5fwuykd5ysmc8wpknspmdtf0soakresztk2nlrfrehs25uunjn- 5FIwub6svTZXRcDFt -2DYBgZszT15mHxb-5FWvTPKlLIV40fuPkaTwj1ChpKk3oWZ3-5F3VZ7I2PR1UmNCYgrzDnzrv1MvqDrdps5TKUWsiXW54itU5rI L5GbkrkFRDrAlnW4EUle8viv-2DwfcYUrMU-2DhDspPENcl-2Dx-5F9DssBhiCxB6MSl90k2xrHTBUQZe-2DpmR1Elg- 2DFzcd7d No.-26a-3Dclick-26tt-3DViewAllUpdates-26ru-3DaDrH5e2VUbEBN-5Fj-2D3w-5FlA8xldGyISSxxDO9tGLGUmlCL9aTP7 e5uxwsjyhncfosvpamj7m- 2D9SyEaMBrW7bcCj1ATrwX37HQpmWRBlEHQtQzKX8CZPc5HKMLDuEeueyP2tuli0XPw&d=DwMFaQ&c =-NtSL06WDZoKOqkhIdSxyw&r=MaxCn_9-BQUU1IvuvZBxx3slTYags06bPMZ9FjVfwhU&m=e-hpIlQ- NzS1InOU9Sd7HdB5xPXq 06svfIBm8qLyG6I&s=P9eu8hcWyA3rb4QYeDagK6cBBs7CFrVjlxA4IeCcRNA&e= 1/19/ :48:28 PM Internet Explorer Main History 3fcb98dfa2a843e2b2ec404ba720014d Location Table: Container_2 (EntryId: 22289) Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box goaa.app.box.com_link_-3flp-3dhunhpsraila767pe- 5FCwE5pgC6x5gq1E6VMkiWwjiXubV1Y7eeZGVP2taXP5yj2zV6RU- 2DFTCqaNWgFIc22O662tds70E7bBsf2VrbJJgWARNTasznL t5jmpnxqrnmccjqx-5fwzvguf1ccglf-5fwuykd5ysmc8wpknspmdtf0soakresztk2nlrfrehs25uunjn- 5FIwub6svTZXRcDFt -2DYBgZszT15mHxb-5FWvTPKlLIV40fuPkaTwj1ChpKk3oWZ3-5F3VZ7I2PR1UmNCYgrzDnzrv1MvqDrdps5TKUWsiXW54itU5rI L5GbkrkFRDrAlnW4EUle8viv-2DwfcYUrMU-2DhDspPENcl-2Dx-5F9DssBhiCxB6MSl90k2xrHTBUQZe-2DpmR1Elg- 2DFzcd7d No.-26a-3Dclick-26tt-3DViewAllUpdates-26ru-3DaDrH5e2VUbEBN-5Fj-2D3w-5FlA8xldGyISSxxDO9tGLGUmlCL9aTP7 e5uxwsjyhncfosvpamj7m- 2D9SyEaMBrW7bcCj1ATrwX37HQpmWRBlEHQtQzKX8CZPc5HKMLDuEeueyP2tuli0XPw&d=DwMFaQ&c =-NtSL06WDZoKOqkhIdSxyw&r=MaxCn_9-BQUU1IvuvZBxx3slTYags06bPMZ9FjVfwhU&m=e-hpIlQ- NzS1InOU9Sd7HdB5xPXq 06svfIBm8qLyG6I&s=P9eu8hcWyA3rb4QYeDagK6cBBs7CFrVjlxA4IeCcRNA&e= 1/19/ :48:28 PM Internet Explorer Main History 8afdc a5817e59a25cab2696 Location Table: Container_11 (EntryId: 61720) Record 36 Tags Evidence CF-BC Thursday, March 08,

