CIS Business Computer Forensics and Incident Response. Lab Protocol 02: FileSystems/VM
|
|
- Isabel Henry
- 5 years ago
- Views:
Transcription
1 Name: CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 02: FileSystems/VM Purpose: Ensure every student has experienced forensics distinctions between imaging digital storage media, hashing digital media, transferring digital media and verification of hash values using forensically proper techniques. Materials required: None Deliverable: This lab protocol from individual students. Be sure your name is on the material delivered. Part 1 Preparation 1. Download the HxD disk editing tools from: 2. Unzip the files to C:\dayspace\tools 3. Download the Lab02 disk image from: 4. Unzip the file to C:\dayspace\tools Part 2 Prepare to examine the binary contents of the disk image 1. Run HxD in the directory C:\dayspace\tools If asked, click OK to dismiss the First start of HxD dialog box 2. Select Open Disk Image from the Extras pull-down menu. Choose the file cis8630lab02.img 3. The sector size dialog box will open. Choose Set the hex-dec-oct drop down box to hex or dec (hexadecimal or decimal) 5. Note: If you open this through windows, disk images are opened through the Extras menu. Part 3 Examine the Volume Boot Sector (VSB) of the media Refer to Table 2.2 of the Bunting Text. 1. What is the Formatting OS used for this media? Located at byte 3-10 (0x03)
2 2. Was this media fixed or removable? Located at byte 21 (0x15) F0 Removable. F8 Fixed 3. What did the user name this volume? a. Located at bytes (0x2B) 4. What is the file system type? b. Located at bytes (0x36) 5. What is the likely physical media represented by this image (hard drive, thumbstick, floppy, other)? 6. How did you arrive at this opinion? Part 4 Examine the File Allocation Table and Root Directory of the media. In this particular type of file system, a cluster has only one sector in it. Therefore clusters = sectors (for this type of file system). 1. The file allocation table is in clusters 1-9 (there is a backup copy in clusters 10-18). Note that data clusters 0 & 1 are unaddressable (reserved for use). Therefore allocations for data clusters at (0x200) are used to store system indicators. 2. What is the hexadecimal value for the allocation of cluster 2? Remember to adjust for little endian. Located at bytes (0x204) 3. Is data cluster 2 allocated to a file or unallocated? 4. How many data clusters are allocated files? 2 of 5
3 5. Below is the directory listing for this image. This root directory begins at Media Cluster 19. Refer to Bunting Table 2.4. Locate the entry for WINNER.TXT. What is the beginning data cluster number of this file? Remember to adjust for little endian. 6. Locate the root directory entry for LOSER.TXT. What is the beginning data cluster number of this file? Remember to adjust for little endian. 7. Why doesn t does the file LOSER.TXT appear in the directory listing? How can you prove this explanation? 8. The data area begins at cluster 30 (the end of the fixed length Root Directory). What is the content of WINNER.TXT? 9. What is the content of the deleted file LOSER.TXT? Part 5 Introduction to your VMware workstation 1. Open Microsoft Remote Desktop. Start > Run > mstsc > OK 3 of 5
4 2. On the Remote Desktop Connection window, select Options 3. Click the Local Resources tab and select the Disk drives check box 4. Click Connect to log in. 5. Type in CIS4000-userX.cis.gsu.edu [where X is the number of your VM] 6. Enter username and password 7. Choose My Computer from the desktop. Record: a. Memory Size b. Processor Speed c. Disk Size 8. Log off of the VM. Part 6 Date and Time Issues (Complete this part on your own computer. Administrator privileges are required.) 1. Connect a memory thumbstick to an available USB port. Note the system time in the lower right-hand corner of the taskbar. (system time) 4 of 5
5 2. Right-click on the c:\drive and select Properties. Under the General tab, what is the File System used on this drive? Repeat this process for the memory thumbstick. (c:\ drive file system ) (Thumbstick file system) 3. Using notepad or equivalent, create two text files, one on your desktop named DT1- NTFS.txt and one on the thumbstick named DT2-FAT.txt. Right click on each file and select properties. What is the modified date/time stamp on each file? (DT1-NTFS.txt ) (DT2-FAT.txt) 4. On the lower right-hand corner of the taskbar, right-click on the time. Select Adjust Date/Time. Wellington. Under the timezone tab, select GMT +12:00 Auckland, Note the system time. (system time) 5. What is the modified date/time stamp on each file? (DT1-NTFS.txt - Desktop) (DT2-FAT.txt - Thumbstick) 6. Copy DT1-NTFS.txt to the thumbstick. 7. On the lower right-hand corner of the taskbar, right-click on the time. Select Adjust Date/Time. & Canada). Under the timezone tab, select GMT -5:00 Eastern Time (US Note the system time. (system time) 8. Right click on each file and select properties. What is the modified date/time stamp on each file? (DT1-NTFS.txt - Desktop) (DT1-NTFS.txt - Thumbstick) (DT2-FAT.txt - Thumbstick) 9. Why did some times change while others did not? 5 of 5
