Imaging Terms The following terms are encountered when discussing the imaging process of storage media such as hard drives, flash drives, files, phone

Size: px
Start display at page:

Download "Imaging Terms The following terms are encountered when discussing the imaging process of storage media such as hard drives, flash drives, files, phone"

Transcription

1

2 Imaging Terms The following terms are encountered when discussing the imaging process of storage media such as hard drives, flash drives, files, phones, and more. Hash: A unique numerical identifier generated by a mathematical algorithm to verify that an image is identical to the source media (hash verified). Once an image is completed, the next step in the process is hash verification to make sure the forensic image contains an exact copy of the data being copied. The first hash is generated against the evidence and a second hash is generated against the completed forensic image. At the end of the imaging process, the two hashes are compared. If the hashes match, the image is verified and forensically sound. A hash can be calculated using many different algorithms such as MD5, SHA1, and SHA256. Image: A verified forensic copy of digital data. Usually compressed and created using various tools depending on the device. Sometimes referred to as an acquisition, collection, or extraction. An image is commonly observed in.e01 format due to the wide support for the format. An image can be thought of as a container that holds and protects all of the data pulled from a device. It can be password protected. Images can be segmented in specified chunks (we often split our.e01 images into 2 GB segments). Physical Image: A bit-by-bit 1:1 direct copy of a physical storage device. Includes all files, folders, unallocated space, free space, and slack space. Includes live and deleted files. Physical images are the most common type of image on computers and drives. It is very uncommon when dealing with mobile phones. Physical images will often be.e01 format when compressed (most common) or.001,.bin,.dd (not compressed increasingly uncommon).bin files are common when dealing with physical images of mobile phones. Logical Image: A forensic copy of all live or non-deleted data on a hard drive or other media. Typically, a logical image captures what you would see when browsing your computer. Typically, free space, deleted files, and fragments will not be captured. For instance, when creating a logical image of a computer with a 500 GB hard drive and 100 GB are in use to store files, the resulting image will be 100 GB uncompressed only captures the space on a storage medium in use. Found in.ad1 and.l01 logical formats (FTK and EnCase respectively). Targeted Image: A targeted copy of specific folders and/or files. Much like a Logical Image, a targeted image captures live, non-deleted data. This is often used when needing to preserve specific files on a computer without collecting the entire hard drive. This results in a much faster imaging process. Live Data: Also known as active data, these are files that are not deleted and can be collected using all imaging methods. Live data resides in allocated space on a disk. Deleted Data: Data residing within free space. When a file is deleted, the space on the disk in which the file resides is marked as free or available to new writes and it is removed from view. This

3 tells the operating system that this space can now be used to write new data. Allocated Space: The space on a storage medium in use by the operating system where files reside. When a file is created, an operating system such as Windows will look for free space within the allocated space of the drive. Unallocated Space: Space on a storage medium that is not allocated or in use by the operating system (not used for storing files). Even when formatting a hard drive, the data that was lost might still persist within unallocated space. Free Space: Available space on a storage medium where data can be stored. New files are written onto free space. Storage Medium: Anything that stores digital data flash drives, hard drives, CDs, DVDs, SD cards, and more fall into this category (drive, disk, disc). Data can be stored and retrieved. Slack Space: The unused space at the end of a file in a file system that uses fixed size clusters (so if the file is smaller than the fixed block size then the unused space is simply left unused). Often contains deleted information from previous uses of the block. Parsing: The largely automated process of sorting, organizing, and translating data. Many forensic tools will parse a forensic image and provide easy to review results after sorting most data into categories or plotting data into rows and columns. File System: Used to control how data is stored and retrieved on a storage medium. Often responsible for maintaining metadata such as creation dates and location. Partition: A section of a disk used to store data. A single hard drive can be partitioned into several partitions. Each partition usually serves a distinct purpose. Windows will commonly split a hard drive into several partitions: Boot, OS, and Recovery. Each partition is independent of the others. Mounting: The process of taking a forensic image or drive and loading it into the Windows environment through a mounting tool for the purpose of imaging or review. For instance, an image of a computer can be mounted, and its contents browsed within Windows Explorer as if it were a drive that was plugged in. Live Image: An image performed when a computer is powered on. Normally, a hard drive is removed to create an image to avoid changing data on the evidence. However, in civil matters where document preservation and collection is needed, it is common to run lite (non-installing) software like FTK Imager on the evidence computer and create a forensic copy of the evidence onto an external drive plugged into the evidence computer. Live imaging is also useful when the computer is encrypted. Restore: A restore is a forensic image of a computer that has been restored to a hard drive. This is useful when a client wants to browse through the preserved computer folder structure and files without making changes to the original evidence. The image is often restored to an external drive and allows the client to plug the drive in and browse it. Write block: A software or hardware tool used to prevent changes to evidence media when connecting it. Prevents the examiner from making changes to the evidence when creating the forensic image. Verify: A term used to refer to the hashing of both source media and acquired image to verify the accuracy of the copy.

4 Volume: A volume is anywhere data can be stored on a device. A keyboard can be plugged into a computer via USB but cannot store data. However, a flash drive plugged into a computer via USB contains a volume to store data. Hash Value: Hash values can be computed for individual files. This is a unique string and any change, no matter how small, to the file will result in a drastically different hash value. Hash values are used to validate files or detect changes in a copy. Random Access memory (RAM): RAM is physical storage used by a computer that can be accessed quickly. However, it is volatile and will not survive a reboot or loss of power. When imaging VM or RAM, it is important to capture this prior to powering off the device. The computer will use RAM space to store information as it performs different jobs. It is common to find documents or passwords in RAM. Virtual Memory (VM): Virtual RAM is stored on a hard drive to provide a temporary space for data from RAM to reside until it is needed again by a program. When the physical RAM fills up, data is swapped from the VM to the physical RAM. (sometimes referred to as Swap Space) Example: Pagefile. sys on Windows. These files can be parsed for data. Clone: Duplicating the contents of a disk to another. Forensic Software Tools The following tools are industry-standard and widely used by law enforcement and the private sector. These tools are proven to be reliable and produce consistent defensible results. No tool can cover everything - it is common to use multiple tools for a case. Some of these tools can be used to create forensic images as well. AccessData s FTK Forensic Tool Kit: A powerful digital analysis program that processes and indexes data from a variety of sources and formats. It allows us to take a forensic image of a computer and process it. Once processed, an examiner can conduct searches, filter data, and view deleted data. FTK is often used to cull data prior to ingestion in ediscovery platforms such as Relativity. FTK is capable of reporting findings in Excel format, PDF, HTML, and more. It is incredibly powerful and versatile and the preferred industry tool. Guidance Software s EnCase: Much like FTK, EnCase processes and indexes data for searches and analysis. Many examiners use one or the other even both. Your IST forensic collections team is certified in FTK. Magnet s Axiom: Previously known as IEF (Internet Evidence Finder), Axiom is the leading web data analysis tool. Axiom processes forensic images and other data sources and parses data related to web activity such as web history, web cookies, downloaded history, web chat, webmail, and more. Axiom also simplifies the process of analyzing commonly encountered system artifacts like USB history and document history. Axiom allows for reporting in load files, PDF, Excel, HTML, and more. Cellebrite UFED: Sometimes referred to as UFED, Touch Ultimate, or UFED 4 PC, Cellebrite is a powerful mobile device collection and analysis tool. Cellebrite is capable of extracting data from phones, tablets, GPS units, drones, and more. It is capable of several types of extractions and provides a powerful review environment to conduct analysis. Cellebrite stores most extractions in.ufd,.zip, and

