Windows Registry. Windows Registry. A Wealth of Evidence. What is the Registry? Some Evidence that Can Be Recovered. Registry History: Windows 3.
|
|
- Joseph Butler
- 5 years ago
- Views:
Transcription
1 Windows Registry Windows Registry Week 3 Part 1 A great source of evidence and headaches What is the Registry? A Wealth of Evidence Collection of files that, together, form all the settings needed by applications and the operating system The Registry stores: hardware info ports, disk, etc user information and preferences application settings and more The registry can be searched, and tons of information can be obtained about the user and computer This includes values but time/dates when the data was created 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Some Evidence that Can Be Recovered Devices that were connected to the system User names and accounts Personal settings and browser preferences Web browsing activity Most recently used files Programs used Registry History: Windows 3.1 The registry was debuted in Windows 95 However, the idea has a long evolution from Windows 3.1 and DOS Windows 3.1 and DOS use INI files text files with an easy to read/edit format applications often had their own separate files these were often stored in the c:\windows folder or elsewhere on the hard drive 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
2 INI File Example Registry History: Windows 3.1 [Course] ID=csc116 Name=Cyber Forensics Instructor=Devin Cook Section Key & Value ; Comments start with a semicolon [Location] Building=Riverside Hall Room=1008 Windows 3.1 has two main INI files SYSTEM.INI hardware, drivers, etc WIN.INI desktop, applications, etc.. Had a precursor to the modern Registry called REG.DAT which contained: Object Linking Embedding (OLE) data associated file types with applications 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Problems with 3.1 Windows 95 Approach Problems arose: proliferation of INI files all over the computer slow access entire text file had to be loaded lack of network support did not allow multiple user profiles very flat format Modern registry was developed to overcome these restrictions The Windows 9x/NT 3.5 Registry is composed of a couple of different files The files are: system.dat system settings (9x, NT) user.dat generic user settings (9x, NT) classes.dat Utilized for program associations, context menus and file types. (ME only) 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer : Multiple User Problem 95: Multiple User Solution How does it support multiple users? If all utilize the same profile the information will all be mingled togather in the user.dat file it will be difficult (if not impossible) to separate the data Windows 9x/NT use user.dat as a default account It is copied for new profiles In addition, each user has a separate user.dat file Allows support for multiple users and to add users without starting from scratch 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
3 95: Backups Windows 3.1 Settings Filename Location Content Back-up of the registry is made after each boot The filenames are as follows System.dao (95, 98, ME, NT) User.dao (95, 98, ME, NT) Rbxxx.cab (98, ME) system.ini \Windows hardware, drivers, and other vital configuration information win.ini \Windows application settings, desktop, user preferences. Applications often used separate.ini files 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows 9x Registry Windows XP Filename Location Content user.dat system.dat \Windows \Windows - and - \Windows\profiles\user User-specific information. There is a different file for each user plus a main default one Protected storage area for all users, all installed programs and their settings, system settings In Windows XP, Microsoft expanded the Registry quite considerably by adding many of the features from Windows NT Windows NT was their high-end operating system designed to be secure and robust Windows 95/98/ME were designed to run older software legacy support 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows XP Registry Windows 7/8/10 Registry Filename Location Content Filename Location Content ntuser.dat \Documents and Settings\user User-specific information. Different file for each user. ntuser.dat \Users\username User-specific information. Different file for each user. Default \Windows\system32\config System settings Default \Windows\system32\config System settings SAM \Windows\system32\config Security account management SAM \Windows\system32\config Security account management Security \Windows\system32\config Security settings Security \Windows\system32\config Security settings Software \Windows\system32\config All installed programs and their settings Software \Windows\system32\config All installed programs and their settings System \Windows\system32\config System settings System \Windows\system32\config System settings 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