CIS Business Computer Forensics and Incident Response. Lab Protocol 03: Acquisition
CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 03: Acquisition Purpose: Ensure every student has experienced imaging digital storage media, hashing digital media, transferring
More informationWA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2342 NoSQL Systems Comparison Lab Server VM Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationNAS 308 Introduction to iscsi
NAS 308 Introduction to iscsi Use iscsi with your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding of iscsi
More informationWA2393 Data Science for Solution Architects. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2393 Data Science for Solution Architects Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements
More informationComputer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase
Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files
More informationCIS 231 Windows 7 Install Lab #2
CIS 231 Windows 7 Install Lab #2 1) To avoid certain problems later in the lab, use Chrome as your browser: open this url: https://vweb.bristolcc.edu 2) Here again, to avoid certain problems later in the
More informationTable 12.2 Information Elements of a File Directory
Table 12.2 Information Elements of a File Directory Basic Information File Name File Type File Organization Name as chosen by creator (user or program). Must be unique within a specific directory. For
More informationLab Install Windows 8
Introduction In this lab, you will install Windows 8.1 and 8.0. Recommended Equipment A computer with a blank hard disk drive Windows 8.1 and 8.0 installation DVD or USB flash drive Step 1: Starting the
More informationWA2503 Hadoop Programming on the. Hortonworks Data Platform. Lab Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.
WA2503 Hadoop Programming on the Hortonworks Data Platform Lab Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2
More information24) Type a note then click the OK button to save the note. This is a good way to keep notes on items of interest.
23) Click File Analysis Tab - This allows forensic investigators to look for files on the system as they would on a regular system. Key file attributes are provided to assist the investigator (file size,
More informationGetting View Client File
Getting View Client File 1. Launch Internet Explorer 2. At address bar enter this URL https://viewvdi.tp.edu.sg/ and press [Enter]. 3. Please click on More information and click on Go on to the webpage
More information1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu. FireFox
CIS 231 Windows 7 Install Lab #2 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced
More informationFireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client.
CIS 231 Windows 10 Install Lab # 3 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced
More informationWA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.
WA2592 Applied Data Science and Big Data Analytics Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements
More informationChapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.
Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems
More informationSend the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins Menu Sequence: VM / Guest / Send Ctrl-Alt-Delete
CIS 231 Windows 2008 Server Install Lab #1 (Virtual Machines) Keys to Remember when using the vsphere client. Send the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins
More informationWA2621 DevOps Foundations for Java with Git, Jenkins, and Maven. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc.
WA2621 DevOps Foundations for Java with Git, Jenkins, and Maven Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2
More informationWA2451 DevOps Fundamentals. Classroom Setup Guide. Web Age Solutions Inc.
WA2451 DevOps Fundamentals Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part 3 - Software...4 Part
More informationGuide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems
Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic
More informationCIS 231 Windows 10 Install Lab # 3
CIS 231 Windows 10 Install Lab # 3 1) To avoid certain problems later in the lab, use Chrome as your browser: open this url: https://vweb.bristolcc.edu 2) Here again, to avoid certain problems later in
More informationWindows Me Navigating
LAB PROCEDURE 11 Windows Me Navigating OBJECTIVES 1. Explore the Start menu. 2. Start an application. 3. Multi-task between applications. 4. Moving folders and files around. 5. Use Control Panel settings.
