Windows Registry. Windows Registry. A Wealth of Evidence. What is the Registry? Some Evidence that Can Be Recovered. Registry History: Windows 3.

Size: px
Start display at page:

Download "Windows Registry. Windows Registry. A Wealth of Evidence. What is the Registry? Some Evidence that Can Be Recovered. Registry History: Windows 3."

Transcription

1 Windows Registry Windows Registry Week 3 Part 1 A great source of evidence and headaches What is the Registry? A Wealth of Evidence Collection of files that, together, form all the settings needed by applications and the operating system The Registry stores: hardware info ports, disk, etc user information and preferences application settings and more The registry can be searched, and tons of information can be obtained about the user and computer This includes values but time/dates when the data was created 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Some Evidence that Can Be Recovered Devices that were connected to the system User names and accounts Personal settings and browser preferences Web browsing activity Most recently used files Programs used Registry History: Windows 3.1 The registry was debuted in Windows 95 However, the idea has a long evolution from Windows 3.1 and DOS Windows 3.1 and DOS use INI files text files with an easy to read/edit format applications often had their own separate files these were often stored in the c:\windows folder or elsewhere on the hard drive 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

2 INI File Example Registry History: Windows 3.1 [Course] ID=csc116 Name=Cyber Forensics Instructor=Devin Cook Section Key & Value ; Comments start with a semicolon [Location] Building=Riverside Hall Room=1008 Windows 3.1 has two main INI files SYSTEM.INI hardware, drivers, etc WIN.INI desktop, applications, etc.. Had a precursor to the modern Registry called REG.DAT which contained: Object Linking Embedding (OLE) data associated file types with applications 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Problems with 3.1 Windows 95 Approach Problems arose: proliferation of INI files all over the computer slow access entire text file had to be loaded lack of network support did not allow multiple user profiles very flat format Modern registry was developed to overcome these restrictions The Windows 9x/NT 3.5 Registry is composed of a couple of different files The files are: system.dat system settings (9x, NT) user.dat generic user settings (9x, NT) classes.dat Utilized for program associations, context menus and file types. (ME only) 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer : Multiple User Problem 95: Multiple User Solution How does it support multiple users? If all utilize the same profile the information will all be mingled togather in the user.dat file it will be difficult (if not impossible) to separate the data Windows 9x/NT use user.dat as a default account It is copied for new profiles In addition, each user has a separate user.dat file Allows support for multiple users and to add users without starting from scratch 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

3 95: Backups Windows 3.1 Settings Filename Location Content Back-up of the registry is made after each boot The filenames are as follows System.dao (95, 98, ME, NT) User.dao (95, 98, ME, NT) Rbxxx.cab (98, ME) system.ini \Windows hardware, drivers, and other vital configuration information win.ini \Windows application settings, desktop, user preferences. Applications often used separate.ini files 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows 9x Registry Windows XP Filename Location Content user.dat system.dat \Windows \Windows - and - \Windows\profiles\user User-specific information. There is a different file for each user plus a main default one Protected storage area for all users, all installed programs and their settings, system settings In Windows XP, Microsoft expanded the Registry quite considerably by adding many of the features from Windows NT Windows NT was their high-end operating system designed to be secure and robust Windows 95/98/ME were designed to run older software legacy support 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows XP Registry Windows 7/8/10 Registry Filename Location Content Filename Location Content ntuser.dat \Documents and Settings\user User-specific information. Different file for each user. ntuser.dat \Users\username User-specific information. Different file for each user. Default \Windows\system32\config System settings Default \Windows\system32\config System settings SAM \Windows\system32\config Security account management SAM \Windows\system32\config Security account management Security \Windows\system32\config Security settings Security \Windows\system32\config Security settings Software \Windows\system32\config All installed programs and their settings Software \Windows\system32\config All installed programs and their settings System \Windows\system32\config System settings System \Windows\system32\config System settings 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

4 Logical Registry Design Registry Logical Design Different files? Different versions? How does it make sense? The Registry is stored differently depending on the version of Windows However, for applications, the information is always presented in the same format This allowed the Registry to evolve smoothly over time 7/23/2018 Sacramento State - Cook - CSc Summer Windows Registry Elements Windows Registry Elements Data is organized into a logical tree Information it organized into 5 different hives Some of the hives are collections of data in other hives so they are "virtual" Keys / Subkeys Defines the structure of the registry Similar to folders in a file system Values the data for each subkey String (REG_SZ) - Single line string value Binary (REG_BINARY) Series of bytes DWORD (REG_DWORD) Double word - 4 bytes Multi-string (REG_MULTI_SZ) - Multiple line string Expandable string (REG_EXPAND_SZ) 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry Hives Registry Hives HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USERS HKEY_CURRENT_CONFIG HKEY_LOCAL_MACHINE (HKLM) contains hardware, drivers, start-up data, services, and machine-specific application data most applications will store global settings here HKEY_USERS (HKU) contains information about each user including their folders and user-registry file required to locate actual user registry file 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