4 Logical Registry Design Registry Logical Design Different files? Different versions? How does it make sense? The Registry is stored differently depending on the version of Windows However, for applications, the information is always presented in the same format This allowed the Registry to evolve smoothly over time 7/23/2018 Sacramento State - Cook - CSc Summer Windows Registry Elements Windows Registry Elements Data is organized into a logical tree Information it organized into 5 different hives Some of the hives are collections of data in other hives so they are "virtual" Keys / Subkeys Defines the structure of the registry Similar to folders in a file system Values the data for each subkey String (REG_SZ) - Single line string value Binary (REG_BINARY) Series of bytes DWORD (REG_DWORD) Double word - 4 bytes Multi-string (REG_MULTI_SZ) - Multiple line string Expandable string (REG_EXPAND_SZ) 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry Hives Registry Hives HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USERS HKEY_CURRENT_CONFIG HKEY_LOCAL_MACHINE (HKLM) contains hardware, drivers, start-up data, services, and machine-specific application data most applications will store global settings here HKEY_USERS (HKU) contains information about each user including their folders and user-registry file required to locate actual user registry file 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
5 Registry Hives Registry Hives: Merged Views HKEY_CURRENT_USER (HKCU) once a user logs in, this key will contain the information from their registry file ntuser.dat applications, that want to store user-specific data, read and write to this key Why? Apps don t need to know *the* user, just the current one Nearly identical to HKEY_LOCAL_MACHINE HKEY_CLASS_ROOT (HKCR) classes can be user-specific or applied to all users contains merged view of two hives: HKEY_LOCAL MACHINE\SOFTWARE\Classes HKEY_CURRENT_USER\SOFTWARE\Classes HKEY_CURRENT_CONFIG (HKCC) information about how the system was booted contains merged view of two hives: HKEY_LOCAL MACHINE\SOFTWARE HKEY_LOCAL MACHINE\SYSTEM 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows Registry Security Windows Security and Relative ID Security is set by Registry permissions in Windows 2000, regedt32.exe must be used in Windows XP, regedit.exe can also be used. Two basic permission available Read Only Full Control By default, only the System and Administrators: have full control permissions can also create specific permissions Windows Registry uses a alphanumeric combination to identify a security group Security ID (SID) identifies the computer system SIDs are assigned by the Domain Controller S /23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Windows Security and Relative ID Dissecting a SID Relative ID (RID) part of the SID used to identity the specific user on the computer system It is the last part of the SID SID version Domain or Local Computer S S Authority Relative ID 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
6 Why Is Mr. Cook Obsessed with Windows? Registry Forensics Windows is the main operating system used on home computers So, by a large margin, seized computers will What is the market share? market share is hard to measure the best avenue is to look at browser usage Some things to look for 7/23/2018 Sacramento State - Cook - CSc Summer Platforms: June 2017 Editing the Windows Registry Approximately 90.5% use Windows Windows XP 5.7% Windows % Windows 8 6.7% Windows % Approximately 7.8% use Macintosh Approximately 1.8% use Linux Two native Windows Registry editors available Regedt32.exe Regedit.exe These were merged in Windows XP 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Difference Between Live and Offline Registry No HARDWARE hive Located in HKLM (HKEY_LOCAL_MACHINE) Dynamic key - created at when Windows boots No virtual hives HKCU (HKEY_CURRENT_USER) is actually content in ntuser.dat You must search for the correct SID key under HKEY_USERS Some System Info You Can Get Computer name Dynamic disks Install dates Last user logged in Mounted devices Windows OS product key Registered owner Programs run automatically System s USB devices 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
7 User-Specific Evidence Registry Forensics ntuser.dat (HKEY_CURRENT_USER) is a great source of evidence Note: everything the computer remembers between sessions is in the registry! So, anything that Windows remembers for you, it also will remember for the suspect All registry keys contain last modified time-stamp so, you can tell what and when not visible with regedit there are tools for reading this Registry also records all devices that have ever been connected to the computer 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: MSN Messenger Registry: MSN messenger Some obtainable evidence IM groups, contacts, Location of message history files Location of saved contact list files Values are stored in REG_BINARY (bytes) this is actually Unicode Text dead giveaway is the pattern: ## 00 ## HKEY_CURRENT_USER/Software/Microsoft/MSNMessenger 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: MSN messenger Always Search for MRU HKEY_CURRENT_USER/Software/Microsoft/MSNMessenger Many applications keep a list of our Most Recently Used (MRU) files Registry location and format varies greatly between applications So, search the registry for the following keywords: MRU LRU Recent 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