More information1) Use either Chrome of Firefox to access the VMware vsphere web Client. FireFox
CIS 231 Windows 7 Install Lab #2 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced
More informationBT Cloud Compute. Adding a Volume to an existing VM running Microsoft Windows
Adding a Volume to an existing VM running Microsoft Windows BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Issue 2 Introduction This guide has been designed
More informationTraining Module 3 - Creation of a Windows 7 Template for VMware View
Training Module 3 - Creation of a Windows 7 Template for VMware View 1 Creation of a Windows 7 Base Image This module will show you how to install and configure an optimized Windows 7 base image for a
More informationWA2321 Continuous Integration with Apache Maven Jenkins-CI and Nexus. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc.
WA2321 Continuous Integration with Apache Maven Jenkins-CI and Nexus Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part
More informationMachine Language and System Programming
زبان ماشين وبرنامه نويسی سيستم Machine Language and System Programming جلسه دوازدھم دانشگاه صنعتی ھمدان پاييز 1389 Objectives Explain the purpose and structure of file systems Describe Microsoft file structures
More informationWA2442 Introduction to JavaScript. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2442 Introduction to JavaScript Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationStarting the KVM Console
Starting the KVM Console This chapter includes the following sections: KVM Console, page 1 Starting the KVM Console from a Server, page 5 Starting the KVM Console from a Service Profiles, page 5 Starting
More informationA Linux Virtual Machine for CS-2011 Projects
CS-2011, Machine Organization and Assembly Language, D-term 2013 A Linux Virtual Machine for CS-2011 Projects Hugh C. Lauer Adjunct Professor Worcester Polytechnic Institute As an alternative to working
More informationWeb Age Solutions Inc. WA2639 Devops with Jenkins, Terraform and Hashicorp Stack. Classroom Setup Guide. Web Age Solutions Inc. 1
WA2639 Devops with Jenkins, Terraform and Hashicorp Stack Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Introduction...3 Part 2 - Minimum Hardware Requirements...3
More informationUnderstanding FAT12. Introduction to Computer Forensics. Kessler/Schirling
Understanding FAT12 Introduction to Computer Forensics Kessler/Schirling Fall 2002 EXP 248 Project #3 You have a floppy disk image file Examine floppy to find an address and a password, and verify MD5
More informationQEMU Manager: Computer on a Stick
QEMU Manager: Computer on a Stick 2012 Table of Contents iii Table of Contents Contents Table of Contents... iii Introduction... v Test Configuration:... v Before You Begin... 3 Choose the Best Flash
More informationWA2271 Continuous Integration with Jenkins-CI. Classroom Setup Guide. Web Age Solutions Inc.
WA2271 Continuous Integration with Jenkins-CI Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part
More informationInstalling and Upgrading Cisco Network Registrar Virtual Appliance
CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar
More informationSecurewireless Windows 7 Setup Guide
Securewireless Windows 7 Setup Guide 1. Click on the wireless icon in the lower right-hand corner of the taskbar and then click on Open Network and Sharing Center. 2. From the Network and Sharing Center
More informationWA1827 Cloud Programming Workshop. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA1827 Cloud Programming Workshop Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationComputer Setup Guide for SEC301
Computer Setup Guide for SEC301 This document identifies the steps you need to take to make sure that your computer is ready for the lab exercises for SEC301. Prior to coming to class you need to ensure
More informationWA2423 JavaScript for Web 2.0 Development. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2423 JavaScript for Web 2.0 Development Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationMidterm spring. CSC228H University of Toronto
Midterm 2002 - spring CSC228H University of Toronto Duration 50 minutes Aids Allowed: none. No calculators. Student Number: Last Name: First Name: Instructor: TA: Do not turn this page until you have received
More informationMicrosoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010
Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.
More informationWA2402 Introduction to Responsive Web Development with HTML5, CSS3, JavaScript and jquery. Classroom Setup Guide. Web Age Solutions Inc.
WA2402 Introduction to Responsive Web Development with HTML5, CSS3, JavaScript and jquery Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum
More informationVirtual Desktop Infrastructure Setup for MacOS
Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile
More informationVirtual Desktop Infrastructure Setup for MacOS
Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile
More informationUnzip the provided Minix Virtual Machine. This will provide you with the files Minix3.1.8.vdi and Minix LCOM.vbox.