5 .BIN formats. Cellebrite offers powerful reporting of data in various formats: Word, PDF, Excel, HTML, and UFED Reader (UFDR). Cellebrite comes in hardware and software versions. We use UFED 4 PC, the software version. This comes with several adapters and cords to connect to almost every pocket sized device released in the last 10 years. Note: We use the Forensic Cellebrite. Phone carriers like Verizon and T-Mobile commonly use scaled down versions of Cellebrite to transfer logical data from an old phone to a new phone. It does not operate as a forensic tool. Elcomsoft Phone Breaker: The name might be misleading it does not break anything. Rather, it allows us to break password protection on phone backups. Simple passwords can be cracked within minutes or hours. Complicated passwords can take weeks, months, or even years! This tool is also used to pull icloud backups of Apple devices from the cloud. It allows us to access a custodian s icloud account (credentials required). The downloaded backups are parsed within Cellebrite for analysis and production. Oxygen Forensic Suite: A mobile device forensic program. Generally lacking in comparison to Cellebrite, Oxygen is capable of extraction and analysis of mobile devices. Oxygen stores extracted mobile phone data in.ofb format which then is usually converted to a Cellebrite friendly format. Autopsy: A free, light weight digital forensic platform. Capable of processing, carving, and searching. Aid4Mail: A versatile preservation and conversion tool. Aid4Mail allows us to pull from a variety of sources and domains. Once collected, Aid4Mail can convert the data into a.pst file for ingestion into Relativity. X-Ways: Another full-featured forensic suite like FTK and EnCase, X-Ways is able to process digital data from a variety of sources and is said to be less resource hungry. SIFT: Unlike the programs listed here, SIFT is an entire operating system that runs within Linux. It is comprised of several free tools and is popular with law enforcement agencies and the private sector. Arsenal s Registry Recon: A powerful registry parser. Much of Windows configurations for both the system and the user are stored into the framework of Windows called the registry. This tool makes it easy to review the information embedded with the Registry and produce reports. XRY: A hardware + software combo, XRY is used to extract and analyze data from mobile devices, much like Cellebrite and Oxygen. BlackBag s BlackLight: A powerful forensic analysis platform much like FTK and EnCase, BlackLight can handle evidence from multiple sources. The big difference between BlackLight and the other tools is its ability to parse Apple computer (Mac) images with more intelligent parsing. AccessData s Mobile Phone Examiner (MPE): MPE is AccessData s answer to Cellebrite. Due to Cellebrite s dominance in the mobile phone forensic market, most other dedicated tools fall short. MPE, like other Cellebrite competitors, do not support nearly as many devices nor parse as many applications as Cellebrite. Paraben s Universal: Paraben is another company offering several tools that collect and parse most common devices. Paraben Universal is the FTK of Paraben, offering searching, processing, and more for most common device.

6 Griffeye: A new forensic software tool that processes data and enables intelligent analysis through the use of custom parsers and photo recognition AI. Offers various custom analytic tools within the platform. Forensic Hardware Utilities These tools help keep evidence safe when collecting data and improve the work flow of the forensic process. Tableau Bridge: is the Online sync client plus live query functionality. Live query functionality enables the maintenance of live connections between data sources published to Tableau Online and on-premises relational data. Bridges allow an examiner to connect a drive to a computer for imaging, analysis, and more while preventing writes or edits to the evidence. It is a rectangular phone sized device and functions as a bridge between a SATA hard drive and a computer. This bridge acts as a write blocker. IST uses the Tableau Bridge for forensic collections. Tableau Forensic Duplicator: Forensic duplicators are the hardware version of software imaging tools. They are travel-sized physical units the approximately the size of a modem. Evidence (source drive) is connected on one side (write-protected side) and the target drive to the opposite side (write side). The Tableaus can create clones of a disk, create images, and then verify the image. Tableaus are fast and reliable imaging solutions for SATA hard drives, external hard drives, USB devices like flash drives, and more. Tableaus have small LCD panels that display imaging progress and ETA for completion. It also provides a full forensic log of the imaging and verification process which is stored in the same folder as the image. It notifies you of errors, as well. There is also a touch screen enabled version (TD3). IST uses Tableau TD2u duplicators. Tableaus can also be used to forensically wipe drives. USB Write Blocker: Much like the Tableau Bridge, USB Write Blocker is a professional forensic tool for investigating USB mass storage devices, such as thumb drives and acts as a bridge between the USB devices and a computer to protect USB evidence when it is connected to a computer. This includes external drives and flash drives and is relied on by digital investigators, technicians, and IT staff. Wiebetech: Is a line of digital forensics, digital investigation, and IT tools used for remote investigations, ediscovery, and corporate security. External Drive: An external drive is a hard drive (HDD) or solid-state drive (SSD) that is connected to a computer on the outside rather than on the inside. This is where images are typically stored when creating images. Images are later archived to an encrypted volume. Once archived, the external drive is forensically wiped to remove any remnants of the image. Internal Drive: The primary storage device located inside a computer system. It usually contains preinstalled software applications, the operating system and other files. Most desktop computers have several internal hard drives, allowing them to provide greater data storage.. During forensic collections, internal drives may also be used to process evidence since internal drives tend to have faster write speeds.

7 Dedicated Imaging Tools While many tools listed in the Forensic Software section are capable of imaging storage mediums, these tools are crafted solely for imaging or aid in the process of imaging (mounting and write-blocking). FTK Imager: Very powerful but light weight imaging software. Generally placed on an external drive and plugged into the evidence computer, FTK Imager is able to create images in several formats of most devices. When creating remote images, we mail out the external drive with FTK Imager on it along with remote access software. FTK Imager can create logical, physical, and targeted verified images in.e01 and.ad1 format. FTK Imager can also open, browse, and mount images, or view deleted space within a drive or image. EnCase Imager: EnCase Imager can create images in.e01 and.l01 format. You cannot browse file content within an image using EnCase Imager. Arsenal Image Mounter: This tool allows us to mount images of several formats and define custom cluster size. Arsenal Image Mounting is used when other tools cannot handle problematic mounting situations. Paraben s P2 Explorer: A forensic image mounting tool designed to help investigators manage and examine evidence. With P2X Pro you can mount forensic images as read-only local logical and physical disks. BlackBag s MacQuisition: This tool resides on a USB dongle and is used to safely boot and acquire data from over 185 different Macintosh computer models in their native environment. This is the most reliable and most powerful Mac imaging tool on the market for the live data acquisition, targeted data collection, and forensic imaging of evidence. Windows Forensic Artifacts These terms are often encountered when discussing analysis the review of data once it has been collected and often processed within a forensic software within a Windows computer. LNK File: Also known as a Shortcut or Link file, LNK files provide quick access to another file such as a program or document. The LNK file records information about the file it is linked to and is only created if that file is opened from the computer or even external media like a flash drive. For instance, if a user opens a Word document, a LNK file is created that records the metadata of the Word document at the time of opening: Created Date, Modified Date, Access Date, location, and size. This LNK file updates each time the file is accessed. The LNK file itself is a real file that lives on the Windows computer. As a result, it too has metadata that reveals the first time a file was opened (The created date of the LNK file). This is summarizing LNK files in a general manner. Several nuances can apply.