31 Cloud Services URLs Site Name URL Box U- FTCqaNWgFIc22O662tds70E7bBsf2VrbJJgWARNTasznLt5jmpNxqrNmccjQx_wZVguF1CCGlf_WUyKd5Ysmc8wpKnSPMDtF0s Date/Time - UTC-05:00 Artifact Artifact ID OakresZTK2NLrfREhS25UUnjn_Iwub6svTZXRcDFt- YBgZszT15mHxb_WvTPKlLIV40fuPkaTwj1ChpKk3oWZ3_3VZ7I2PR1UmNC YgrzDnzrv1MvqDrdps5TKUWsiXW54itU5rIL5GbkrkFRDrAlnW4EUle8viv-wfcYUrMU-hDspPENclx_9DssBhiCxB6MSl90k2x rhtbuqze-pmr1elg-fzcd7dno.&a=click&tt=viewallupdates&ru=adrh5e2vubebn_j- 3w_lA8xldGyISSxxDO9tGLGUmlCL 9aTP7e5UXwsjYhNcFOsVpAMj7M- 9SyEaMBrW7bcCj1ATrwX37HQpmWRBlEHQtQzKX8CZPc5HKMLDuEeueyP2tuli0XPw 1/19/ :48:28 PM Internet Explorer Main History 195e6740dd314d8da217f23cfce988dc Location Table: Container_2 (EntryId: 22287) Record 37 URL Date/Time - UTC-05:00 1/19/ :48:32 PM Artifact ID 9bdb8626fe97497c80f1b01a304682e2 Location Table: Container_11 (EntryId: 61719) Record 38 URL Date/Time - UTC-05:00 1/19/ :48:32 PM Artifact ID ea07000ab56e494dba477457d5dd9da3 Location File Offset Record 39 URL Date/Time - UTC-05:00 1/19/ :48:32 PM Artifact ID 232a1cba91db426a834c5b43704ea1fd Location Table: Container_2 (EntryId: 22288) CF-BC Thursday, March 08,

32 Cloud Services URLs Record 40 URL Date/Time - UTC-05:00 1/19/ :48:32 PM Artifact ID 7e0bb85af08e4e109127c65b36391ac5 Location File Offset Record 41 URL Date/Time - UTC-05:00 1/19/ :48:32 PM Artifact ID 18388f1b87b94ddcac1cfe3ef78fa6d8 Location File Offset Record 42 URL Date/Time - UTC-05:00 1/19/ :48:32 PM Artifact ID ce2afbe93c8b4ef2b8d93e64c85bb676 Location File Offset Record 43 URL Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID b7f354b098a34de8b1c6ff8c4ad4c085 Location File Offset Record 44 Tags Site Name URL Evidence Box CF-BC Thursday, March 08,

33 Cloud Services URLs Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID c27a3991f5c74875b397c5e23f Location File Offset Record 45 URL Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID c07327cc2d2c420eabeeb4c4bc7f661a Location File Offset Record 46 URL Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID b2cf4f12560e46e7945bd8013a9bdaec Location File Offset Record 47 URL Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID eb0f0aa97ec34b6fa30ca dd8 Location File Offset Record 48 URL Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID 970ca215a78c4c85b3864f7542e0f7d1 CF-BC Thursday, March 08,

34 Cloud Services URLs Location File Offset Record 49 URL Date/Time - UTC-05:00 1/19/ :48:33 PM Artifact ID 52fb391a697e4683bbf6c b76e Location File Offset Record 50 URL Date/Time - UTC-05:00 1/19/ :48:38 PM Artifact ID 1ffbc5e9a5c b3dfcdb0fd5491 Location File Offset Record 51 URL Date/Time - UTC-05:00 1/19/ :48:38 PM Artifact ID b214667af63e0d782cff153 Location File Offset Record 52 URL Date/Time - UTC-05:00 1/19/ :48:38 PM Artifact ID aa4689d14f b641bb65f5054 Location File Offset Record 53 Tags Evidence CF-BC Thursday, March 08,

35 Cloud Services URLs URL Date/Time - UTC-05:00 1/19/ :48:38 PM Artifact ID cd0d6feeb6b8420c95a41ce8fdb37f22 Location File Offset Record 54 URL Date/Time - UTC-05:00 1/19/ :48:38 PM Artifact ID 4c629638cc4a492ca0c8dd5486ad41ad Location File Offset Record 55 URL Date/Time - UTC-05:00 1/19/ :48:40 PM Artifact ID e414e09a88484d969e950ec06038e669 Location File Offset Record 56 URL Date/Time - UTC-05:00 1/19/ :48:44 PM Artifact ID bca545bea68d3964ab Location Table: Container_11 (EntryId: 61785) Record 57 Tags Site Name URL Date/Time - UTC-05:00 Artifact Artifact ID Evidence Box 1/19/ :48:44 PM Internet Explorer Main History 49c518621ce8456e80a d1232 CF-BC Thursday, March 08,

36 Cloud Services URLs Location Table: Container_2 (EntryId: 22326) Record 58 URL :Host: goaa.account.box.com Date/Time - Local Time 1/19/2018 3:49:10 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID f4f32f3be055482b8fb945d8b30db39e Location Table: Container_1267 (EntryId: 139) Record 59 URL Date/Time - Local Time 1/19/2018 7:47:29 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID 11c0de4630f04294b00bba9c92e8ceca Location Table: Container_1267 (EntryId: 58) Record 60 URL Date/Time - Local Time 1/19/2018 3:49:10 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID 1607e8463fc94dec8c754300c02722d2 Location Table: Container_1267 (EntryId: 7) Record 61 URL Date/Time - Local Time 1/19/2018 7:48:32 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID 1e7b04916ca44f368424ffb Location File Offset Record 62 CF-BC Thursday, March 08,