Setting up Minix with Virtualbox Download and install the latest version of VirtualBox from here: https://www.virtualbox.org/wiki/downloads. Download the Minix Virtual Machine here: https://feupload.fe.up.pt/get/jrrtavgkcxf2hy4.
More informationWA2579 Technical Introduction to Microservices. Classroom Setup Guide. Web Age Solutions Inc.
WA2579 Technical Introduction to Microservices Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part
More informationConnecting to the Cloud
Connecting to the Cloud Step 1. Log off the current Outlook client. Step 2. Shutdown Lync (if used): Left click the Show Hidden Icons button on the taskbar. (For most PCs this is the bottom right corner.)
More informationWireless for Windows 7
Wireless for Windows 7 The new CWSL wireless network consists of three different wireless networks CWSL Faculty-Staff - This network is for faculty and staff only. (uses WPA2-Enterprise encryption) CWSL
More informationGIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.1 SEC301
GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.1 SEC301 SEC301 - Hands-on Exercises Addendum Page 1 Table of Contents Background... 3 Create a local
More informationTECH NOTE VICON TECHNICAL SERVICES GROUP
This document describes how to back up and restore the Settings in ViconNet Kollector DVR s and workstations. Two methods are available, 1-Through the application; 2- As done in the Windows OS. ViconNet
More informationHow to install the software of ZNS8022
How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run
More informationWindows 8.1 and Windows 10 a) Connect to wireless network Click on the wireless icon in taskbar. Select detnsw and click on Connect.
1 HSHS BYOD Wireless Connection Windows 8.1 and Windows 10 a) Connect to wireless network Click on the wireless icon in taskbar. Windows 8.1 icon: Windows 10 icon: Select detnsw and click on Connect. or
More informationInstall Notes cbot v Recipe Installer For cbot
Install Notes cbot v2.0.16 Recipe Installer 2.0.3 For cbot cbot 2.0.16 Install Notes 1 Introduction These instructions detail how to install cbot software version 2.0.16. These update instructions apply
More informationSTEP 1: PREPARE FOR DATA MIGRATION 1. Right-click the desktop and choose New > Folder. a. Type For Transferring and press Enter to name the folder.
PC Support and Repair Chapter 5 Data Migration Lab 5144 When a new computer is purchased or a new operating system is installed, it is often desirable to migrate a user s data to the new computer or OS.
More informationScript.byu.edu SharePoint Instructions
Script.byu.edu SharePoint Instructions Site Actions Menu Go to script.byu.edu, click on Authenticate at the bottom of page, you will be prompted to enter a username and password, use your netid and password
More informationGame100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses
Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,
More informationWA2488 JavaScript Changes with ECMAScript Classroom Setup Guide. Web Age Solutions Inc.
WA2488 JavaScript Changes with ECMAScript 2015 Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software Requirements...3 Part 2 - Software Provided...3 Part 3 - Instructions...3
More informationNetwork Installation Guide
Rosetta Stone Node-Locked License Network Installation Guide This Guide Includes: Storing Rosetta Stone Language Data... 1 Installing the Student Management System... 2 Setting Up the SMS... 3 Installing
More informationCYB 610 Project 6 Workspace Exercise
CYB 610 Project 6 Workspace Exercise I. Digital Forensics Lab (Introduction to FTK Imager) a. Lab Rules: Each student has to do the lab individually. No content directly quoted from Internet or other sources
More informationStep by Step Guide to Creating a SQL Server VM Using VMWare
Step by Step Guide to Creating a SQL Server VM Using VMWare I typically use SQL Server VMs for my development and administration classes. I want the students to have full autonomy over the machines they
More informationBIG STEP 400: INSTALL "VMWARE TOOLS" INTO "WINDOWS 10.." RUNNING INSIDE A "VIRTUAL MACHINE" INSIDE "VMWARE WORKSTATION PLAYER"
BIG STEP 400: INSTALL "VMWARE TOOLS" INTO "WINDOWS 10.." RUNNING INSIDE A "VIRTUAL MACHINE" INSIDE "VMWARE WORKSTATION PLAYER" 1 Web location for this presentation: http://aztcs.org Click on Meeting Notes
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationVirtual Machines. Module 2
Virtual Machines Module 2 Define virtual machine Objectives Define common terminology Identify advantages and disadvantages Determine what software is needed; how to download and install that software
More informationAppendix A: Metasys Web Access (MWA) Server Installation Guidelines
Technical Bulletin Issue Date February 26, 2003 Appendix A: Metasys Web Access (MWA) Server Installation Guidelines Appendix A: Metasys Web Access Server Installation Guidelines...2 Introduction... 2 Detailed
More informationJCCC Virtual Labs. Click the link for more information on installing on that device type. Windows PC/laptop Apple imac or MacBook ipad Android Linux
JCCC Virtual Labs Revision 9/21/2017 http://ats.web. Welcome to the JCCC Virtual Lab Environment. This system allows students to access campus software titles on their personal computers from almost anywhere.