8 JMP List: Jump Lists are a Windows Taskbar feature that gives the user quick access to recently accessed application files and actions. Jump Lists are tied to each of the applications. For instance, If you click and hold down on a program icon on your Start menu, a list of recently accessed files will populate on the screen for the respective application Users will have Jump lists for Microsoft Word listing several documents accessed and another list for Excel. The Jump list provides access to historical records of accessed files, even if the file has been deleted or existed on an external drive. Jump lists are great when tracking file access from many applications. Shellbag: A set of Registry keys that maintain the size, view, icon, and position of a folder when observed. The forensic value is that not only does it record the folder history for internal media but also for external media. Even if an encrypted drive is plugged into a computer and browsed, the folder list will still be recorded each time a user browses through the drive. Folder history is recorded for any folders observed from a screen recording the dates and times folders were observed. Examiners use this artifact to determine where on a computer or drive a user has navigated. Registry: The framework of Windows. The Registry stores hundreds of thousands of values that help Windows run. This includes a wealth of system and user information. Commonly use data stored within the Registry is used to build USB device history, MRUs (Most recently used documents), and more. The Registry is broken into components called Hives. Each Hive is responsible for managing different aspects of the Windows OS such as SOFTWARE, SYSTEM, NTUSER.DAT (data about individual users), and SECURITY. Pagefile.sys: Pagefile.sys is the Windows paging file, also known as the swap file, or virtual memory file. It s what Windows uses when it runs out of physical memory, or RAM. Apple Forensic Artifacts These terms are often encountered when discussing analysis the review of data once it has been collected and often processed within a forensic software within an Apple computer. Preference List (PLIST): Files that store various preferences, user information settings, and system records for several applications and the Mac OS. For instance, the ipod.plist records information regarding connected iphones and ipods. Log files (.log): A file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software. Systems log files that record various changes and events on the Mac OS. These can record system and user data via various logs that will store information for short to long periods of time. File System Events (FSevents): Reveals file system events that have occurred in the past such as file, folder, symbolic link and hard link creations, removes, renames, modifications, permission changes and more. These are useful to examine events involving mounting and unmounting external drives and disk images, activity within a user s profile directory, document editing, internet activity, files moved to the trash, downloaded files, and much more.these event files are also created by the Mac OS on external media (unless the drive is disconnected before it can be created).

9 Evidence Sources These terms cover common (and less-common) sources of evidence. Use this list to explore the possible locations data might reside. It is always best to have the password for the device. In some cases, the password can be circumvented. Desktop Internal Hard Drive: Drives used inside desktop PCs, imacs, and some servers. (spinning magnetic disk, 3.5inch) SATA connection. Imaging times 2-5 hours. Laptop Internal Hard Drive: Drives used inside laptops that are smaller than Desktop Internal Hard Drives. (spinning magnetic disk, 2.5inch) SATA connection. Imaging times 2-5 hours. SSD: Solid State Drive. 2.5 inch. Uses solid state storage as opposed to a spinning magnetic disk. SATA connection. No moving parts. Imaging on SSD is always faster. 1-3 hours. SSD Stick: A thin solid state stick used for storage in laptops and computers. Some computers, including laptops, will have a single M2 SSD stick and a small 2.5 hard drive. The newer, sleeker MacBooks use SSD sticks. Imaging times run from 1-3 hours. The MacBooks can sometimes be completed in around 45 mins. Server: A computer used to share data across a network to other computers (clients). Servers usually have a much larger storage capacity. Due to the large capacity of most servers, and the occasional need to create an image of a server over a network, imaging times are extremely larger. Even with a direct connection, imaging can run hours. Over a network with smaller volumes imaging times can be even higher. The imaging is run in the background and has minimal impact on users accessing data on a server. When a server image is complete, an exceptions list will be generated which provides a list of files that were unable to be imaged. These can be attempted again as a separate smaller image as long as the files are closed and not in use by anyone on the network. Cloud: Remote storage accessed via the web. Most cloud storage providers have some type of activity logging available to premium subscribers. Content stored within the cloud accounts can be synced to a device like an external drive and imaged or collected using a forensic tool. Since files need to be pulled down from the cloud to external drive to be imaged, time to completion can run anywhere between 3-20 hours. Cloud PC Backups: Some companies utilize backup services such as Carbonite, Azure, and idrive to back up their Cloud storage. These backups can usually be exported to an external drive and imaged. Typically, these are flat exports, with data stored in folders instead of a compressed image or proprietary format. Powered External HDD: External drives with faster write speeds. These drives require power through a wall outlet and a USB connection to a computer. Usually very large capacity. Examples include the WD MyBook, Seagate Backup Plus, and Buffalos. These drives are usually very large (TB+) and can run for 6+ hours. Microsoft Office365: An online service that provides , cloud storage, SharePoint, Skype, Office, and more. Office365 can be collected by creating mailbox exports through an Admin account. Exported data can be filtered by mailbox and date. exports are fairly quick 10 minutes to 4 hours. Multiple mailboxes can be exported at once allowing a collection of an entire company s Office365 to begin in a few minutes.

10 Microsoft Exchange: Mail server and calendaring server developed by Microsoft. Exchange is stored within.edb databases. These.EDB files can be preserved from offline Exchange servers. When performing a live image of a running Exchange server, the.edb database will be inaccessible. For that reason, it is best to work with the company s IT dept. to export requested mailboxes using PowerShell or an Exchange front end utility that allows for exports. Flash Drive: Small external media utilizing flash storage. Imaging of these are usually within minutes. External HDD: An external HDD that connects to a computer via USB connection. Imaging times depend on capacity taking anywhere from 1-4 hours. Memory Cards: Small flash cards used to expand storage on mobile phones, digital cameras, etc. Examples include MicroSD, SD, Sony Memory Stick Pro Duo, CF, SDHC. Imaging times are generally at 5 minutes to an hour on most sizes. Mobile Phones: Most mobile phones can be acquired and parsed. Phone capacity is ever-increasing and the amount of data users are storing on these are increasing as well. It is best to secure a mobile phone for at least a day. The average extraction of a smart phone is 2 hours however, in extreme cases, can run as long as 10 hours. This happens when multiple types of extractions are needed in order to extract the user data. Tablet: Most tablets use the same firmware found on mobile phones Android and ios. Imaging times are similar to phones. Tablet PCs: Tablet PCs are often forensically acquired through the same methods we would use for a live image. Imaging times on the solid state storage of Tablet PCs run from 25mins to 1.5 hours, typically. Virtual Machines: VMs can be acquired in two ways. One from within the VM using forensic imaging software such as FTK Imager. Two- From outside the VM by preserving the actual file the VM resides in (VHD or VMDK usually). Imaging times run 1-5 hours depending on the VM size. Google Takeout: When looking at an account involving a Google service such as Google Maps, Gmail, Google Drive, Hangouts, YouTube, or more, it is sometimes best to export this data using Google Takeout. This data can sometimes reveal what a user is doing on an Android phone down to the minute app by app. This is an export service provided by Google that allows a user to export most of the content stored within a Google account. These exports can take days on larger Google accounts. When creating a Google Takeout, Google receives the request and the archive is prepared on Google s side. When it is complete, the data can be downloaded. Downloads can run from 10mins to a few hours depending on size. Mobile Device Terms These terms are often encountered when discussing mobile devices such as phones and tablets. Backups: A backup of a mobile device. Many manufacturers and providers will offer a proprietary backup system.