8 Always Search for MRU Always Search for MRU Applications tend to read all the entries, re-sort them and then rewrite them all so date-stamps will often all be the same as the most recent file Windows also keeps a MRU on files These are the files you double-click on using explorer (the front-end GUI of Windows) It maintains a list for every extension! HKEY_USERS\UserSID\Software\Microsoft\ Windows\CurrentVersion\Explorer\RecentDoc 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer More MRU Information MRU In Windows 7 Windows uses an window called Common Dialog for selecting a file to open/save This is window that pop-ups, for instance, when you click save in Word This tool remembers up to the last 26 files for every file type you use naturally, this is in the registry stored in REG_BINARY format registry format changed in Windows 7 and 10 HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Explorer\ComDlg32 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer MRU In Windows 7 Registry: Internet Explorer HKEY_CURRENT_USER/Software/ Microsoft/Windows/CurrentVersion/Explorer/ComDlg32 Some obtainable evidence IE auto logon and password IE search terms IE settings Typed URLs Auto-complete passwords 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
9 Registry: Internet Explorer: Typed URLs Registry: IntelliForm HKEY_CURRENT_USER /Software/Microsoft/Internet Explorer/TypedURLs IntelliForm is a built-in feature of Windows utilized by Internet Explorer Also called auto complete Allows Windows to remember fields on web page forms Stored in the registry under Protected Storage System Provider 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Protected Storage System Provider Protected Storage System Provider Protected Storage System Provider only visible to the system account located in NTUSER.DAT \Software\Microsoft\Protected Storage System Provider Various tools will reveal contents AccessData Registry Viewer Windows Secret Explorer Cain & Abel Protected Storage PassView HKEY_CURRENT_USER\Software\ Microsoft\Protected Storage System Provider 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Installed Software Uninstalled Software You can find both software that is currently installed a system Keys are usually created with installation You can also determine if software was uninstalled Keys are usually created with installation are often not deleted HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\App Paths HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\Uninstal 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
10 Last Login Last Login Windows keeps track of the last user to log into the system You can use this: to determine who was on the computer last when this was using Registry time stamps (should be consistent with other time stamps) if they logged into Windows a suspect may have used a boot disk HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows NT\CurrentVersion\WinLogon 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: Mounted Devices Device History Yes, the Registry stores that too! Applications can talk to devices assigned volume letters such as: C:, D:, etc Letter is actually mapped to a piece of hardware e.g. hard drive, CD-ROM, USB drive, etc 7/23/2018 Sacramento State - Cook - CSc Summer Registry: Mounted Devices Globally Unique Identifiers The registry contains this information and how each letter maps to a device So, for instance, when Microsoft Word, wants to save something to E: Windows looks up the letter in the Registry and sends it to the correct device Windows, records all mounted devices using a Globally Unique Identifiers (GUID) These are hash values created by Windows and used for almost everything Why use them for devices? applications may want to talk to a specific device regardless of its letter. also, letters can be changed. 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
11 Registry: Mounted Devices Registry: Mounted Devices HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\MountedDevices HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\MountedDevices 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer When a USB Device is Plugged in. Windows PnP (plug and play) is notified by the port Windows asks the device for its name, serial value, etc Windows then creates a unique value of the device, locates the correct driver, and updates the registry This process is also saved in the SetupAPI Log file Registry: USB Devices Registry also records all USB devices that have ever been connected to the computer This information is enumerated in its own location in the Registry Using time-stamps, you can tell when a suspect USB Drive was connected This can be used to verify timelines or show evidence of data theft 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer Registry: USB Device History Registry: USB Devices HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Enum\USBSTOR You can map information in "USBStor" with "MountedDevices" to find what drive letter was used It can be a tad complicated. fortunately, there are many tools, like USBDeview, that can interpret the data for you and give nice reports however, you must understand the format for verifying these tools accuracy in Court 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
12 USBDeview Date! 7/23/2018 Sacramento State - Cook - CSc Summer /23/2018 Sacramento State - Cook - CSc Summer
Description of the Microsoft Windows Registry
Page 1 of 5 Microsoft Knowledge Base Article - 256986 Description of the Microsoft Windows Registry The information in this article applies to: Microsoft Windows Server 2003, 64-Bit Datacenter Edition
More informationWEEK 2.0. Any sufficiently advanced technology is indistinguishable from magic.