5 Registry Hives Registry Hives: Merged Views HKEY_CURRENT_USER (HKCU) once a user logs in, this key will contain the information from their registry file ntuser.dat applications, that want to store user-specific data, read and write to this key Why? Apps don t need to know *the* user, just the current one Nearly identical to HKEY_LOCAL_MACHINE HKEY_CLASS_ROOT (HKCR) classes can be user-specific or applied to all users contains merged view of two hives: HKEY_LOCAL MACHINE\SOFTWARE\Classes HKEY_CURRENT_USER\SOFTWARE\Classes HKEY_CURRENT_CONFIG (HKCC) information about how the system was booted contains merged view of two hives: HKEY_LOCAL MACHINE\SOFTWARE HKEY_LOCAL MACHINE\SYSTEM 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows Registry Security Windows Security and Relative ID Security is set by Registry permissions in Windows 2000, regedt32.exe must be used in Windows XP, regedit.exe can also be used. Two basic permission available Read Only Full Control By default, only the System and Administrators: have full control permissions can also create specific permissions Windows Registry uses a alphanumeric combination to identify a security group Security ID (SID) identifies the computer system SIDs are assigned by the Domain Controller S /23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows Security and Relative ID Dissecting a SID Relative ID (RID) part of the SID used to identity the specific user on the computer system It is the last part of the SID SID version Domain or Local Computer S S Authority Relative ID 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

6 Why Is Mr. Cook Obsessed with Windows? Registry Forensics Windows is the main operating system used on home computers So, by a large margin, seized computers will What is the market share? market share is hard to measure the best avenue is to look at browser usage Some things to look for 7/23/2018 Sacramento State - Cook - CSc Summer Platforms: June 2017 Editing the Windows Registry Approximately 90.5% use Windows Windows XP 5.7% Windows % Windows 8 6.7% Windows % Approximately 7.8% use Macintosh Approximately 1.8% use Linux Two native Windows Registry editors available Regedt32.exe Regedit.exe These were merged in Windows XP 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Difference Between Live and Offline Registry No HARDWARE hive Located in HKLM (HKEY_LOCAL_MACHINE) Dynamic key - created at when Windows boots No virtual hives HKCU (HKEY_CURRENT_USER) is actually content in ntuser.dat You must search for the correct SID key under HKEY_USERS Some System Info You Can Get Computer name Dynamic disks Install dates Last user logged in Mounted devices Windows OS product key Registered owner Programs run automatically System s USB devices 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

7 User-Specific Evidence Registry Forensics ntuser.dat (HKEY_CURRENT_USER) is a great source of evidence Note: everything the computer remembers between sessions is in the registry! So, anything that Windows remembers for you, it also will remember for the suspect All registry keys contain last modified time-stamp so, you can tell what and when not visible with regedit there are tools for reading this Registry also records all devices that have ever been connected to the computer 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: MSN Messenger Registry: MSN messenger Some obtainable evidence IM groups, contacts, Location of message history files Location of saved contact list files Values are stored in REG_BINARY (bytes) this is actually Unicode Text dead giveaway is the pattern: ## 00 ## HKEY_CURRENT_USER/Software/Microsoft/MSNMessenger 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: MSN messenger Always Search for MRU HKEY_CURRENT_USER/Software/Microsoft/MSNMessenger Many applications keep a list of our Most Recently Used (MRU) files Registry location and format varies greatly between applications So, search the registry for the following keywords: MRU LRU Recent 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

8 Always Search for MRU Always Search for MRU Applications tend to read all the entries, re-sort them and then rewrite them all so date-stamps will often all be the same as the most recent file Windows also keeps a MRU on files These are the files you double-click on using explorer (the front-end GUI of Windows) It maintains a list for every extension! HKEY_USERS\UserSID\Software\Microsoft\ Windows\CurrentVersion\Explorer\RecentDoc 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer More MRU Information MRU In Windows 7 Windows uses an window called Common Dialog for selecting a file to open/save This is window that pop-ups, for instance, when you click save in Word This tool remembers up to the last 26 files for every file type you use naturally, this is in the registry stored in REG_BINARY format registry format changed in Windows 7 and 10 HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Explorer\ComDlg32 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer MRU In Windows 7 Registry: Internet Explorer HKEY_CURRENT_USER/Software/ Microsoft/Windows/CurrentVersion/Explorer/ComDlg32 Some obtainable evidence IE auto logon and password IE search terms IE settings Typed URLs Auto-complete passwords 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