37 Cloud Services URLs URL Date/Time - Local Time 1/19/2018 3:49:26 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID d0a56f866de241f086af355a8343c17c Location Table: Container_1267 (EntryId: 8) Record 63 URL :Host: goaa.app.box.com Date/Time - Local Time 1/19/2018 3:49:47 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID 4de94db6649f42b498895fa35f15ee00 Location Table: Container_1267 (EntryId: 17) Record 64 URL Date/Time - Local Time 1/19/2018 3:52:34 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID eeb299845ae44934afbcaff99a3fc805 Location Table: Container_1267 (EntryId: 59) Record 65 URL Date/Time - Local Time 1/19/2018 7:48:44 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID 353c317c1eb447489ff2fc75fded1886 Location Table: Container_1267 (EntryId: 61) Record 66 Tags Site Name URL Date/Time - Local Time (yyyy-mm-dd) Evidence Box 1/19/2018 3:49:47 AM CF-BC Thursday, March 08,

38 Cloud Services URLs Artifact Internet Explorer Daily/Weekly History Artifact ID fa5fd20eec5041e681e78e4226d89a94 Location Table: Container_1267 (EntryId: 60) Record 67 URL Date/Time - Local Time 1/19/2018 7:48:32 AM (yyyy-mm-dd) Artifact Internet Explorer Daily/Weekly History Artifact ID 5de440cc66ec4c1b8235a4bc12147bbd Location Table: Container_1267 (EntryId: 57) CF-BC Thursday, March 08,

BP-S00132 STC BHS DBOM Procurement. Supplemental Investigation Update

BP-S00132 STC BHS DBOM Procurement. Supplemental Investigation Update BP-S00132 STC BHS DBOM Procurement Supplemental Investigation Update Presentation Overview February 9, 2018 PSC Meeting Scope of Supplemental Investigation Expert Investigation and Findings GOAA s Supplemental

More information

Report For Algonquin Township Highway Department

Report For Algonquin Township Highway Department Report For Algonquin Township Highway Department Prepared For: Prepared By: Robert Hanlon Attorney at Law robert@robhanlonlaw.com Andy Garrett Garrett Discovery Inc agarrett@garrettdiscovery.com Date:

More information

INSTITUTO SUPERIOR TÉCNICO

INSTITUTO SUPERIOR TÉCNICO INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide III & IV Case Solving: Mr. Informant Case 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction

More information

Talking to the Tech Asking the Right Questions

Talking to the Tech Asking the Right Questions Talking to the Tech Asking the Right Questions Eric R. Zimmerman Senior director, Kroll Cyber Security eric.zimmerman@kroll.com 501-313-3778 @EricRZimmerman https://binaryforay.blogspot.com/ Why are we

More information

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files

More information

24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest.

24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest. 23) Click File Analysis Tab - This allows forensic investigators to look for files on the system as they would on a regular system. Key file attributes are provided to assist the investigator (file size,

More information

Windows Forensics Advanced

Windows Forensics Advanced Windows Forensics Advanced Index: CF102 Description Windows Forensics - Advanced is the next step for forensics specialists, diving deeper into diverse processes on Windows OS serving computer investigators.

More information

esendpoint Next-gen endpoint threat detection and response

esendpoint Next-gen endpoint threat detection and response DATA SHEET esendpoint Next-gen endpoint threat detection and response esendpoint powered by Carbon Black eliminates endpoint blind-spots that traditional technologies miss. Operating on a philosophy that

More information

Understanding Computer Forensics

Understanding Computer Forensics Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells

More information

Forensic Timeline Splunking. Nick Klein

Forensic Timeline Splunking. Nick Klein Forensic Timeline Splunking Nick Klein A long time ago... Brian Carrier brought us Sleuthkit, based on the earlier work of Dan Farmer and Wietse Venema date size type meta file 16 Nov 2011 15:39:44 17

More information

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice

Computer Forensic Capabilities. Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Computer Forensic Capabilities Cybercrime Lab Computer Crime and Intellectual Property Section United States Department of Justice Agenda What is computer forensics? Where to find computer evidence Forensic

More information

Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM

Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM INTRODUCTION Belkasoft Essentials is intended for investigators of any level of expertise who want to acquire hands-on skills in computer, mobile

More information

Year 10 OCR GCSE Computer Science (9-1)