WEEK 2.0 Any sufficiently advanced technology is indistinguishable from magic. Recycler A recycle bin for each user Created upon file deletion Only for RB aware programs ie Office, not command line tools
More informationLesson 2: Editing the Registry
Lesson 2: Editing the Registry Lesson 2 Editing the Registry 4-15 Windows XP Professional stores hardware and software settings centrally in a hierarchical database called the Registry, which replaces
More informationWindows Registry Analysis
Windows Registry Analysis Omveer Singh Additional Director / Scientist E omveer@cert-in.org.in Cyber Forensics Lab Indian Computer Emergency Response Team (CERT-In) Department of Information Technology
More informationLegal Notices. AccessData Corp.
Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
More informationA+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 11 Optimizing Windows
Chapter 11 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows to improve performance Learn how to manually remove
More informationCOPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1
Chapter 1 What Is a Registry and Why? Some users of Windows know exactly what the registry is a system designed to cause users and administrators to lose their hair. I know this is true because I can no
More informationIntroducing. the Registry. In This Part. CHAPTER 1 Introducing the Registry CHAPTER 2 Using the Editors to Inspect and Modify.
sample.qxd 3/14/2000 3:36 PM Page 1 P A R T O N E Introducing the Registry In This Part CHAPTER 1 Introducing the Registry CHAPTER 2 Using the Editors to Inspect and Modify the Registry CHAPTER 3 Putting
More informationTweaking the Windows 7 Registry
CHAPTER 12 Tweaking the Windows 7 Registry IN THIS CHAPTER. Firing Up the Registry Editor. Getting to Know the Registry. Understanding the Registry Files. Keeping the Registry Safe It is almost everywhere
More informationRegForensicTool: Evidence Collection and Analysis of Windows Registry
RegForensicTool: Evidence Collection and Analysis of Windows Registry Dinesh N. Patil 1, Bandu B. Meshram 2 Veermata Jijabai Technological Institute Matunga, Mumbai, India dinesh9371@gmail.com 1, bbmeshram@vjti.org.in
More informationSession 26 Backup/Restore and The Registry
Session 26 Backup/Restore and The Registry Nassau Community College ITE153 Operating Systems 1 Overview Set Up a Backup Five Types of Backup Volume Shadow Copy Best Practices The Registry Required: Windows
More informationACCESSDATA SUPPLEMENTAL APPENDIX
ACCESSDATA SUPPLEMENTAL APPENDIX Steps for Decrypting IntelliForms Data in Windows Vista This appendix reviews the process required to decrypt the protected information located in the IntelliForms subkey.
More informationRegistry Functions. Each of the W/32 registry functions has a syntax of the form: CALL creg ( key%,, ADDROF(result%) )
Registry Functions Introduction The registry is a system-defined database that applications and Microsoft Windows system components use to store and retrieve configuration data. This appendix to the W/32
More informationRegistry Artifacts. Villanova University Department of Computing Sciences D. Justin Price Spring 2014
Registry Artifacts Villanova University Department of Computing Sciences D. Justin Price Spring 2014 REGISTRY The registry is a central hierarchal database intended to store information that is necessary
More informationThe introduction of Windows 8 was a big change for Microsoft s traditional operating
A Comparison Between the Windows 8 & Windows 7 Registries Matthew Brewer B.S., Dr. Terry Fenger, Corporal Robert J. Boggs, Christopher Vance B.S. Marshall University Forensic Science Center, Huntington,
More informationIdentity, Authentication, and Access Control
Identity, Authentication, and Access Control License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
More informationA+ Certification Guide. Chapter 15 Troubleshooting and Maintaining Windows
A+ Certification Guide Chapter 15 Troubleshooting and Maintaining Windows Chapter 15 Objectives STOP (Blue Screen of Death) Errors: Discover what a BSOD is, typical causes, how to diagnose Boot Failures:
More informationwindows maurizio pizzonia roma tre university
windows maurizio pizzonia roma tre university 1 references M. Russinovich, D. A. Solomon Windows Internals: Including Windows Server 2008 and Windows Vista 5 th ed. Microsoft Press 2 architecture overview
More informationn Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems
Outline n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems n Describe methods used to escalate privileges Chapter #5: n Describe methods used
More information1. Contents. b. Windows ME
1. Contents You should have the following items included in your Pocki-Drive order, pictured right: i - Pocki-Drive ii - Lid (attached to the Pocki-Drive) iii - Extension cable iv - Installation CD v -
More informationWindows Registry Forensics
Windows Registry Forensics Registry Definition The Microsoft Computer Dictionary defines the registry as: A central hierarchical database used in the Microsoft Windows family of Operating Systems to store
More informationA+ Guide to Managing and Maintaining Your PC, 7e. Chapter 14 Optimizing Windows
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 14 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows
More informationChapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS. 1. Introduction. Harry Velupillai and Pontjho Mokhonoana
Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.