9 Registry: Internet Explorer: Typed URLs Registry: IntelliForm HKEY_CURRENT_USER /Software/Microsoft/Internet Explorer/TypedURLs IntelliForm is a built-in feature of Windows utilized by Internet Explorer Also called auto complete Allows Windows to remember fields on web page forms Stored in the registry under Protected Storage System Provider 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Protected Storage System Provider Protected Storage System Provider Protected Storage System Provider only visible to the system account located in NTUSER.DAT \Software\Microsoft\Protected Storage System Provider Various tools will reveal contents AccessData Registry Viewer Windows Secret Explorer Cain & Abel Protected Storage PassView HKEY_CURRENT_USER\Software\ Microsoft\Protected Storage System Provider 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Installed Software Uninstalled Software You can find both software that is currently installed a system Keys are usually created with installation You can also determine if software was uninstalled Keys are usually created with installation are often not deleted HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\App Paths HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\Uninstal 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

10 Last Login Last Login Windows keeps track of the last user to log into the system You can use this: to determine who was on the computer last when this was using Registry time stamps (should be consistent with other time stamps) if they logged into Windows a suspect may have used a boot disk HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows NT\CurrentVersion\WinLogon 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: Mounted Devices Device History Yes, the Registry stores that too! Applications can talk to devices assigned volume letters such as: C:, D:, etc Letter is actually mapped to a piece of hardware e.g. hard drive, CD-ROM, USB drive, etc 7/23/2018 Sacramento State - Cook - CSc Summer Registry: Mounted Devices Globally Unique Identifiers The registry contains this information and how each letter maps to a device So, for instance, when Microsoft Word, wants to save something to E: Windows looks up the letter in the Registry and sends it to the correct device Windows, records all mounted devices using a Globally Unique Identifiers (GUID) These are hash values created by Windows and used for almost everything Why use them for devices? applications may want to talk to a specific device regardless of its letter. also, letters can be changed. 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

11 Registry: Mounted Devices Registry: Mounted Devices HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\MountedDevices HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\MountedDevices 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer When a USB Device is Plugged in. Windows PnP (plug and play) is notified by the port Windows asks the device for its name, serial value, etc Windows then creates a unique value of the device, locates the correct driver, and updates the registry This process is also saved in the SetupAPI Log file Registry: USB Devices Registry also records all USB devices that have ever been connected to the computer This information is enumerated in its own location in the Registry Using time-stamps, you can tell when a suspect USB Drive was connected This can be used to verify timelines or show evidence of data theft 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: USB Device History Registry: USB Devices HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Enum\USBSTOR You can map information in "USBStor" with "MountedDevices" to find what drive letter was used It can be a tad complicated. fortunately, there are many tools, like USBDeview, that can interpret the data for you and give nice reports however, you must understand the format for verifying these tools accuracy in Court 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

12 USBDeview Date! 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer

Description of the Microsoft Windows Registry

Description of the Microsoft Windows Registry Page 1 of 5 Microsoft Knowledge Base Article - 256986 Description of the Microsoft Windows Registry The information in this article applies to: Microsoft Windows Server 2003, 64-Bit Datacenter Edition

More information

WEEK 2.0. Any sufficiently advanced technology is indistinguishable from magic.

WEEK 2.0. Any sufficiently advanced technology is indistinguishable from magic. WEEK 2.0 Any sufficiently advanced technology is indistinguishable from magic. Recycler A recycle bin for each user Created upon file deletion Only for RB aware programs ie Office, not command line tools

More information

Lesson 2: Editing the Registry

Lesson 2: Editing the Registry Lesson 2: Editing the Registry Lesson 2 Editing the Registry 4-15 Windows XP Professional stores hardware and software settings centrally in a hierarchical database called the Registry, which replaces

More information

Windows Registry Analysis

Windows Registry Analysis Windows Registry Analysis Omveer Singh Additional Director / Scientist E omveer@cert-in.org.in Cyber Forensics Lab Indian Computer Emergency Response Team (CERT-In) Department of Information Technology

More information

Legal Notices. AccessData Corp.

Legal Notices. AccessData Corp. Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 11 Optimizing Windows

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 11 Optimizing Windows Chapter 11 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows to improve performance Learn how to manually remove

More information

COPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1

COPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1 Chapter 1 What Is a Registry and Why? Some users of Windows know exactly what the registry is a system designed to cause users and administrators to lose their hair. I know this is true because I can no

More information

Introducing. the Registry. In This Part. CHAPTER 1 Introducing the Registry CHAPTER 2 Using the Editors to Inspect and Modify.