11 Database: Used by mobile phone apps to store and retrieve information. Holds free space within, which allows for recovery of deleted data like text messages and calls. Faraday Bag/Cage: A bag or room that blocks radio waves, preventing mobile phones from communicating with an outside signal such as a tower or Wi-Fi network. Useful in criminal matters when a suspect could send a remote wipe signal to a smart phone. Application (App): A program that runs on a mobile device. Software like Cellebrite will often support popular apps and parses data automatically. Other apps will need to be manually analyzed to translate data in human-readable formats. icloud: The cloud backup platform for Apple devices. The icloud holds the 3 most recent backups for devices tied to an AppleID. AppleID: The account used to manage Apple devices. An AppleID logged into several devices will often share or sync data from one to another. Data deleted from one device might be found on another. Google Account: The account used to manage Android devices. A Google account logged into several devices will often share or sync data from one to another. Data deleted from one device might still be found on another. Verizon Cloud: Verizon s backup platform. Stores messages, contacts, photos, etc. Samsung Backup: Samsung s backup platform. Stores messages, contacts, photos, etc. Logical Extraction: A basic extraction of data from a mobile device that is limited to the phone s preconfigured export options. Usually defined by the manufacturer and typically very limited and provides little to no deleted data. Multiple extraction types can be combined into one, and a Logical Extraction is best when performing other types of extractions. For instance, Samsung Galaxy devices prevent an examiner from extracting messages using the more powerful extraction methods however, messages can be extracted using a logical method and combined later. File System Extraction (FSE): The most common extraction on most mobile phones. An FSE allows an examiner to extract databases and other system data from a mobile device for parsing within mobile device analysis software like Cellebrite s UFED Physical Analyzer. These databases often contain deleted data. FSE extractions include application data. Aside from databases, this extraction can only access allocated space, meaning no deleted data outside of what is contained within databases or other files that act as containers. Depending on the amount of data on a phone, this extraction can take between 20 minutes to 4 hours. Physical Extraction: This type of extraction is the only true image format out of all the extraction types. It is a 1:1 verified image of the phone s internal storage chip. It allows an examiner to access free/unallocated space to recover/carve any deleted data. This type of extraction is often not supported on devices running recent security patches, firmware versions, or builds. This means most devices will not allow a Physical Extraction until months after not being updated. Example: iphones newer than the iphone 4 and prior do not support physical extraction. Firmware Version (Android): The version of firmware running on an Android mobile device. Android uses a number and a dessert to express the version. For instance, Android version 8.0 is Oreo and the version before is 7.0 and Nougat. While Apple firmware versions range widely over all devices, all Android devices firmware ranges between 2.0 to 8.0.

12 Firmware Version (ios): The version of firmware running on an Apple mobile device. Apple firmware updates have a high user install base and varies between different devices, versions, and release dates. Firmware Updates: Most updates will patch several exploits used by forensic tools. It takes time for the tools to catch up after updates to make sure data is parsed accurately. A database used to store text messages might handle data differently when a new update is released. SMS: Short Message or commonly known as a text messages. SMS is typically sent and received over a phone carrier s network using the subscriber s phone number. SMS and MMS share a database. MMS: Multi-media message. Like SMS, an MMS message is sent and received over a phone carrier s network. MMS messages contain attachments such as photos, video, and audio. SMS and MMS share a database. Chat Message: A message exchanged using a third party application like Skype, Snapchat, Facebook Messenger, etc. Forensic analysis tools typically separate SMS/MMS from chat messages. Chat messages reside in unique databases tied to the third party application. imessage: imessage is an instant messenger service built and implemented by Apple for Apple devices. imessages are commonly synced across Apple devices in use by the same AppleID. imessages share a database with SMS/MMS messages on ios devices. When reporting, messages are tied to conversations by Chat IDs. ichat: allows imessages to be sent to iphones and ipads (ios 5 devices) as well as working the same Buddy Lists. ichat syncs with Apple devices tied to the same AppleID. This allows a user to access imessages from their phone on a MacBook. ichat will often archive messages away, persisting after deletion on other devices. Remote Wipe: Android and Apple devices can be remotely wiped through GooglePlay.com and icloud.com. This can be done by logging into the Google or AppleID account tied to the device. Locations of the devices connected to these accounts can be tracked and remotely wiped or locked with the push of a button. LCD: Is a panel behind the glass and digitizer on a mobile device that creates the display. If evidence is described as damaged with no picture/display, the LCD can be replaced quite easily. Digitizer: The touch screen panel of the mobile device that sits directly behind the glass lens of the screen and can be replaced if not functioning on evidence. Download Mode: A special mode with differing names across different mobile device manufacturers (Firmware mode, Flash Mode, Fastboot). Booting the phone into download mode allows a direct access point to create a physical image on many devices. Not always a possibiity but download mode is a great way to bypass lock codes or phones that no longer boot. Boot loop: A mobile device that cycles through the booting process. Data can still be extracted using download mode or repairing the boot loop by flashing data to repair it. Flashing: The process of using special tools and software to write directly to the ROM of a phone. This is usually done in digital forensics to repair corrupt system files or modify the phone in order to gain access to user data.

13 ROM: Read Only Memory. The ROM stores the OS of the phone - system data. Recovery Partition: This part of the phone s storage allows the user to restore a device to factory settings, clearing out user data. This recovery partition can be replaced with a custom recovery partition which allows an examiner to create backups of Android devices. Jail Break: Modifying a mobile device to remove restrictions imposed by the manufacturer or operator. Allow the installation of unauthorized software. This term is usually used when describing the modification of ios devices. A jail-broken ios device will give the examiner access to more data. Root: Much like a jail-break, rooting a mobile phone provides access to data on the root or top most level of the mobile phone s file system. It is equivalent to a jailbreak, but, this term is used when discussing the modification of Android devices. Basic Windows Terms These terms are often encountered when discussing Windows computers. UFD: The Cellebrite extraction file format. The.UFD file allows us to load the extraction data (usually in.zip format). Explorer: Through Explorer, users can browse their computer through a file and folder structure within a Windows environment. Shadow Volume Copy: A backup system baked into Windows. Also known as a System Restore, SVCs can be used to observe a computer system as it existed in the past. Each restore point can be processed and analyzed as if it were a separate machine. Data deleted on a current system might exist within a past restore point. Windows will often create a restore point automatically after installing an application, updating, or a user can create a restore point on a schedule or manually. Recycle Bin: User files deleted by a user will be sent to the Recycle Bin. These files still remain in allocated space and can be restored. Items present here also reveal their date of deletion. Device Manager: Windows feature to observe connected devices and hardware. Disk Management: Windows feature that provides information regarding connected drives and volumes/partitions of each drive. Basic Apple/Mac Terms These terms are often encountered when discussing Apple computers. Master Boot Record (MBR): The table of contents for every file stored within the Windows

14 environment. Stores metadata and location of each file residing on the computer. This file is not accessible by the user. It is one of the first files parsed when processing a drive in forensic software. Finder: Much like the Explorer for Windows, the Finder provides access to files and folders, displays windows, and generally controls interactions within the Mac OS environment..trash: User files deleted by a user will be copied to the Trash Bin, much like Windows. These files still remain in allocated space and can be restored. Items present here also reveal their date of deletion. The. in front of the file name tells us it is a location hidden from view of the user. When files are emptied from the Trash bin, they are marked as deleted in the file system catalog (similar to the MBR from Windows). However, the file remains present on the drive until overwritten. Secure Delete: A method of deletion built into the MacOS that allows a user to delete the file entirely, overwriting the blocks in which the file resides and bypassing the Trash bin. The only way to recover data deleted in this manner is to capture the virtual memory (VM), ram, or access a backup through a Time Machine Backup or Time Capsule. Launch Pad: An application launcher for macos. Launchpad s full screen graphical user interface provides an alternative way to start applications in macos, compared with other options such as the Dock or Finder. Disk Utility: A software utility for performing disk-related tasks on macos. Used to format drives, mounting, secure disk deletion, and more. Startup Manager: A special boot environment accessed by holding down the Option key when powering on a Mac computer. Allows the user to load MacQuisition or any other drive connected to the computer that has a bootable OS installed such as macos or Windows. Recovery Mode: Built-in recovery system for macos. Connects the macos to the internet via WiFi and downloads the appropriate firmware to repair or restore the OS, restore data from a Time Machine backup, or get help online. Accessed by holding Command+R when powering on the Mac. FileVault: Apple s macos encryption. Firmware Password: A firmware password prevents starting up from any internal or external storage device other than the startup disk selected. Time Machine: Backup software application built-in to macos. The software is designed to work with AirPort, as well as other internal and external disk drives. Creates incremental backups of files that can be restored at a later date. It allows the user to restore the whole system or specific files from the Recovery HD or the macos Install disc. Time Machine saves hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for everything older than a month until the volume runs out of space. At that point, Time Machine deletes the oldest weekly backup. Boot Camp: Built-in utility that allows a user to install Windows on Mac computers. Both environments can be used on the Mac. Spotlight: A system-wide desktop search feature of Apple s macos and ios operating systems. Spotlight is a selection-based search system, which creates an index of all items and files on the system.