More informationDeploy Registry Settings Office 2010 to be used as an internal resource only
Deploying Custom Registry Settings for Office 2010 If you are planning to customise your Office 2010 deployment significantly, then at some point, you will more than likely need to make changes to the
More informationGuide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems
Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic
More informationPassword Changer User Guide
Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationManagement Mechanisms
Chapter 4 Management Mechanisms This chapter describes three fundamental mechanisms in Microsoft Windows that are critical to the management and configuration of the system: The registry Services The Registry
More informationUSMTGUI - User guide for backup and restore of local and Domain user profiles
USMTGUI - User guide for backup and restore of local and Domain user profiles Easy transfer of User Profiles from one PC to another. Save data to USB hard disk or network and restore to the new PC In this
More informationABSTRACT. In Windows Operating system, Registry is core component and it contains
ABSTRACT In Windows Operating system, Registry is core component and it contains significant information which is useful for a forensic analyst. It is a repository of the central database in a hierarchal
More informationMicrosoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010
Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.
More informationA+ Guide to Managing and Maintaining Your PC. Managing and Supporting Windows XP
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 16 Managing and Supporting Windows XP Security Using Windows NT/ 2000/XP Goals Secure system resources including hardware and software
More informationPhotoPDF User Guide. PhotoPDF. Photo to PDF Converter
PhotoPDF Photo to PDF Converter PhotoPDF is a batch-processing tool to convert photos into PDF file. PhotoPDF provides three modes of conversion: Batch Convert, Photos Merge and Thumbnail Page. PhotoPDF
More informationDigital Forensics. Module 6 CS 996
Digital Forensics Module 6 CS 996 Module #5 Covered B of A case; corporate responsibility for security New security standards: NIST 800-53 and ITIL Another new security standard: ISF Standard of Good Practice
More informationContains over 60 Registry Tweaks, Cheats and Hacks
Contains over 60 Registry Tweaks, Cheats and Hacks For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access
More informationLet s Tune Oracle8 for NT
Let s Tune Oracle8 for NT ECO March 20, 2000 Marlene Theriault Cahill Agenda Scope A Look at the Windows NT system About Oracle Services The NT Registry About CPUs, Memory, and Disks Configuring NT as
More informationServer. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2
Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,
More informationGlobal Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationRemote Access Forensics for VNC and RDP on Windows Platform
Edith Cowan University Research Online Australian Digital Forensics Conference Conferences, Symposia and Campus Events 2010 Remote Access Forensics for VNC and RDP on Windows Platform Paresh Kerai Edith
More informationThe customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system.
In this Article: Preparing a The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. Customer.inf setup is a comprehensive installation
More informationHow To Clean Your Registry Manually Xp Hard Drive On A Windows
How To Clean Your Registry Manually Xp Hard Drive On A Windows Unfortunately, many of these claims are false and could actually cause your computer more harm. The Windows registry is basically a really
More informationDigital Forensics. Module 7 CS 996
Digital Forensics Module 7 CS 996 Module #6 Covered Using Autopsy Using Helix 3/30/2005 Module 7 2 Outline of Module #7 Review mid-term Helix presentation Forensic business news Gates v. Bando case Linux
More informationVersion 3.50 / 04/15/2009
Version 3.50 / 04/15/2009 Copyright 2006 2009 Mindleads Technology UltraLogon user manual 1 / 47 Contents Copyright... 3 Document Conventions... 4 Icons... 4 Typographic Conventions... 4 Introduction...