Introducing. the Registry. In This Part. CHAPTER 1 Introducing the Registry CHAPTER 2 Using the Editors to Inspect and Modify. sample.qxd 3/14/2000 3:36 PM Page 1 P A R T O N E Introducing the Registry In This Part CHAPTER 1 Introducing the Registry CHAPTER 2 Using the Editors to Inspect and Modify the Registry CHAPTER 3 Putting

More information

Tweaking the Windows 7 Registry

Tweaking the Windows 7 Registry CHAPTER 12 Tweaking the Windows 7 Registry IN THIS CHAPTER. Firing Up the Registry Editor. Getting to Know the Registry. Understanding the Registry Files. Keeping the Registry Safe It is almost everywhere

More information

RegForensicTool: Evidence Collection and Analysis of Windows Registry

RegForensicTool: Evidence Collection and Analysis of Windows Registry RegForensicTool: Evidence Collection and Analysis of Windows Registry Dinesh N. Patil 1, Bandu B. Meshram 2 Veermata Jijabai Technological Institute Matunga, Mumbai, India dinesh9371@gmail.com 1, bbmeshram@vjti.org.in

More information

Session 26 Backup/Restore and The Registry

Session 26 Backup/Restore and The Registry Session 26 Backup/Restore and The Registry Nassau Community College ITE153 Operating Systems 1 Overview Set Up a Backup Five Types of Backup Volume Shadow Copy Best Practices The Registry Required: Windows

More information

ACCESSDATA SUPPLEMENTAL APPENDIX

ACCESSDATA SUPPLEMENTAL APPENDIX ACCESSDATA SUPPLEMENTAL APPENDIX Steps for Decrypting IntelliForms Data in Windows Vista This appendix reviews the process required to decrypt the protected information located in the IntelliForms subkey.

More information

Registry Functions. Each of the W/32 registry functions has a syntax of the form: CALL creg ( key%,, ADDROF(result%) )

Registry Functions. Each of the W/32 registry functions has a syntax of the form: CALL creg ( key%,, ADDROF(result%) ) Registry Functions Introduction The registry is a system-defined database that applications and Microsoft Windows system components use to store and retrieve configuration data. This appendix to the W/32

More information

Registry Artifacts. Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Registry Artifacts. Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Registry Artifacts Villanova University Department of Computing Sciences D. Justin Price Spring 2014 REGISTRY The registry is a central hierarchal database intended to store information that is necessary

More information

The introduction of Windows 8 was a big change for Microsoft s traditional operating

The introduction of Windows 8 was a big change for Microsoft s traditional operating A Comparison Between the Windows 8 & Windows 7 Registries Matthew Brewer B.S., Dr. Terry Fenger, Corporal Robert J. Boggs, Christopher Vance B.S. Marshall University Forensic Science Center, Huntington,

More information

Identity, Authentication, and Access Control

Identity, Authentication, and Access Control Identity, Authentication, and Access Control License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.

More information

A+ Certification Guide. Chapter 15 Troubleshooting and Maintaining Windows

A+ Certification Guide. Chapter 15 Troubleshooting and Maintaining Windows A+ Certification Guide Chapter 15 Troubleshooting and Maintaining Windows Chapter 15 Objectives STOP (Blue Screen of Death) Errors: Discover what a BSOD is, typical causes, how to diagnose Boot Failures:

More information

windows maurizio pizzonia roma tre university

windows maurizio pizzonia roma tre university windows maurizio pizzonia roma tre university 1 references M. Russinovich, D. A. Solomon Windows Internals: Including Windows Server 2008 and Windows Vista 5 th ed. Microsoft Press 2 architecture overview

More information

n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems

n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems Outline n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems n Describe methods used to escalate privileges Chapter #5: n Describe methods used

More information

1. Contents. b. Windows ME

1. Contents. b. Windows ME 1. Contents You should have the following items included in your Pocki-Drive order, pictured right: i - Pocki-Drive ii - Lid (attached to the Pocki-Drive) iii - Extension cable iv - Installation CD v -

More information

Windows Registry Forensics

Windows Registry Forensics Windows Registry Forensics Registry Definition The Microsoft Computer Dictionary defines the registry as: A central hierarchical database used in the Microsoft Windows family of Operating Systems to store

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 14 Optimizing Windows

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 14 Optimizing Windows A+ Guide to Managing and Maintaining Your PC, 7e Chapter 14 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows

More information

Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS. 1. Introduction. Harry Velupillai and Pontjho Mokhonoana

Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS. 1. Introduction. Harry Velupillai and Pontjho Mokhonoana Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.