Year 10 OCR GCSE Computer Science (9-1) 01 4 th September 02 11 th September 03 18 th September Half Term 1 04 25 th September 05 2 nd October 06 9 th October 07 16 th October NA Students on in school Thursday PM and Friday Only Unit 1, Lesson

More information

Forensics on the Windows Platform, Part Two by Jamie Morris last updated February 11, 2003

Forensics on the Windows Platform, Part Two by Jamie Morris last updated February 11, 2003 SecurityFocus HOME Infocus: Forensics on the Windows Platform, Part Two 2003-02-17 12:56:05-0900 SFOnline Forensics on the Windows Platform, Part Two by Jamie Morris last updated February 11, 2003 Introduction

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

Chapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats

Chapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats Records Management (RM) Chapter 9 Section 3 Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats Revision: 1.0 GENERAL 1.1 The success of a digitized document conversion

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

msis Security Policy and Protocol

msis Security Policy and Protocol msis Security Policy and Protocol Introduction This Policy details the secure use of msis as a tool for the capture and reporting of internet intelligence and investigations (i3). msis is a powerful i3

More information

A Formal Logic for Digital Investigations: A Case Study Using BPB Modifications.

A Formal Logic for Digital Investigations: A Case Study Using BPB Modifications. A Formal Logic for Digital Investigations: A Case Study Using BPB Modifications. Abstract I. Mitchell Middlesex University, UK A Formal Logic is developed and the following presented: i) Notation for Formal

More information

Using the Startup Wizard

Using the Startup Wizard CHAPTER 3 This chapter describes the Startup wizard and how to use it to configure your sensor. It contains the following sections: Startup Wizard Introduction Window, page 3-1 Setting up the Sensor, page

More information

ANALYSIS AND VALIDATION

ANALYSIS AND VALIDATION UNIT V ANALYSIS AND VALIDATION Validating Forensics Objectives Determine what data to analyze in a computer forensics investigation Explain tools used to validate data Explain common data-hiding techniques

More information

Nortel Enterprise Reporting Quality Monitoring Meta-Model Guide

Nortel Enterprise Reporting Quality Monitoring Meta-Model Guide NN44480-110 Nortel Enterprise Reporting Quality Monitoring Meta-Model Guide Product release 6.5 and 7.0 Standard 01.03 November 2009 Nortel Enterprise Reporting Quality Monitoring Meta-Model Guide Publication

More information

Digital Forensics Practicum CAINE 8.0. Review and User s Guide

Digital Forensics Practicum CAINE 8.0. Review and User s Guide Digital Forensics Practicum CAINE 8.0 Review and User s Guide Ana L. Hernandez Master of Science in Cybersecurity Digital Forensics Concentration University of South Florida 12-8-2017 Table of Contents

More information

What's new 9 Magnet AXIOM 11 System requirements 12

What's new 9 Magnet AXIOM 11 System requirements 12 USER GUIDE CONTENTS What's new 9 Magnet AXIOM 11 System requirements 12 Administrator permissions 13 Clock speed and cores 13 Memory 13 Storage devices 13 Virtualization 13 Installing Magnet AXIOM 14 Set

More information

MET/TEAM 2.2 AND MET/CAL 9.1 UPDATE

MET/TEAM 2.2 AND MET/CAL 9.1 UPDATE MET/TEAM 2.2 AND MET/CAL 9.1 UPDATE The MET/TEAM version 2.2 and MET/CAL version 9.1 release is a major update to the previous MET/TEAM and MET/CAL system. This update includes over 130 bug fixes for an

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

Quantifying FTK 3.0 Performance with Respect to Hardware Selection

Quantifying FTK 3.0 Performance with Respect to Hardware Selection Quantifying FTK 3.0 Performance with Respect to Hardware Selection Background A wide variety of hardware platforms and associated individual component choices exist that can be utilized by the Forensic

More information

File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT)

File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT) File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT) 1 FILE SYSTEM CONCEPTS: FILE ALLOCATION TABLE (FAT) Alex Applegate

More information

Time ^ ping estom tim

Time ^ ping estom tim Time ^ timestomping For our guests from England, please allow me to translate. ^ timestomping Quick background File Creation Date Last Accessed File 127 08/04/11 10:22:36 08/04/11 10:22:3 File 128 08/04/11

More information

This presentation is on issues that span most every digitization project.

This presentation is on issues that span most every digitization project. This presentation is on issues that span most every digitization project. 1 This presentation is based on this general lifecycle. While each project s workflow will differ in the details, any digitization

More information

CIS Project 1 February 13, 2017 Jerad Godsave

CIS Project 1 February 13, 2017 Jerad Godsave CIS 484-75-4172 Project 1 February 13, 2017 Jerad Godsave Part 1) a) Below are a few screenshots indicating verification that the original evidence and the newly created.e01 forensic image match: Part

More information

Ndaw, Maam Awa. Microsoft Office Excel 2007

Ndaw, Maam Awa. Microsoft Office Excel 2007 Download the Project3.E01 file from Blackboard under Projects & Labs\Project 3 and verify the integrity of the image after downloading (open image in FTK Imager right-click on image - verify Drive/Image).