More informationNetIQ Advanced Authentication Framework - Citrix XenDesktop Plugin. Installation Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Citrix XenDesktop Plugin Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Installing
More informationIEDigest V Jean-Pierre Regente Jean-Pierre Regente. ( All rights reserved )
IEDigest V1.1.0 Jean-Pierre Regente http://www.iedigest.com 2011 Jean-Pierre Regente ( All rights reserved ) Table of Contents What is it?... 3 Differences to other tools... 3 User interface... 4 Home...
More informationinfoxpert Support Article
infoxpert Support Article Version Date: March 2011 infoxpert Version: infoxpert Version 8.0.43 and above. Document Distribution This document is of a technical nature and is targeted to I.T. staff. Details
More informationHow To Remove Windows 7 Genuine Advantage Notification From Registry
How To Remove Windows 7 Genuine Advantage Notification From Registry review(s) for the wga removal tool for windows 7. Review by:vik.leonova Update? Remover 1.5? Download Now Genuine Advantage Notification
More informationChapter. Configuring the Windows 2000 Environment MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER
Chapter 4 Configuring the Windows 2000 Environment MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Implement, manage, and troubleshoot disk devices. Install, configure, and manage DVD and CD-ROM devices.
More informationInterview Room Management System Administrator Manual
Technical Support Interview Room Management System Administrator Manual www.casecracker.com support@casecracker.com (720) 442-7072 Table of Contents 1. System Overview 1 2. Users and Groups 1 3. Setup
More informationA+ Guide to Managing and Maintaining Your PC. Supporting Windows 9x
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 12 Supporting Windows 9x Windows 9x Architecture 2 Windows 9x Architecture (continued) 3 Windows 9x Architecture (continued) 4 Virtual
More informationA+ Chapter 11 Test (2.0) True / False Indicate whether the statement is true or false.
True / False Indicate whether the statement is true or false. 1. Windows Task Scheduler can be set to launch a task or program at a future time, including at startup. 2. You do not have to be logged on
More informationLab 03. Windows Operating Systems (Cont.)
Lab 03 s (Cont.) Objectives Develop a good understanding of 1. The role of an operating system in a computer system 2. Services provided by an operating system and have some hands on experience in 1. Understanding
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationATTENTION!!! Please be sure this document is delivered to the network administrator who will be installing Network WYNN!!
ATTENTION!!! Please be sure this document is delivered to the network administrator who will be installing Network WYNN!! Network WYNN 3.1 Installation Documentation November 2003 The following information
More informationInstalling Applications on Windows Terminal Server
Installing Applications on Windows Terminal Server Network Station Education IBM NCD June 1999 01/31/00 v2r1wtseapplications.prz Copyright IBM Corp. 1998 - Course materials may not be reproduced in whole
More informationWindows Xp Cannot Change Desktop Wallpaper Registry
Windows Xp Cannot Change Desktop Wallpaper Registry Looking for a way to delete desktop wallpapers from your Windows PC? Windows 10 has another set of newly created wallpapers that will be shipping In
More informationRTE for WIN32. Installation Manual (Rev.7.0) Midas lab
Midas lab REVISION HISTORY Date Revision Chapter Explanation of revision March 11,2000 4.0 RTE4W32 Ver.5.0 (First edition) January 10,2002 4.1 Add Windows XP support (RTE4W32 Ver.5.05) October 29,2002
More informationExam : Title. : A+ OS Technologies
Exam : 220-302 Title : A+ OS Technologies QUESTION 1 Under Windows 2000 you consistently receive out of memory messages when running multiple applications. To avoid having to upgrade RAM immediately you?