More information

Deploy Registry Settings Office 2010 to be used as an internal resource only

Deploy Registry Settings Office 2010 to be used as an internal resource only Deploying Custom Registry Settings for Office 2010 If you are planning to customise your Office 2010 deployment significantly, then at some point, you will more than likely need to make changes to the

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

Password Changer User Guide

Password Changer User Guide Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative

More information

Management Mechanisms

Management Mechanisms Chapter 4 Management Mechanisms This chapter describes three fundamental mechanisms in Microsoft Windows that are critical to the management and configuration of the system: The registry Services The Registry

More information

USMTGUI - User guide for backup and restore of local and Domain user profiles

USMTGUI - User guide for backup and restore of local and Domain user profiles USMTGUI - User guide for backup and restore of local and Domain user profiles Easy transfer of User Profiles from one PC to another. Save data to USB hard disk or network and restore to the new PC In this

More information

ABSTRACT. In Windows Operating system, Registry is core component and it contains

ABSTRACT. In Windows Operating system, Registry is core component and it contains ABSTRACT In Windows Operating system, Registry is core component and it contains significant information which is useful for a forensic analyst. It is a repository of the central database in a hierarchal

More information

Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010

Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.

More information

A+ Guide to Managing and Maintaining Your PC. Managing and Supporting Windows XP

A+ Guide to Managing and Maintaining Your PC. Managing and Supporting Windows XP A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 16 Managing and Supporting Windows XP Security Using Windows NT/ 2000/XP Goals Secure system resources including hardware and software

More information

PhotoPDF User Guide. PhotoPDF. Photo to PDF Converter

PhotoPDF User Guide. PhotoPDF. Photo to PDF Converter PhotoPDF Photo to PDF Converter PhotoPDF is a batch-processing tool to convert photos into PDF file. PhotoPDF provides three modes of conversion: Batch Convert, Photos Merge and Thumbnail Page. PhotoPDF

More information

Digital Forensics. Module 6 CS 996

Digital Forensics. Module 6 CS 996 Digital Forensics Module 6 CS 996 Module #5 Covered B of A case; corporate responsibility for security New security standards: NIST 800-53 and ITIL Another new security standard: ISF Standard of Good Practice

More information

Contains over 60 Registry Tweaks, Cheats and Hacks

Contains over 60 Registry Tweaks, Cheats and Hacks Contains over 60 Registry Tweaks, Cheats and Hacks For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access

More information

Let s Tune Oracle8 for NT

Let s Tune Oracle8 for NT Let s Tune Oracle8 for NT ECO March 20, 2000 Marlene Theriault Cahill Agenda Scope A Look at the Windows NT system About Oracle Services The NT Registry About CPUs, Memory, and Disks Configuring NT as

More information

Server. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2

Server. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2 Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Remote Access Forensics for VNC and RDP on Windows Platform

Remote Access Forensics for VNC and RDP on Windows Platform Edith Cowan University Research Online Australian Digital Forensics Conference Conferences, Symposia and Campus Events 2010 Remote Access Forensics for VNC and RDP on Windows Platform Paresh Kerai Edith

More information

The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system.

The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. In this Article: Preparing a The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. Customer.inf setup is a comprehensive installation

More information

How To Clean Your Registry Manually Xp Hard Drive On A Windows

How To Clean Your Registry Manually Xp Hard Drive On A Windows How To Clean Your Registry Manually Xp Hard Drive On A Windows Unfortunately, many of these claims are false and could actually cause your computer more harm. The Windows registry is basically a really

More information

Digital Forensics. Module 7 CS 996

Digital Forensics. Module 7 CS 996 Digital Forensics Module 7 CS 996 Module #6 Covered Using Autopsy Using Helix 3/30/2005 Module 7 2 Outline of Module #7 Review mid-term Helix presentation Forensic business news Gates v. Bando case Linux

More information

Version 3.50 / 04/15/2009

Version 3.50 / 04/15/2009 Version 3.50 / 04/15/2009 Copyright 2006 2009 Mindleads Technology UltraLogon user manual 1 / 47 Contents Copyright... 3 Document Conventions... 4 Icons... 4 Typographic Conventions... 4 Introduction...

More information

NetIQ Advanced Authentication Framework - Citrix XenDesktop Plugin. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Citrix XenDesktop Plugin. Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Citrix XenDesktop Plugin Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Installing

More information

IEDigest V Jean-Pierre Regente Jean-Pierre Regente. ( All rights reserved )

IEDigest V Jean-Pierre Regente Jean-Pierre Regente. ( All rights reserved ) IEDigest V1.1.0 Jean-Pierre Regente http://www.iedigest.com 2011 Jean-Pierre Regente ( All rights reserved ) Table of Contents What is it?... 3 Differences to other tools... 3 User interface... 4 Home...