15 Web Artifact Terms These terms are often encountered when discussing web analysis. AirPort (Time Capsule): A Wi-Fi router with a built-in hard drive. Commonly used to create backups over the network of macos devices. Parallels: A third-party program that allows a user to create a virtual environment of Windows that can be used in a window on a Mac computer. Cookie: A small piece of data sent from a website and stored in a user s web browser while the user is browsing that website. Cache: Temporary storage (caching) of web documents, such as HTML pages and images, to reduce bandwidth usage, server load, and perceived lag. Documents, photos, and more can be found here. Private Browsing: Web sites browsed in private modes will store less information. However, activity is still revealed through other files related to the action of visiting a web site. Cloud Data Terms related to cloud data. Webmail: When webmail is accessed through a web browser, the sent or received is not stored on the computer. Instead, it is loaded from the webmail server and viewed from within the browser. Depending on the webmail service, different pieces of information will be recorded within various web browser artifacts. It is sometimes possible to determine which webmail accounts were accessed or which folders were viewed. It is not always possible to determine what s were viewed, sent, or received. Acronyms This section covers most acronyms you ll encounter within the digital forensic realm. Sync: The process of sharing data across multiple devices and platforms. Usually, data will exist in more than one location. Many computers will reveal evidence of files that were once synced to a computer. File Version: A version of a file at a point in time. Cloud sites like Dropbox will store documents. When a change is made to that document, the new version is saved and the old version remains if file versioning is enabled. Some cloud sites allow us to pull these past versions.

16 NTFS: New Technology File System. File system for Windows PCs. FAT: File Allocation Table. The file system for many USB flash drives. Compatible with Windows/ macos/linux and most devices. HFS+: Hierarchical File System File system for macos. APFS: Apple File System The new macos file system released with the macos High Sierra version The APFS file system caused many forensic troubles upon the release due to the advanced structuring of the file system. Most tools are slowly building support. The only way to image an APFS Mac is thorough MacQuisition. The only way to parse it is through BlackBag s BlackLight. APFS Macs will provide the most limited forensic value until analysis methods and technology catch up..e01: Disk image file used by almost every forensic tool. Compressed..DD: DD image file uncompressed. Often the result of older forensic tools or command line created images..ad1: FTK Imager logical image format seen when creating targeted images or images of folders. Compressed..L01: EnCase logical image format seen when creating targeted images of images of folders. Compressed..LX01: Newer version of the L : DD image. Uncompressed. MRU: Most Recently Used. An artifact within the Windows Registry that reveals recently accessed documents. USB: Universal Serial Bus. A standardized technology for attaching peripheral devices to a computer. VSN: Volume Serial Number. A unique value assigned to identify a volume on a device. A VSN for a flash drive will change when it is formatted. Example: 456B-DE33. MD5: Hashing algorithm. Commonly used. 16 bytes. 32 digits long. SHA1: Hashing algorithm. Commonly used. 160 bit. 40 digits long. SHA256: Hashing algorithm. Commonly used. 256 bit. 64 digits long. SATA: The connection used on internal drives. msata: Mini SATA. Used in small solid state storage for mostly laptops. USB-C: New universal connection found in phones, computers, and peripherals. NAND: Flash memory of a mobile device. The hard drive of a mobile device. HDD: Hard disk drive. Storage used in computers and comprised of moving magnetic components.

17 SSD: Solid State Drive. Hard drive with solid state storage. No moving parts. Increasingly more common and getting cheaper. Currently, it is a bit on the expensive side for larger sizes. IMEI: (International Mobile Equipment Identity) is a unique 17 or 15 digit code used to identify an individual mobile phone to a network. The IMEI number is unique to the mobile phone. MEID: MEID Number (Mobile Equipment Identifier) is a unique identification code for CDMA (Sprint and other non-sim card carriers) mobile devices. In 2006, MEID replaced ESN. ESN: ESN stands for Electronic Serial Number and is a unique identifier for your mobile device. IMEI and MEID are both different formats of ESN numbers. Most modern smartphones use an IMEI number as an identifier. OS: Operating System. System software that manages computer hardware and software resources and provides common services for computer programs. GPS: Global Positioning System Often used when discussing location based tracking and information from mobile devices. KB: Kilobyte bytes. A text file will be just a few KBs. MB: Megabyte Kilobytes. A word document will be a few MBs. A video recorded on your phone might be a couple of hundred MBs. GB: Gigabytes MBs. 10,000 documents on average. BIOS: Firmware used to perform hardware initialization during the booting process. Can be accessed by holding a key during the computer s boot process. RAID: (redundant array of independent disks) Data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. Encountered in some environments. Imaged live to prevent errors or issues reassembling the RAID. VHD: Virtual Hard Disk one of many formats a virtual machine is stored in. VMDK: Virtual Machine Disk another format for virtual machine storage. VHDX: Hyper-V virtual hard disk another format for virtual machine storage..ufd: Cellebrite extraction file format. An extraction phone will be stored in.zip format usually with a.ufd describing the data collection to Cellebrite.

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher BlackLight is a multi-platform forensic analysis tool that allows examiners to quickly and intuitively analyze digital forensic media. BlackLight is capable of analyzing data from Mac OS X computers, ios

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

Retrospect 8 for Windows Reviewer s Guide

Retrospect 8 for Windows Reviewer s Guide Retrospect 8 for Windows Reviewer s Guide 2012 Retrospect, Inc. About this Reviewer s Guide This document provides a concise guide to understanding Retrospect 8 for Windows. While it is not designed to

More information

Forensic Analysis of ios Device Backups

Forensic Analysis of ios Device Backups Forensic Analysis of ios Device Backups ios Apple s mobile operating system Originally known as iphone OS Unveiled in 2007 Current version is 8.3, released April 8, 2015 ios Runs on: iphone ipod Touch

More information

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems

More information

MOBILedit Forensic Express

MOBILedit Forensic Express MOBILedit Forensic Express All-in-one phone forensic tool from pioneers in the field MOBILedit Forensic Express is a phone and cloud extractor, data analyzer and report generator all in one solution. A

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

Android Forensics: Simplifying Cell Phone Examinations

Android Forensics: Simplifying Cell Phone Examinations Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite

More information

Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/

Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/ by Chirath De Alwis Source: https://articles.forensicfocus.com/2018/03/02/evidence-acquisition-using-accessdata-ftk-imager/ Forensic Toolkit or FTK is a computer forensics software product made by AccessData.