More information

10 th National Investigations Symposium

10 th National Investigations Symposium 10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5

More information

Issues in Information Systems Volume 15, Issue II, pp , 2014

Issues in Information Systems Volume 15, Issue II, pp , 2014 DETERMINING USER ACTIONS IN OS X BASED ON QUICKLOOK THUMBNAIL CACHE DATABASE ENTRIES Sara Newcomer, Lockheed Martin, sara.r.newcomer@lmco.com ABSTRACT The purpose of this study was to document the structure

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

BroadCloud PBX Call Recording

BroadCloud PBX Call Recording BroadCloud PBX Call Recording Dashboard Admin User Guide Document Version 1.1 9737 Washingtonian Boulevard, Suite 350 Gaithersburg, MD 20878 Tel +1 301.977.9440 WWW.BROADSOFT.COM BroadWorks Guide Copyright

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

DocuSign Spring '16 Release Notes

DocuSign Spring '16 Release Notes DocuSign Spring '16 Release Notes Published March 17, 2016 UPDATE This document provides information about the updates deployed to the DocuSign Production environment on March 10, 2016 as part of the DocuSign

More information

North Dakota Court System Frequently Asked Questions

North Dakota Court System Frequently Asked Questions North Dakota Court System Frequently Asked Questions Topics Covered in this Chapter General E-filing Fees E-serving Format Errors General How do I access the Odyssey File & Serve system? To access the

More information

Computer Forensics CCIC Training

Computer Forensics CCIC Training Computer Forensics CCIC Training Chapter 6: Recent Files Lauren Pixley and Cassidy Elwell May 2017 (Version 1) This work by California Cyber Training Complex is licensed under a Creative Commons Attribution-NonCommercial

More information

GUIDE. Workshare Troubleshooting Guide

GUIDE. Workshare Troubleshooting Guide GUIDE Workshare Troubleshooting Guide Table of Contents Understanding Troubleshooting...3 System Understanding... 3 Strategic Understanding... 3 Procedural Understanding... 4 Troubleshooting Strategy...5

More information

New Mexico State University. Financial Systems Administration - RMR BDMS Scan/Load and Indexing

New Mexico State University. Financial Systems Administration - RMR BDMS Scan/Load and Indexing New Mexico State University Financial Systems Administration - RMR BDMS Scan/Load and Indexing November 11, 2016 Blank Page Table of Contents Business Rules... 1 Terminology... 2 Synchronizing Banner Security

More information

TZWorks Timeline ActivitiesCache Parser (tac) Users Guide

TZWorks Timeline ActivitiesCache Parser (tac) Users Guide TZWorks Timeline ActivitiesCache Parser (tac) Users Guide Abstract tac is a standalone, command-line tool that parses the Windows Timeline records introduced in the April 2018 Win10 update. The Window

More information

Chapter 2. Index.dat

Chapter 2. Index.dat Chapter 2 Index.dat Internet History Practical Exercise Anatomy of a MSIE / History.IE5\Index.dat File 1. Use WinHEX to open up the file named: \Student Files\02_Internet_History\Index.dat. 2. Let s examine

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

DocAve 6 File System Migrator

DocAve 6 File System Migrator DocAve 6 File System Migrator User Guide Service Pack 4, Cumulative Update 1 Revision B Issued June 2014 Table of Contents About File System Migrator... 5 Complementary Products... 5 Submitting Documentation

More information

[MS-PICSL]: Internet Explorer PICS Label Distribution and Syntax Standards Support Document

[MS-PICSL]: Internet Explorer PICS Label Distribution and Syntax Standards Support Document [MS-PICSL]: Internet Explorer PICS Label Distribution and Syntax Standards Support Document Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft

More information

Overview. Top. Welcome to SysTools MailXaminer

Overview. Top. Welcome to SysTools MailXaminer Table of Contents Overview... 2 System Requirements... 3 Installation of SysTools MailXaminer... 4 Uninstall Software... 6 Software Menu Option... 8 Software Navigation Option... 10 Complete Steps to Recover,

More information

ACTIVE Net Insights user guide. (v5.4)

ACTIVE Net Insights user guide. (v5.4) ACTIVE Net Insights user guide (v5.4) Version Date 5.4 January 23, 2018 5.3 November 28, 2017 5.2 October 24, 2017 5.1 September 26, 2017 ACTIVE Network, LLC 2017 Active Network, LLC, and/or its affiliates