More information

infoxpert Support Article

infoxpert Support Article infoxpert Support Article Version Date: March 2011 infoxpert Version: infoxpert Version 8.0.43 and above. Document Distribution This document is of a technical nature and is targeted to I.T. staff. Details

More information

How To Remove Windows 7 Genuine Advantage Notification From Registry

How To Remove Windows 7 Genuine Advantage Notification From Registry How To Remove Windows 7 Genuine Advantage Notification From Registry review(s) for the wga removal tool for windows 7. Review by:vik.leonova Update? Remover 1.5? Download Now Genuine Advantage Notification

More information

Chapter. Configuring the Windows 2000 Environment MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER

Chapter. Configuring the Windows 2000 Environment MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Chapter 4 Configuring the Windows 2000 Environment MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Implement, manage, and troubleshoot disk devices. Install, configure, and manage DVD and CD-ROM devices.

More information

Interview Room Management System Administrator Manual

Interview Room Management System Administrator Manual Technical Support Interview Room Management System Administrator Manual www.casecracker.com support@casecracker.com (720) 442-7072 Table of Contents 1. System Overview 1 2. Users and Groups 1 3. Setup

More information

A+ Guide to Managing and Maintaining Your PC. Supporting Windows 9x

A+ Guide to Managing and Maintaining Your PC. Supporting Windows 9x A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 12 Supporting Windows 9x Windows 9x Architecture 2 Windows 9x Architecture (continued) 3 Windows 9x Architecture (continued) 4 Virtual

More information

A+ Chapter 11 Test (2.0) True / False Indicate whether the statement is true or false.

A+ Chapter 11 Test (2.0) True / False Indicate whether the statement is true or false. True / False Indicate whether the statement is true or false. 1. Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. 2. You do not have to be logged on

More information

Lab 03. Windows Operating Systems (Cont.)

Lab 03. Windows Operating Systems (Cont.) Lab 03 s (Cont.) Objectives Develop a good understanding of 1. The role of an operating system in a computer system 2. Services provided by an operating system and have some hands on experience in 1. Understanding

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

ATTENTION!!! Please be sure this document is delivered to the network administrator who will be installing Network WYNN!!

ATTENTION!!! Please be sure this document is delivered to the network administrator who will be installing Network WYNN!! ATTENTION!!! Please be sure this document is delivered to the network administrator who will be installing Network WYNN!! Network WYNN 3.1 Installation Documentation November 2003 The following information

More information

Installing Applications on Windows Terminal Server

Installing Applications on Windows Terminal Server Installing Applications on Windows Terminal Server Network Station Education IBM NCD June 1999 01/31/00 v2r1wtseapplications.prz Copyright IBM Corp. 1998 - Course materials may not be reproduced in whole

More information

Windows Xp Cannot Change Desktop Wallpaper Registry

Windows Xp Cannot Change Desktop Wallpaper Registry Windows Xp Cannot Change Desktop Wallpaper Registry Looking for a way to delete desktop wallpapers from your Windows PC? Windows 10 has another set of newly created wallpapers that will be shipping In

More information

RTE for WIN32. Installation Manual (Rev.7.0) Midas lab

RTE for WIN32. Installation Manual (Rev.7.0) Midas lab Midas lab REVISION HISTORY Date Revision Chapter Explanation of revision March 11,2000 4.0 RTE4W32 Ver.5.0 (First edition) January 10,2002 4.1 Add Windows XP support (RTE4W32 Ver.5.05) October 29,2002

More information

Exam : Title. : A+ OS Technologies

Exam : Title. : A+ OS Technologies Exam : 220-302 Title : A+ OS Technologies QUESTION 1 Under Windows 2000 you consistently receive out of memory messages when running multiple applications. To avoid having to upgrade RAM immediately you?