More informationWindows Artifacts as a part of Digital Investigation
Windows Artifacts as a part of Digital Investigation Divyang Rahevar, Nisarg Trivedi Institute of Forensic Science Gujarat Forensic Sciences University Gandhinagar, Gujarat India divurahevar@gmail.com,
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationChapter 6: Connecting Windows Workstations
Chapter 6: Connecting Windows Workstations 153 Chapter 6 Connecting Windows Workstations Because this is a book about using Linux on a Microsoft Windows-based network, this chapter shows you how to connect
More informationAdafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi
Adafruit's Raspberry Pi Lesson 1. Preparing an SD Card for your Raspberry Pi Created by Simon Monk Last updated on 2016-12-03 03:20:15 AM UTC Guide Contents Guide Contents Overview You Will Need Downloading
More informationWindows 2000 System Administration Handbook, 1/e
Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5
More informationBridge Cable User s Guide
Bridge Cable User s Guide Table of Contents Overview -------------------------------------------------------------------- 2 Driver Installation --------------------------------------------------------
More informationHow To Change What Programs Run At Startup Windows Xp Professional
How To Change What Programs Run At Startup Windows Xp Professional Steps on how to prevent Windows programs from automatically loading every time your Within the Run folder you should be able to locate
More informationSuper USB. User Manual. 2007, March
Super USB User Manual 2007, March Windows98 Driver Install/Uninstall Driver Install: 1. Execute Win 98 UFD driver, then restart PC. 2. Plug Super USB into an available USB port. A new Removable Disk drive
More informationContact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday
Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10
More informationSERVICE2000 QUICK START
SERVICE2000 QUICK START Installation Guide for Release 8 Table of Contents Introduction 2 System Requirements 2 Preparation - All Editions 2 Installation - Single User Edition 3 Installation - Network
More informationModule 9 Lab Host System Hardening
Background: This Lab reinforces the concepts of host system hardening. Students will discover vulnerabilities of systems and then apply techniques to harden and secure them. Requirements/assumptions: Windows
More informationEasy Windows Working with Disks, Folders, - and Files
Easy Windows 98-3 - Working with Disks, Folders, - and Files Page 1 of 11 Easy Windows 98-3 - Working with Disks, Folders, - and Files Task 1: Opening Folders Folders contain files, programs, or other
More informationDissecting Files. Endianness. So Many Bytes. Big Endian vs. Little Endian. Example Number. The "proper" order of things. Week 6
Dissecting Files Endianness Week 6 The "proper" order of things So Many Bytes So Many Bytes On a 32-bit system, each word consists of 4 bytes So, when any 32-bit value is stored in memory, each of those
More informationRecent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004
Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and
More informationWindows Core Forensics Forensic Toolkit / Password Recovery Toolkit /
The Windows Forensics Core Training follows up the AccessData BootCamp training. This advanced AccessData training class provides the knowledge and skills necessary to use AccessData products to conduct
More informationI can do that to my computer?
I can do that to my computer? A brief class in troubleshooting your personal computer Phone: 392-3900 Email: training@vpha.health.ufl.edu TECH SKILL SOLUTIONS FOR THE HEALTH SCIENCE CENTER I can do that
More informationHow To Fix Regedit Windows Xp With Disk Boot Failure
How To Fix Regedit Windows Xp With Disk Boot Failure Get the fix to "Status: 0xc000000f" boot error for Windows XP, Vista, 7, 8 or 8.1 errors with the disk, partition, bootsector, filesystem, bootloader,
More informationPart I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL
Part I Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Chapter 1 What s New in Windows XP? Windows XP suffers somewhat from a dual personality. In some ways it is a significant release,
More informationWindows 10 Registry AGENDA. What is the Registry? About Dan Purcell. Copyright Dan Purcell 2014
Windows 10 Registry Copyright Dan Purcell 2014 What is the Registry? AGENDA About Dan Purcell 1 What is the Registry? AGENDA Basic Registry Terminology & Structure Physical v. Logical Date & Time Formats
More informationVersion 11. NOVASTOR CORPORATION NovaBACKUP
NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationSAP GUI 7.30 for Windows Computer
SAP GUI 7.30 for Windows Computer Student and Faculty Installation Instructions Table of Contents Caution:... 2 System Requirements:... 2 System Memory (RAM) requirements:... 2 Disk Space requirements:...
More informationHow To Force Restore A Computer That Won Boot Up After System
How To Force Restore A Computer That Won Boot Up After System If your computer won't start up normally, you may need to use a disk repair utility This can occur after an improper shutdown, forced restart,
More informationChapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.
Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems
More informationSafe Mode: Solve Startup Problems & Crashes S 3/1. Solve (Almost) Any Problem Your Computer May Have
Safe Mode: Solve Startup Problems & Crashes S 3/1 Solve (Almost) Any Problem Your Computer May Have If your PC refuses to start or keeps crashing for some unknown reason, Safe Mode is often your last resort.