More information

BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL

BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL BACKING UP YOUR COMPUTER PRESENTED BY SAM STAHL CLASS OBJECTIVES Learn how to store your computer s content safely in case of catastrophic failure. Explore back up options for both Microsoft and Apple

More information

AccessData Forensic Toolkit Release Notes

AccessData Forensic Toolkit Release Notes AccessData Forensic Toolkit 6.2.1 Release Notes Document Date: 4/24/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues

More information

AccessData AD Lab Release Notes

AccessData AD Lab Release Notes AccessData AD Lab 6.2.1 Release Notes Document Date: 4/24/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for this

More information

MPE+ Frequently Asked Questions & Troubleshooting

MPE+ Frequently Asked Questions & Troubleshooting MPE+ Frequently Asked Questions & Troubleshooting Version 7 (4.5.0.45078) 2011 AccessData Group, LLC Table of Contents Mobile Forensics Background Knowledge... 4 Q. What is the difference between Computer

More information

AccessData Forensic Toolkit 6.2 Release Notes

AccessData Forensic Toolkit 6.2 Release Notes AccessData Forensic Toolkit 6.2 Release Notes Document Date: 4/3/2017 2017 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for

More information

BackUp Strategies. ApplePickers April 12, 2017

BackUp Strategies. ApplePickers April 12, 2017 BackUp Strategies ApplePickers April 12, 2017 Why Backup? HDDs fail. It s not a matter of if; it is a matter of when Disk errors Possibility of theft, vandalism, or fire Stupid mistakes in deleting files

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

Acronis True Image 2019

Acronis True Image 2019 Acronis True Image 2019 USER GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image?... 4 1.2 New in this version... 5 1.3 System requirements... 5 1.4 Install, update, or remove Acronis

More information

Partition External Hard Drive Without Losing Data Mac Os X

Partition External Hard Drive Without Losing Data Mac Os X Partition External Hard Drive Without Losing Data Mac Os X If your Mac's hard drive is small and your Time Machine hard drive is big, At the same time, external hard drives are cheaper and roomier than

More information

Acronis True Image 2019

Acronis True Image 2019 Acronis True Image 2019 USER GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image?... 4 1.2 New in this version... 4 1.3 System requirements... 5 1.4 Install, update, or remove Acronis

More information

AccessData offers a broad array of training options.

AccessData offers a broad array of training options. Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass

More information

Editing 1: Mac Basics

Editing 1: Mac Basics Editing 1: Mac Basics Battle Creek Area Community Television 70 West Michigan Ave., Suite 112 Battle Creek, MI 49017 (269) 968-3633 www.accessvision.tv Hardware Overview Desktop Computer (imac) Monitor/CPU

More information

Flash Drive Instructions Mac Formatting Mysqldb

Flash Drive Instructions Mac Formatting Mysqldb Flash Drive Instructions Mac Formatting Mysqldb Then follow the instructions in the link you provided or in emilycurious's answer Connect to your Mac the properly formatted hard drive or flash drive you

More information

Mobile Device Support. Jeff Dove February

Mobile Device Support. Jeff Dove February Mobile Device Support Jeff Dove February 18 2017 Apple is a vertical company. Apple and IOS Control of type and design of hardware components Control over phone operating system and updates Control over

More information

Paraben s DS 7.5 Release Notes

Paraben s DS 7.5 Release Notes Paraben s DS 7.5 Release Notes Welcome to Paraben s DS Mobile Forensic Solution! DS is designed to allow investigators to acquire the data contained on mobile phones, smartphones, tablets, GPS, and PDA

More information

Install Windows Update Windows 7 From Usb

Install Windows Update Windows 7 From Usb Install Windows Update Windows 7 From Usb Macbook Pro 2010 Oct 13, 2014. I am desperately trying to install Windows 7 64-bit on my mid-2011 MacBook My Macbook is using the latest Mavericks update OSX.

More information

Created by Eugene Stephens 2015

Created by Eugene Stephens 2015 Mac OS X (10.9) Hardware Power cable - Magsafe adapter has 3 states: o Off Not plugged in, not charging o Amber Charging o Green Fully charged o NOTE: Because the port on the laptop is magnetized, small

More information

For this class we are going to create a file in Microsoft Word. Open Word on the desktop.

For this class we are going to create a file in Microsoft Word. Open Word on the desktop. File Management Windows 10 What is File Management? As you use your computer and create files you may need some help in storing and retrieving those files. File management shows you how to create, move,

More information

Contact Details and Technical Information

Contact Details and Technical Information Contact Details and Technical Information GetData Forensic Pty Ltd GetData Forensics USA Suite 204 1007 North Sepulveda Blvd # 1543 13a Montgomery St Manhattan Beach, CA 90267 Kogarah NSW 2217 USA Australia

More information

How Do I Sync My New Iphone To My Icloud. Account >>>CLICK HERE<<<

How Do I Sync My New Iphone To My Icloud. Account >>>CLICK HERE<<< How Do I Sync My New Iphone To My Icloud Account If you back up your iphone, ipad, or ipod touch, you'll have a copy of your Backups let you transfer data from your last device to your new one. In case

More information

PhoneView Product Manual

PhoneView Product Manual PhoneView Product Manual PhoneView is a Mac application for accessing iphone, ipad or ipod touch imessages, SMS/MMS, WhatsApp messages, recent calls, contacts, voicemails, shared app data, Safari web bookmarks

More information

Incident Response Data Acquisition Guidelines for Investigation Purposes 1

Incident Response Data Acquisition Guidelines for Investigation Purposes 1 Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response

More information

Basics Lesson Twelve Backing Up Your Data and the Computer

Basics Lesson Twelve Backing Up Your Data and the Computer Why should we back up our data and/or computer? o Malware has become so prevalent, it is no longer IF you get infected, but WHEN you get infected. o The best protection against malware damage is a frequent

More information

How to Backup Your Computer. Adele Berenstein Jan 17, 2018

How to Backup Your Computer. Adele Berenstein Jan 17, 2018 How to Backup Your Computer Adele Berenstein Jan 17, 2018 Agenda Why Backup? What is a Backup? Location of your Backup Your Backup Strategy What Files to Backup? Structure of your Backup External Hard

More information

Windows Forensics Advanced

Windows Forensics Advanced Windows Forensics Advanced Index: CF102 Description Windows Forensics - Advanced is the next step for forensics specialists, diving deeper into diverse processes on Windows OS serving computer investigators.

More information

New to Mac. Viewing Options in Finder:

New to Mac. Viewing Options in Finder: New to Mac Finder Preferences Finder helps you find and organize your files. To set Finder preferences, click on your desktop > Click Finder on the top left menu > Preferences. General Check External Hard

More information

Downloaded from various sources on the NET

Downloaded from various sources on the NET Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various

More information

10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it?

10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it? Live Acquisition Objectives Understand what Live Acquisition is and when it is appropriate Understand the concept of Order of Volatility Understand live acquisition issues and limitations Be able to perform

More information

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files

More information

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly.