More informationInstall and setup TrueCrypt
Install and setup TrueCrypt Install and setup TrueCrypt This guide is for organisations and individuals who wish to use TrueCrypt to secure their computer(s) and/or portable USB drives. It explains how
More informationMission Guide: GUI Windows
Mission Guide: GUI Windows Your Mission: Use F-Response to connect to a remote Windows machine Using F-Response to connect to a remote Windows machine and access one or more targets Step 1: Open and start
More informationWhy Operating Systems? Topic 3. Operating Systems. Why Operating Systems? Why Operating Systems?
Topic 3 Why Operating Systems? Operating Systems Abstracting away from the Nuts and Bolts Early computers had no operating system. Programmers were responsible for: telling the computer when to load and
More informationWA2452 Node.js Software Development. Classroom Setup Guide. Web Age Solutions Inc.
WA2452 Node.js Software Development Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part 3 - Software
More informationObjective 1.02 Understand Numbering Systems
Objective.0 Understand Numbering Systems C O M P U T E R P R O G R A M M I N G I Number Systems Number systems we will talk about: Decimal (Base 0 ) Binary (Base ) Hexadecimal (Base 6 ) Decimal The number
More informationConfiguring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them
Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection
More informationTesting the Date Maintenance of the File Allocation Table File System
Abstract Testing the Date Maintenance of the File Allocation Table File Tom Waghorn Edith Cowan University e-mail: twaghorn@student.ecu.edu.au The directory entries used in the File Allocation Table filesystems
More informationMicrosoft Official Academic Course Windows Vista Configuration, Exam ISBN: ERRATA
Microsoft Official Academic Course Windows Vista Configuration, Exam 70-620 ISN: 978-0-470-06958-5 ERRATA Lesson Lesson 2 25 The Certification Ready? sidebar on this page does not link to an exam objective.
More informationChapter 2. Index.dat
Chapter 2 Index.dat Internet History Practical Exercise Anatomy of a MSIE / History.IE5\Index.dat File 1. Use WinHEX to open up the file named: \Student Files\02_Internet_History\Index.dat. 2. Let s examine
More informationCST VMWare Documentation
Login to the vsphere Web Client using a web browser by navigating to https://cstvmware.ridgewater.edu/ui/. Chrome is the best for this, but others will work. You will see a page like this: Login with your
More informationMcAfee Boot Attestation Service 3.5.0
Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationmakes floppy bootable o next comes root directory file information ATTRIB command used to modify name
File Systems File system o Designed for storing and managing files on disk media o Build logical system on top of physical disk organization Tasks o Partition and format disks to store and retrieve information
More informationEngineering Development Group
Engineering Development Group (U) Angelfire v1.0 User's Manual Rev. 1.0 9 November 2011 1 of 21 Change Log Doc Rev Document Date Revision By Change Description Reference Approval Date 2 of 21 Table of
More informationShipStation Connect. Which scenario works for you?
ShipStation Connect Which scenario works for you? ShipStation Connect. what is it? ShipStation Connect is an application that is installed on the computer with the Printers and/or Scales directly connected
More informationSymantec Encryption (PGP) Installation Guide
System Requirements Symantec Encryption (PGP) Installation Guide Windows 8 (32 and 64 bit versions) Windows 7 (32 and 64 bit versions)] Windows Vista (32- and 64-bit editions) Additional Requirements Boot
More informationLab 03. Windows Operating Systems (Cont.)