More information

Expense: Process Reports

Expense: Process Reports Expense: Process Reports User Guide for Standard Edition Applies to these SAP Concur solutions: Expense Professional/Premium edition Standard edition Travel Professional/Premium edition Standard edition

More information

Assignment List for CIS 242 Microsoft LAN Administration II. Winter 2016 (Revised 1/1/16)

Assignment List for CIS 242 Microsoft LAN Administration II. Winter 2016 (Revised 1/1/16) Assignment List-1 Assignment List for CIS 242 Microsoft LAN Administration II Winter 2016 (Revised 1/1/16) Getting Started Module (Orientation) - Course Syllabus, Assignments List, and other Getting Started

More information

Introduction. Collecting, Searching and Sorting evidence. File Storage

Introduction. Collecting, Searching and Sorting evidence. File Storage Collecting, Searching and Sorting evidence Introduction Recovering data is the first step in analyzing an investigation s data Recent studies: big volume of data Each suspect in a criminal case: 5 hard

More information

Digital Forensics Validation, Performance Verification And Quality Control Checks. Crime Scene/Digital and Multimedia Division

Digital Forensics Validation, Performance Verification And Quality Control Checks. Crime Scene/Digital and Multimedia Division Validation, Performance Verification And Quality Control Checks 5. VALIDATION, PERFORMANCE VERIFICATION AND QUALITY CONTROL CHECKS 5.1. Purpose 5.1.1. The purpose of this procedure is to establish guidelines

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

ScadaPhone Installation & Quick Start::

ScadaPhone Installation & Quick Start:: P.O. Box 11590, Reno, NV, 89510 Phone : 775-348-7471 (U.S.) Email : Sales@ScadaTEC.com October, 2014 ScadaPhone Installation & Quick Start:: This document outlines the procedure for installing ScadaPhone

More information

Mission Guide: Dropbox

Mission Guide: Dropbox Mission Guide: Dropbox Your Mission: Use F-Response to access Dropbox Cloud Storage Using F-Response to connect to Dropbox Cloud Storage and collect its contents Important Note Disclaimer: F-Response provide

More information

Case 5:16-cm SP Document Filed 03/10/16 Page 1 of 6 Page ID #:2395

Case 5:16-cm SP Document Filed 03/10/16 Page 1 of 6 Page ID #:2395 Case :-cm-0000-sp Document - Filed 0/0/ Page of Page ID #: 0 0 EILEEN M. DECKER United States Attorney PATRICIA A. DONAHUE Assistant United States Attorney Chief, National Security Division TRACY L. WILKISON

More information

Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010

Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.

More information

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010

Traffic in Network /8. Background. Initial Experience. Geoff Huston George Michaelson APNIC R&D. April 2010 Traffic in Network 1.0.0.0/8 Geoff Huston George Michaelson APNIC R&D April 2010 Background The address plan for IPv4 has a reservation for Private Use address space. This reservation, comprising of 3

More information

Electronic Document and Records Management System. End User Tips and Tricks for SharePoint Online

Electronic Document and Records Management System. End User Tips and Tricks for SharePoint Online Electronic Document and Records Management System End User Tips and Tricks for SharePoint Online Title EDRMS End User Tips and Tricks for SharePoint Online Creation Date 7th November 2018 Version 1.0 TABLE

More information

DocAve 6 Administrator

DocAve 6 Administrator DocAve 6 Administrator User Guide Service Pack 5 Revision C Issued February 2015 1 Table of Contents What s New in this Guide... 7 About DocAve Administrator for SharePoint... 8 Complementary Products...

More information

Installing and Configuring Worldox/Web Mobile

Installing and Configuring Worldox/Web Mobile Installing and Configuring Worldox/Web Mobile SETUP GUIDE v 1.1 Revised 6/16/2009 REVISION HISTORY Version Date Author Description 1.0 10/20/2008 Michael Devito Revised and expanded original draft document.