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly. Page 1 Backing up Mac How to develop a solid backup strategy, what your hardware and software choices are, how to set everything up, what pitfalls you may encounter, and how to restore your data if disaster

More information

Manually Mount External Hard Drive Windows 7 Not Showing In My Computer

Manually Mount External Hard Drive Windows 7 Not Showing In My Computer Manually Mount External Hard Drive Windows 7 Not Showing In My Computer I've just upgraded to Yosemite, and none of my external (USB) hard drives of the disk format, either Mac or PC, they are found, seen

More information

FILE / HOW TO BACKUP RESTORE FRESH OSX NEW HDD EBOOK

FILE / HOW TO BACKUP RESTORE FRESH OSX NEW HDD EBOOK 10 July, 2018 FILE / HOW TO BACKUP RESTORE FRESH OSX NEW HDD EBOOK Document Filetype: PDF 434.58 KB 0 FILE / HOW TO BACKUP RESTORE FRESH OSX NEW HDD EBOOK A Time Machine Backup (New Mac / fresh install

More information

10 th National Investigations Symposium

10 th National Investigations Symposium 10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5

More information

Release Notes for Acronis True Image 2018

Release Notes for Acronis True Image 2018 Release Notes for Acronis True Image 2018 Release date: July 31, 2017 Language: English, German, Japanese, Russian, French, Spanish, Italian, Korean, Chinese Traditional, Chinese Simplified, Dutch, Czech,

More information

Vendor: Apple. Exam Code: 9L Exam Name: OS X v10.8 Troubleshooting Exam. Version: Demo

Vendor: Apple. Exam Code: 9L Exam Name: OS X v10.8 Troubleshooting Exam. Version: Demo Vendor: Apple Exam Code: 9L0-064 Exam Name: OS X v10.8 Troubleshooting Exam Version: Demo QUESTION NO: 1 A technician suspects that an application unexpectedly quitting at launch has an unusable preference

More information

Manually Mount External Hard Drive Win 7 Not Showing Up

Manually Mount External Hard Drive Win 7 Not Showing Up Manually Mount External Hard Drive Win 7 Not Showing Up I've just upgraded to Yosemite, and none of my external (USB) hard drives are Re: External USB Hard Drive not showing up, after Yosemite update,

More information

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically

More information

Flash Drive Won T Mount Windows 7 Won T Recognize

Flash Drive Won T Mount Windows 7 Won T Recognize Flash Drive Won T Mount Windows 7 Won T Recognize So after inserting the flash drive, if I go to Start _ Computer, I won't see anything there for Windows 7 Professional doesn't mount my usb flash drive

More information

Format Hard Drive Using Windows 7 Recovery Disk

Format Hard Drive Using Windows 7 Recovery Disk Format Hard Drive Using Windows 7 Recovery Disk Jun 8, 2015. If it's not possible to create a recovery disk using this method, is it possible to backup Hey guys, I'm looking to format my hard-drive and

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

DOWNLOAD PDF BACK UP YOUR SELL

DOWNLOAD PDF BACK UP YOUR SELL Chapter 1 : Productivity apps for ebay users If you back up your iphone, ipad, or ipod touch, you'll have a copy of your information to use in case your device is ever replaced, lost, or damaged. Choose

More information

Ed Ferrara, MSIA, CISSP

Ed Ferrara, MSIA, CISSP MIS 5208 - Lecture 12 Investigation Methods Data Acquisition Ed Ferrara, MSIA, CISSP eferrara@temple.edu Objectives List digital evidence storage formats Explain ways to determine the best acquisition

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23 FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 23 2 Persistent Storage All programs require some form of persistent storage that lasts beyond the lifetime of an individual process Most

More information

MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE

MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE Forensics Toolbox Paul A. Henry MCP+I, MCSE, CCSA, CCSE, CISSP-ISSAP, CISM, CISA, CIFI, CCE Florida PI License C2800597 Forensics & Recovery LLC Florida PI Agency License A2900048 Latest Additions To My

More information

What's new 9 Magnet AXIOM 11 System requirements 12

What's new 9 Magnet AXIOM 11 System requirements 12 USER GUIDE CONTENTS What's new 9 Magnet AXIOM 11 System requirements 12 Administrator permissions 13 Clock speed and cores 13 Memory 13 Storage devices 13 Virtualization 13 Installing Magnet AXIOM 14 Set

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Reviews. TechTool Pro 9 by L. Davenport

Reviews. TechTool Pro 9 by L. Davenport Reviews 1 TechTool Pro 9 by L. Davenport Every computer, whether it is a Mac or a PC, needs a utility program that can help prevent and hopefully repair problems with your computer. One of the tools that

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

Manual Format Flash Drive Mac And Pc Disk Utility

Manual Format Flash Drive Mac And Pc Disk Utility Manual Format Flash Drive Mac And Pc Disk Utility On a Mac the program of choice is Disk Utility, something supplied by Apple. drives in MS- DOS (FAT) format so that they'll work with both Mac and PC systems.

More information

Peerless Drive System User's Manual

Peerless Drive System User's Manual Peerless Drive System User's Manual Copyright 2001 Iomega Corporation Iomega, the stylized "i" logo, Peerless, and the Peerless brand block are either registered trademarks or trademarks of Iomega Corporation

More information

Iphone Restore Backup Files Location Windows 8.1

Iphone Restore Backup Files Location Windows 8.1 Iphone Restore Backup Files Location Windows 8.1 If you upgraded to icloud Drive, use these steps to download files stored in icloud Drive 7 or later, you can copy your files from the icloud Drive folder

More information

Computer Overview. A computer item you can physically see or touch. A computer program that tells computer hardware how to operate.

Computer Overview. A computer item you can physically see or touch. A computer program that tells computer hardware how to operate. Hardware Computer Overview A computer item you can physically see or touch. Software A computer program that tells computer hardware how to operate. Information Technology (IT) The broad subject related

More information

Install New External Hard Drive Windows 7 Upgrade After Installing >>>CLICK HERE<<<

Install New External Hard Drive Windows 7 Upgrade After Installing >>>CLICK HERE<<< Install New External Hard Drive Windows 7 Upgrade After Installing You can re-use a drive when performing a major upgrade or move it to a new computer. Find your Windows install disc or, if you don't have

More information

Backup challenge for Home Users

Backup challenge for Home Users PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com

More information

Technology Checklist for End of the School Year. To prepare your classroom technology for summer, please confirm that the following are done:

Technology Checklist for End of the School Year. To prepare your classroom technology for summer, please confirm that the following are done: Technology Checklist for End of the School Year Classroom Technology To prepare your classroom technology for summer, please confirm that the following are done: Projector should be powered off, lens cap

More information

2.5.1 Using Blockchain technology Verifying file authenticity Manual verification of a file's authenticity...

2.5.1 Using Blockchain technology Verifying file authenticity Manual verification of a file's authenticity... USER'S GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image?... 4 1.2 System requirements... 4 1.3 Install, update, or remove Acronis True Image 2018... 5 1.4 Activating Acronis True

More information

How Do I Delete Files From My Startup Disk Macbook Pro

How Do I Delete Files From My Startup Disk Macbook Pro How Do I Delete Files From My Startup Disk Macbook Pro If your Apple/Mac computer is displaying the error message that the hard You need to make. The one place I least like to see a beach ball is on my

More information

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan.

Have a Backup. Trainer Resource. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. This document is a reference and preparation sheet for the trainer, and a companion to the lesson plan. The Learning Objectives summarize the knowledge that learners should have gained by the time they

More information

Acronis True Image Data Protection. User's Guide

Acronis True Image Data Protection. User's Guide Acronis True Image Data Protection User's Guide Table of contents 1 Introduction...5 1.1 What is Acronis True Image Data Protection?... 5 1.2 System requirements and supported media... 5 1.2.1 Minimum

More information

Computer chip: A very small pieces of silicon or other semi-conducting material onto which integrated circuits are embedded Circuit board: A thin

Computer chip: A very small pieces of silicon or other semi-conducting material onto which integrated circuits are embedded Circuit board: A thin INTRODUCTION We can divide the parts that make up a computer into three broad categories or subsystem: the central processing unit (CPU), the main memory, and the input/output subsystem. The next three

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems CSE 4482 Computer Security Management: Assessment and Forensics Computer Forensics: Working with Windows and DOS Systems Instructor: N. Vlajic,, Fall 2010 Required reading: Guide to Computer Forensics

More information

Apple EXAM - 9L OS X Support Essentials 10.9 Exam.