More information

Windows Artifacts as a part of Digital Investigation

Windows Artifacts as a part of Digital Investigation Windows Artifacts as a part of Digital Investigation Divyang Rahevar, Nisarg Trivedi Institute of Forensic Science Gujarat Forensic Sciences University Gandhinagar, Gujarat India divurahevar@gmail.com,

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Chapter 6: Connecting Windows Workstations

Chapter 6: Connecting Windows Workstations Chapter 6: Connecting Windows Workstations 153 Chapter 6 Connecting Windows Workstations Because this is a book about using Linux on a Microsoft Windows-based network, this chapter shows you how to connect

More information

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi

Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Created by Simon Monk Last updated on 2016-12-03 03:20:15 AM UTC Guide Contents Guide Contents Overview You Will Need Downloading

More information

Windows 2000 System Administration Handbook, 1/e

Windows 2000 System Administration Handbook, 1/e Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5

More information

Bridge Cable User s Guide

Bridge Cable User s Guide Bridge Cable User s Guide Table of Contents Overview -------------------------------------------------------------------- 2 Driver Installation --------------------------------------------------------

More information

How To Change What Programs Run At Startup Windows Xp Professional

How To Change What Programs Run At Startup Windows Xp Professional How To Change What Programs Run At Startup Windows Xp Professional Steps on how to prevent Windows programs from automatically loading every time your Within the Run folder you should be able to locate

More information

Super USB. User Manual. 2007, March

Super USB. User Manual. 2007, March Super USB User Manual 2007, March Windows98 Driver Install/Uninstall Driver Install: 1. Execute Win 98 UFD driver, then restart PC. 2. Plug Super USB into an available USB port. A new Removable Disk drive

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

SERVICE2000 QUICK START

SERVICE2000 QUICK START SERVICE2000 QUICK START Installation Guide for Release 8 Table of Contents Introduction 2 System Requirements 2 Preparation - All Editions 2 Installation - Single User Edition 3 Installation - Network

More information

Module 9 Lab Host System Hardening

Module 9 Lab Host System Hardening Background: This Lab reinforces the concepts of host system hardening. Students will discover vulnerabilities of systems and then apply techniques to harden and secure them. Requirements/assumptions: Windows

More information

Easy Windows Working with Disks, Folders, - and Files

Easy Windows Working with Disks, Folders, - and Files Easy Windows 98-3 - Working with Disks, Folders, - and Files Page 1 of 11 Easy Windows 98-3 - Working with Disks, Folders, - and Files Task 1: Opening Folders Folders contain files, programs, or other

More information

Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The "proper" order of things. Week 6

Dissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The proper order of things. Week 6 Dissecting Files Endianness Week 6 The "proper" order of things So Many Bytes So Many Bytes On a 32-bit system, each word consists of 4 bytes So, when any 32-bit value is stored in memory, each of those

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit /

Windows Core Forensics Forensic Toolkit / Password Recovery Toolkit / The Windows Forensics Core Training follows up the AccessData BootCamp training. This advanced AccessData training class provides the knowledge and skills necessary to use AccessData products to conduct

More information

I can do that to my computer?

I can do that to my computer? I can do that to my computer? A brief class in troubleshooting your personal computer Phone: 392-3900 Email: training@vpha.health.ufl.edu TECH SKILL SOLUTIONS FOR THE HEALTH SCIENCE CENTER I can do that

More information

How To Fix Regedit Windows Xp With Disk Boot Failure

How To Fix Regedit Windows Xp With Disk Boot Failure How To Fix Regedit Windows Xp With Disk Boot Failure Get the fix to "Status: 0xc000000f" boot error for Windows XP, Vista, 7, 8 or 8.1 errors with the disk, partition, bootsector, filesystem, bootloader,

More information

Part I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL

Part I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Part I Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Chapter 1 What s New in Windows XP? Windows XP suffers somewhat from a dual personality. In some ways it is a significant release,

More information

Windows 10 Registry AGENDA. What is the Registry? About Dan Purcell. Copyright Dan Purcell 2014

Windows 10 Registry AGENDA. What is the Registry? About Dan Purcell. Copyright Dan Purcell 2014 Windows 10 Registry Copyright Dan Purcell 2014 What is the Registry? AGENDA About Dan Purcell 1 What is the Registry? AGENDA Basic Registry Terminology & Structure Physical v. Logical Date & Time Formats

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

SAP GUI 7.30 for Windows Computer

SAP GUI 7.30 for Windows Computer SAP GUI 7.30 for Windows Computer Student and Faculty Installation Instructions Table of Contents Caution:... 2 System Requirements:... 2 System Memory (RAM) requirements:... 2 Disk Space requirements:...

More information

How To Force Restore A Computer That Won Boot Up After System

How To Force Restore A Computer That Won Boot Up After System How To Force Restore A Computer That Won Boot Up After System If your computer won't start up normally, you may need to use a disk repair utility This can occur after an improper shutdown, forced restart,

More information

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems

More information

Safe Mode: Solve Startup Problems & Crashes S 3/1. Solve (Almost) Any Problem Your Computer May Have

Safe Mode: Solve Startup Problems & Crashes S 3/1. Solve (Almost) Any Problem Your Computer May Have Safe Mode: Solve Startup Problems & Crashes S 3/1 Solve (Almost) Any Problem Your Computer May Have If your PC refuses to start or keeps crashing for some unknown reason, Safe Mode is often your last resort.