More information

DocAve 6 Administrator

DocAve 6 Administrator DocAve 6 Administrator User Guide Service Pack 4, Cumulative Update 3 Revision P Issued September 2014 Table of Contents About DocAve Administrator for SharePoint... 7 Complementary Products... 7 Submitting

More information

Perceptive Nolij Web. Release Notes. Version: 6.8.x

Perceptive Nolij Web. Release Notes. Version: 6.8.x Perceptive Nolij Web Release Notes Version: 6.8.x Written by: Product Knowledge, R&D Date: June 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates. Table of Contents Perceptive Nolij Web

More information

Altus Call Recording. Dashboard Admin User Guide. Document Version Maryland Way, Suite 300 Brentwood, TN Tel

Altus Call Recording. Dashboard Admin User Guide. Document Version Maryland Way, Suite 300 Brentwood, TN Tel Altus Call Recording Dashboard Admin User Guide Document Version 1.3 5121 Maryland Way, Suite 300 Brentwood, TN 37027 Tel +1 615.465.4001 WWW.ALTUSUC.COM Table of Contents About This Document... 5 1.1

More information

Doses Administered Reporting User Instructions

Doses Administered Reporting User Instructions Doses Administered Reporting User Instructions Doses Administered Reporting is an application that provides an online method for all Utah VFC providers to submit required vaccine doses administered data

More information

RegForensicTool: Evidence Collection and Analysis of Windows Registry

RegForensicTool: Evidence Collection and Analysis of Windows Registry RegForensicTool: Evidence Collection and Analysis of Windows Registry Dinesh N. Patil 1, Bandu B. Meshram 2 Veermata Jijabai Technological Institute Matunga, Mumbai, India dinesh9371@gmail.com 1, bbmeshram@vjti.org.in

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

Acknowledgments About the Authors

Acknowledgments About the Authors Preface p. xv Acknowledgments p. xix About the Authors p. xxi Case Studies p. xxv Live Incident Response p. 1 Windows Live Response p. 3 Analyzing Volatile Data p. 5 The System Date and Time p. 6 Current

More information

Digital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division

Digital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division Mobile Device Data Extraction 12. MOBILE DEVICE DATA EXTRACTION PROCEDURE 12.1. Purpose 12.1.1. The purpose of this procedure is to extract data from mobile devices and/or removable media utilizing the

More information

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher BlackLight is a multi-platform forensic analysis tool that allows examiners to quickly and intuitively analyze digital forensic media. BlackLight is capable of analyzing data from Mac OS X computers, ios

More information

Scientific Working Group on Digital Evidence

Scientific Working Group on Digital Evidence SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period

More information

CSCE 315 Fall Team Project 3

CSCE 315 Fall Team Project 3 CSCE 315 Fall 2017 Team Project 3 Project Goal Your team is to build a system that puts together different existing web components in an application that provides a quality user interface to the joined

More information

Trustee Attributes. White Paper. February 2012

Trustee Attributes. White Paper. February 2012 Trustee Attributes White Paper February 2012 Table of Contents What is a Trustee Attribute?... 3 Users and Trustee Attributes... 3 How Trustee Attributes Work... 3 Administering Trustee Attributes... 6

More information

researchmap User Manual November 15, 2017 Japan Science and Technology Agency

researchmap User Manual November 15, 2017 Japan Science and Technology Agency researchmap User Manual November 15, 2017 Japan Science and Technology Agency Index STEP-1 1 Let s first visit the researchmap website... 1 Display example of the opening page of the researchmap website...

More information

DESCRIPTION AND INTERPRETATION OF THE RESULTS

DESCRIPTION AND INTERPRETATION OF THE RESULTS CHAPTER 4 DESCRIPTION AND INTERPRETATION OF THE RESULTS 4.1 INTRODUCTION In this chapter the results of the laboratory experiments performed are described and interpreted. The research design and methodology

More information

Loan Closing Advisor SM. User Guide. December 2017

Loan Closing Advisor SM. User Guide. December 2017 Loan Closing Advisor SM User Guide December 2017 Notice This User Guide is Freddie Mac s CONFIDENTIAL INFORMATION as defined in and subject to the provisions of the Freddie Mac Single Family Seller/Servicer

More information

1 efilega Frequently Asked Questions

1 efilega Frequently Asked Questions 1 efilega Frequently Asked Questions Topics Covered in this Chapter General General How do I access the Odyssey File & Serve system? To access the Odyssey File & Serve website, go to efilega (https://efilega.tylerhost.net/).

More information

AccessData Forensic Toolkit Release Notes

AccessData Forensic Toolkit Release Notes AccessData Forensic Toolkit 5.3.3 Release Notes Document Date: 5/19/2014 2014 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES

STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES Chapter 19 STEGANOGRAPHIC TECHNIQUES FOR HIDING DATA IN SWF FILES Mark-Anthony Fouche and Martin Olivier Abstract Small Web Format (SWF) or Flash files are widely used on the Internet to provide Rich Internet

More information

Village of Pleasant Prairie 2017 Monthly Village Newsletter (Request for Proposal) November 2016

Village of Pleasant Prairie 2017 Monthly Village Newsletter (Request for Proposal) November 2016 Village of Pleasant Prairie 2017 Monthly Village Newsletter (Request for Proposal) November 2016 Request for Proposal Village of Pleasant Prairie 2017 Monthly Village Newsletter November 2016 I. Introduction