Apple EXAM - 9L OS X Support Essentials 10.9 Exam. Apple EXAM - 9L0-415 OS X Support Essentials 10.9 Exam TYPE: DEMO http://www.examskey.com/9l0-415.html Examskey Apple 9L0-415 exam demo product is here for you to test the quality of the product. This

More information

Veritas System Recovery Disk Help

Veritas System Recovery Disk Help Veritas System Recovery Disk Help About recovering a computer If Windows fails to start or does not run normally, you can still recover your computer. You can use the Veritas System Recovery Disk and an

More information

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,

More information

Manual Boot Camp Install Windows 8 From Usb Using

Manual Boot Camp Install Windows 8 From Usb Using Manual Boot Camp Install Windows 8 From Usb Using To avoid all this, I've chosen to bypass Bootcamp and install Windows in my Mac's native EFI mode. Does not work with Windows 7, only works with Windows

More information

Digital Forensics Lecture 01- Disk Forensics

Digital Forensics Lecture 01- Disk Forensics Digital Forensics Lecture 01- Disk Forensics An Introduction to Akbar S. Namin Texas Tech University Spring 2017 Digital Investigations and Evidence Investigation of some type of digital device that has

More information

Disk Drill by LaWanda Warren

Disk Drill by LaWanda Warren Disk Drill by LaWanda Warren GOAL OF PROJECT If you're a forensic investigator or even an everyday computer user and you want to recover some files or images from corrupt hard drive or even an external

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

9L0-412 Q&As. OS X Support Essentials 10.8 Exam. Pass Apple 9L0-412 Exam with 100% Guarantee

9L0-412 Q&As. OS X Support Essentials 10.8 Exam. Pass Apple 9L0-412 Exam with 100% Guarantee 9L0-412 Q&As OS X Support Essentials 10.8 Exam Pass Apple 9L0-412 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

CIS Project 1 February 13, 2017 Jerad Godsave

CIS Project 1 February 13, 2017 Jerad Godsave CIS 484-75-4172 Project 1 February 13, 2017 Jerad Godsave Part 1) a) Below are a few screenshots indicating verification that the original evidence and the newly created.e01 forensic image match: Part

More information

C A S P E R USER GUIDE V ERSION 10

C A S P E R USER GUIDE V ERSION 10 TM C A S P E R TM USER GUIDE V ERSION 10 Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication, and distribution

More information

What is Data Storage?

What is Data Storage? What is Data Storage? When we talk about storing data, we mean putting the data in a known place. We can later come back to that place and get our data back again. Writing data or saving data are other

More information

Windows Mail Files Backup And Restore Windows 7 Not Working

Windows Mail Files Backup And Restore Windows 7 Not Working Windows Mail Files Backup And Restore Windows 7 Not Working How and where to back up your files and drives in Windows XP, Vista, 7, 8 and 8.1. no backup program at all and Windows Vista Home Basic does

More information

Instructions Usb Flash Drive Recovery Ware >>>CLICK HERE<<<

Instructions Usb Flash Drive Recovery Ware >>>CLICK HERE<<< Instructions Usb Flash Drive Recovery Ware Software Mac Paragon Rescue Kit for Mac OS X 14 Free allows to create bootable recovery USB-flash drive or external hard drive for a few clicks, that will help

More information

Manual Copy Paste Macbook Air To External Hard Drive

Manual Copy Paste Macbook Air To External Hard Drive Manual Copy Paste Macbook Air To External Hard Drive Mar 13, 2015. I'm looking for a device to move all my pics and video to as my MacBook Air is Second if so what device will work as a wireless external

More information

CSC 170 Introduction to Computers and Their Applications. Computers

CSC 170 Introduction to Computers and Their Applications. Computers CSC 170 Introduction to Computers and Their Applications Lecture #4 Digital Devices Computers At its core, a computer is a multipurpose device that accepts input, processes data, stores data, and produces

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

User Help

User Help ginlo @work User Help 19 June 2018 Contents Get started... 5 System requirements for the ginlo @work app... 5 Recommended browsers for ginlo websites... 6 Supported languages... 6 Navigation in ginlo @work...

More information

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified TestOut PC Pro - English 6.0.x COURSE OUTLINE Modified 2019-01-02 TestOut PC Pro Outline - English 6.0.x Videos: 142 (17:10:32) Demonstrations: 144 (17:38:44) Simulations: 117 Fact Sheets: 189 Exams: 132

More information

Manual Format Flash Drive Mac Os X Lion Startup

Manual Format Flash Drive Mac Os X Lion Startup Manual Format Flash Drive Mac Os X Lion Startup Learn more about Boot Camp and its features for OS X Lion and Mountain Lion. on Mac computers that do not have an optical drive, with a USB flash drive that

More information

Moving to the Mac A GUIDE FOR NEW USERS OF MAC OS X. [Type here]

Moving to the Mac A GUIDE FOR NEW USERS OF MAC OS X. [Type here] [Type here] Moving to the Mac A GUIDE FOR NEW USERS OF MAC OS X This guide is aimed at those who are new to using Mac s. It assumes that you have prior knowledge of using a computer, probably a PC. The

More information

14-Nov-11. Chapter 5: System Software: Operating Systems and Utility Programs. Learning Objectives. Learning Objectives. Overview

14-Nov-11. Chapter 5: System Software: Operating Systems and Utility Programs. Learning Objectives. Learning Objectives. Overview Learning Objectives Chapter 5: System Software: Operating Systems and 1. Understand the difference between system software and application software. 2. Explain the different functions of an operating system

More information

AccessData Enterprise Release Notes

AccessData Enterprise Release Notes AccessData Enterprise 6.0.2 Release Notes Document Date: 3/09/2016 2016 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues for

More information

Technology In Action, Complete, 14e (Evans et al.) Chapter 5 System Software: The Operating System, Utility Programs, and File Management

Technology In Action, Complete, 14e (Evans et al.) Chapter 5 System Software: The Operating System, Utility Programs, and File Management Technology In Action, Complete, 14e (Evans et al.) Chapter 5 System Software: The Operating System, Utility Programs, and File Management 1) The two major types of system software programs are utility

More information

File Maintenance Windows 7 Word What is File Maintenance?

File Maintenance Windows 7 Word What is File Maintenance? File Maintenance Windows 7 Word 2013 What is File Maintenance? As you use your computer and create files you may need some help in storing and retrieving those files. File maintenance shows you how to

More information

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

Paragon Exact Image. User Manual CONTENTS. Introduction. Key Features. Installation. Package Contents. Minimum System Requirements.

Paragon Exact Image. User Manual CONTENTS. Introduction. Key Features. Installation. Package Contents. Minimum System Requirements. Paragon Exact Image User Manual CONTENTS Introduction Key Features Installation Package Contents Minimum System Requirements Basic Concepts Backup Operations Scheduling Interface Overview General Layout

More information

Fix Three Common Accounting Firm Data Vulnerabilities

Fix Three Common Accounting Firm Data Vulnerabilities Fix Three Common Accounting Firm Data Vulnerabilities Fix Three Common Accounting Firm Data Vulnerabilities Use these step-by-step guides to protect your business from data thieves Brought to you by: Encyro

More information

Stellar Phoenix Mac Data Recovery

Stellar Phoenix Mac Data Recovery Stellar Phoenix Mac Data Recovery Version 8.0 Installation guide Overview Stellar Phoenix Mac Data Recovery is a solution to all your data loss problems. Data loss can occur due to data corruption and

More information