More informationSharePoint: Fundamentals
SharePoint: Fundamentals This class will introduce you to SharePoint and cover components available to end users in a typical SharePoint site. To access SharePoint, you will need to log into Office 365.
More informationEntraPass (W10) Installation Guide Kantech-OnBoard systems
Overview Purpose ExacqVision recorders now include Kantech EntraPass Corporate Edition software. The purpose of this document is to guide the technician or installer through the process of installing and
More informationLab E2: bypassing authentication and resetting passwords
Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and
More informationRequired software. Mac OS X In this section, you ll find instructions for downloading and configuring the Arduino IDE in Mac OS X.
Required software You should be able to program your Arduino with just about any computer using a piece of software called an integrated development environment (IDE). To run this software, your computer
More informationHow To Fix Regedit Windows Xp Installation >>>CLICK HERE<<<
How To Fix Regedit Windows Xp Installation Bootable Usb Drive If Windows is able to boot, use System File Checker and icacls.exe to repair To put Windows XP installation media onto a bootable USB drive
More informationNot For Sale. Offline Scratch Development. Appendix B. Scratch 1.4
Appendix B Offline Scratch Development If you only have occasional access to the Internet or your Internet access is extremely slow (aka 56k dial-up access), you are going to have a difficult time trying
More informationCURA Machine Setup Guide
CURA Machine Setup Guide CURA Technical Support Email: cura_support@mindscope.com Phone: 1.888.322.2362 x 555 CURA Machine Setup Guide Page 2 Table of Contents INSTALLATION GUIDE AND MACHINE SETUP... 3
More informationConfiguring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3
Configuring GNS3 for CCNA Security Exam (for Windows) Software Requirements to Run GNS3 From Cisco s website, here are the minimum requirements for CCP 2.7 and CCP 2.8: The following info comes from many
More informationjv16 PowerTools 2017 Manual
1. Home... 4 1.1 System health score compare... 4 1.2 System Health... 4 1.3 Privacy... 4 1.4 Registry Integrity... 4 1.5 System Startup Times... 4 1.6 Check for vulnerable software... 4 1.7 About jv16
More informationAccessData AD Lab Release Notes
AccessData AD Lab 6.2.1 Release Notes Document Date: 4/24/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this
More informationXP: Backup Your Important Files for Safety
XP: Backup Your Important Files for Safety X 380 / 1 Protect Your Personal Files Against Accidental Loss with XP s Backup Wizard Your computer contains a great many important files, but when it comes to
More informationVeritas NetBackup Backup, Archive, and Restore Getting Started Guide. Release 8.1.2
Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Release 8.1.2 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Last updated: 2018-09-19 Legal Notice Copyright 2017
More informationPHRED Installation Guide
PHRED Installation Guide ColdFusion Version 10, SQL Server Database January 27, 2014 PHRED Installation Guide Page 1 Table of Contents Application Environment... 3 Application Tailoring... 4 Web Server
More information10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it?
Live Acquisition Objectives Understand what Live Acquisition is and when it is appropriate Understand the concept of Order of Volatility Understand live acquisition issues and limitations Be able to perform
More informationWimba Pronto. Version 2.0. User Guide
Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto
More informationHow to install Virtuoso Chromeleon Integration Software! Only valid for Microsoft Windows 7 64bit version!
How to install Virtuoso Chromeleon Integration Software! Only valid for Microsoft Windows 7 64bit version! 1. You need Chromeleon 7.2 SR1 Muc installed on your computer 2. Install PI Gateway software (gatewayssetup.msi)
More informationADOBE DREAMWEAVER CS4 BASICS
ADOBE DREAMWEAVER CS4 BASICS Dreamweaver CS4 2 This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,
More informationInstallation guide for Choic Multi User Edition
Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL
More informationeggplant v11.0 Mac OS X EggPlant: Getting Started
eggplant v11.0 Mac OS X EggPlant: Getting Started Copyright 2011 TestPlant Inc. Eggplant: Getting Started Trademarks Eggplant, the Eggplant logos, TestPlant, and the TestPlant logo are trademarks or registered
More information