More information

DECLARATION OF ALLYSON HIMELFARB PURSUANT TO 28 U.S.C below. If called as a witness, I could and would testify as follows: Introduction

DECLARATION OF ALLYSON HIMELFARB PURSUANT TO 28 U.S.C below. If called as a witness, I could and would testify as follows: Introduction United States of America v. Impulse Media Group Inc Doc. 17 Att. 2 Case 2:05-cv-01285-RSL Document 17-3 Filed 09/05/2006 Page 1 of 35 DECLARATION OF ALLYSON HIMELFARB PURSUANT TO 28 U.S.C. 1746 I, Allyson

More information

Forensic Analysis of Windows 10 Volume Shadow Copy Service

Forensic Analysis of Windows 10 Volume Shadow Copy Service Forensic Analysis of Windows 10 Volume Shadow Copy Service Ahmad Ghafarian, Ph.D. Dept. of Computer Science & Information Systems Mike Cottrell College of Business University of North Georgia Dahlonega,

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

Aventail WorkPlace. User s Guide Version 8.7.0

Aventail WorkPlace. User s Guide Version 8.7.0 Aventail WorkPlace User s Guide Version 8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile, Aventail Connect Tunnel,

More information

Information Management Platform Release Date Version Highlights compared to previous version

Information Management Platform Release Date Version Highlights compared to previous version For over 30 years ZyLAB has been working with professionals in the litigation, auditing, security and intelligence communities to develop the best solutions for investigating and managing large sets of

More information

Forensic Toolkit System Specifications Guide

Forensic Toolkit System Specifications Guide Forensic Toolkit System Specifications Guide February 2012 When it comes to performing effective and timely investigations, we recommend examiners take into consideration the demands the software, and

More information

Vendor: ECCouncil. Exam Code: EC Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo

Vendor: ECCouncil. Exam Code: EC Exam Name: Computer Hacking Forensic Investigator Exam. Version: Demo Vendor: ECCouncil Exam Code: EC1-349 Exam Name: Computer Hacking Forensic Investigator Exam Version: Demo QUESTION 1 What is the First Step required in preparing a computer for forensics investigation?

More information

Certification Report

Certification Report Certification Report Symantec Security Information Manager 4.8.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Small Office Security 2. Scan PC for viruses and vulnerabilities

Small Office Security 2. Scan PC for viruses and vulnerabilities Small Office Security 2 Scan PC for viruses and vulnerabilities Table of content Table of content... 1 Scan PC for viruses... 2 What is Scan... 2 Starting scan... 2 Starting scan from the main application

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

TestOut Desktop Pro Plus English 4.1.x RELEASE NOTES. Modified

TestOut Desktop Pro Plus English 4.1.x RELEASE NOTES. Modified TestOut Desktop Pro Plus English 4.1.x RELEASE NOTES Modified 2018-06-18 Contents Overview... 2 Version 4.1.3 Release (June 2018)... 2... 2 Version 4.1.2 Release (April 2018)... 2... 2 Videos and Simulations...

More information

AvePoint Cloud Backup. Release Notes

AvePoint Cloud Backup. Release Notes AvePoint Cloud Backup Release Notes Table of Contents New Features and Improvements... 2 AvePoint Cloud Backup for Office 365 July 2018... 2 AvePoint Cloud Backup for Office 365 June 2018... 2 AvePoint

More information

Netsweeper Reporter Manual

Netsweeper Reporter Manual Netsweeper Reporter Manual Version 2.6.25 Reporter Manual 1999-2008 Netsweeper Inc. All rights reserved. Netsweeper Inc. 104 Dawson Road, Guelph, Ontario, N1H 1A7, Canada Phone: +1 519-826-5222 Fax: +1

More information

Documenting a Digital Forensic Investigation - Guide

Documenting a Digital Forensic Investigation - Guide Contents How to Setup Forensic Notes to Document Your Investigations... 2 Creating Folders... 3 Deleting a Folder... 6 Creating Nested Folders... 8 Notetaking: Intake Officer... 9 Creating a Notebook...

More information

for Q-CHECKER Text version 15-Feb-16 4:49 PM

for Q-CHECKER Text version 15-Feb-16 4:49 PM Q-MONITOR 5.4.X FOR V5 for Q-CHECKER USERS GUIDE Text version 15-Feb-16 4:49 PM Orientation Symbols used in the manual For better orientation in the manual the following symbols are used: Warning symbol

More information

Digital Forensics ITP 375 (3 Units)

Digital Forensics ITP 375 (3 Units) Digital Forensics ITP 375 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming more of

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information