More information

SharePoint: Fundamentals

SharePoint: Fundamentals SharePoint: Fundamentals This class will introduce you to SharePoint and cover components available to end users in a typical SharePoint site. To access SharePoint, you will need to log into Office 365.

More information

EntraPass (W10) Installation Guide Kantech-OnBoard systems

EntraPass (W10) Installation Guide Kantech-OnBoard systems Overview Purpose ExacqVision recorders now include Kantech EntraPass Corporate Edition software. The purpose of this document is to guide the technician or installer through the process of installing and

More information

Lab E2: bypassing authentication and resetting passwords

Lab E2: bypassing authentication and resetting passwords Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and

More information

Required software. Mac OS X In this section, you ll find instructions for downloading and configuring the Arduino IDE in Mac OS X.

Required software. Mac OS X In this section, you ll find instructions for downloading and configuring the Arduino IDE in Mac OS X. Required software You should be able to program your Arduino with just about any computer using a piece of software called an integrated development environment (IDE). To run this software, your computer

More information

How To Fix Regedit Windows Xp Installation >>>CLICK HERE<<<

How To Fix Regedit Windows Xp Installation >>>CLICK HERE<<< How To Fix Regedit Windows Xp Installation Bootable Usb Drive If Windows is able to boot, use System File Checker and icacls.exe to repair To put Windows XP installation media onto a bootable USB drive

More information

Not For Sale. Offline Scratch Development. Appendix B. Scratch 1.4

Not For Sale. Offline Scratch Development. Appendix B. Scratch 1.4 Appendix B Offline Scratch Development If you only have occasional access to the Internet or your Internet access is extremely slow (aka 56k dial-up access), you are going to have a difficult time trying

More information

CURA Machine Setup Guide

CURA Machine Setup Guide CURA Machine Setup Guide CURA Technical Support Email: cura_support@mindscope.com Phone: 1.888.322.2362 x 555 CURA Machine Setup Guide Page 2 Table of Contents INSTALLATION GUIDE AND MACHINE SETUP... 3

More information

Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3

Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 From Cisco s website, here are the minimum requirements for CCP 2.7 and CCP 2.8: The following info comes from many

More information

jv16 PowerTools 2017 Manual

jv16 PowerTools 2017 Manual 1. Home... 4 1.1 System health score compare... 4 1.2 System Health... 4 1.3 Privacy... 4 1.4 Registry Integrity... 4 1.5 System Startup Times... 4 1.6 Check for vulnerable software... 4 1.7 About jv16

More information

AccessData AD Lab Release Notes

AccessData AD Lab Release Notes AccessData AD Lab 6.2.1 Release Notes Document Date: 4/24/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this

More information

XP: Backup Your Important Files for Safety

XP: Backup Your Important Files for Safety XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to

More information

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2

Veritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017

More information

PHRED Installation Guide

PHRED Installation Guide PHRED Installation Guide ColdFusion Version 10, SQL Server Database January 27, 2014 PHRED Installation Guide Page 1 Table of Contents Application Environment... 3 Application Tailoring... 4 Web Server

More information

10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it?

10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it? Live Acquisition Objectives Understand what Live Acquisition is and when it is appropriate Understand the concept of Order of Volatility Understand live acquisition issues and limitations Be able to perform

More information

Wimba Pronto. Version 2.0. User Guide

Wimba Pronto. Version 2.0. User Guide Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

How to install Virtuoso Chromeleon Integration Software! Only valid for Microsoft Windows 7 64bit version!

How to install Virtuoso Chromeleon Integration Software! Only valid for Microsoft Windows 7 64bit version! How to install Virtuoso Chromeleon Integration Software! Only valid for Microsoft Windows 7 64bit version! 1. You need Chromeleon 7.2 SR1 Muc installed on your computer 2. Install PI Gateway software (gatewayssetup.msi)

More information

ADOBE DREAMWEAVER CS4 BASICS

ADOBE DREAMWEAVER CS4 BASICS ADOBE DREAMWEAVER CS4 BASICS Dreamweaver CS4 2 This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,

More information

Installation guide for Choic Multi User Edition

Installation guide for Choic Multi User Edition Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL

More information

eggplant v11.0 Mac OS X EggPlant: Getting Started

eggplant v11.0 Mac OS X EggPlant: Getting Started eggplant v11.0 Mac OS X EggPlant: Getting Started Copyright 2011 TestPlant Inc. Eggplant: Getting Started Trademarks Eggplant, the Eggplant logos, TestPlant, and the TestPlant logo are trademarks or registered

More information