Lab 03 s (Cont.) Objectives Develop a good understanding of 1. The role of an operating system in a computer system 2. Services provided by an operating system and have some hands on experience in 1. Understanding
More informationDUAL OS INSTALLATION
Ex.No:15 Date: DUAL OS INSTALLATION Aim: To install and configure Ubuntu OS alongside Windows as installing dual OS. PROCEDURE: 1. Backup your Windows partition To open the Dell Backup and Recovery software
More information1. Download the latest version of the Kali Linux 64 bit ISO image:
Ronny Bull Pen Testing Talk Pre-Lab: Virtual Machine Setup Lab Objectives: Configure VirtualBox to support Kali Linux LiveCD and Metasploitable 2 Configure Virtualbox networking to support both NAT Network
More informationPractice Test. Guidance Software GD Guidance Software GD0-110 Certification Exam for EnCE Outside North America. Version 1.6
Guidance Software GD0-110 Guidance Software GD0-110 Certification Exam for EnCE Outside North America Practice Test Version 1.6 QUESTION NO: 1 A FAT directory has as a logical size of: A. One cluster B.
More informationVirtual Desktop Infrastructure Setup for Windows 7
Virtual Desktop Infrastructure Setup for Windows 7 Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or
More informationJNIOR. A Network I/O Resource Utilizing the JAVA Platform. JNIOR Support Tool Manual. Release 6.0
JNIOR A Network I/O Resource Utilizing the JAVA Platform Release 6.0 Supports JNIOR Series 3 and 4 JNIOR OS 3.4 or greater required INTEG Process Group, Inc. 2919 East Hardies Rd, First Floor Gibsonia,
More informationWA2493 What's New in Java 8. Classroom Setup Guide. Web Age Solutions Inc.
WA2493 What's New in Java 8 Classroom Setup Guide Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software Requirements...3 Part 3 - Software Provided...4
More informationRunning head: FTK IMAGER 1
Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although
More informationUser Account Manager
CHAPTER 4 Note User accounts can be accessed only when operating in Internal Directory mode. To access User tasks, log in to the system (see Logging In section on page 2-1). Then, from the Home page, click
More information2019/01/11 17:34 / How to configure MIFARE card memory layout
2019/01/11 17:34 / How to configure MIFARE card memory layout Table of Contents How to configure MIFARE card memory layout... 1 Understanding the memory structure of MIFARE Classic cards... 1 Manipulating
More informationClick All Programs Open Text Host explorer / Connection Central (Doing this brings up a Connection Central panel).
Secure Host Explorer FTP Setup Setup Instructions Host Explorer is the terminal emulation software that allows users to connect their PC to the mainframe in a secure environment. For example, this allows
More informationTouchscreen Driver Release Note
Touchscreen Driver Release Note Touchbase UPDD If you have purchased a CTC PowerStation or Industrial PC that has a touchscreen and that runs under a Windows operating system, your touchscreen driver is
More informationVDI Users Guide. Mac OS X
Mac OS X VDI Users Guide NOTICE: Access to electronic resources at Moraine Park Technical College is restricted to employees, students, or other individuals authorized by the College. By connecting to
More informationVirtual Desktop Infrastructure Setup for Windows 10
Virtual Desktop Infrastructure Setup for Windows 10 Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer
More informationStep by Step Guide to Creating a SQL Server VM Using VMWare
Step by Step Guide to Creating a SQL Server VM Using VMWare I typically use SQL Server VMs for my development and administration classes. I want the students to have full autonomy over the machines they
More informationBackup a copy of a router IOS from flash to a TFTP server. Reload the backup IOS software image from a TFTP server into flash on a router.
Lab 5.2.5 Managing IOS Images with TFTP Objective Backup a copy of a router IOS from flash to a TFTP server. Reload the backup IOS software image from a TFTP server into flash on a router. Background/Preparation
More informationSM L04 Veritas Operations Manager Advanced 4.0 RU1: Optimize Your Heterogeneous Storage Environment Hands-On Lab Description
SM L04 Veritas Operations Manager Advanced 4.0 RU1: Optimize Your Heterogeneous Storage Environment Hands-On Lab Description Veritas Operations Manager Advanced (VOM Advanced) is a comprehensive discovery
More informationANALYSIS AND VALIDATION
UNIT V ANALYSIS AND VALIDATION Validating Forensics Objectives Determine what data to analyze in a computer forensics investigation Explain tools used to validate data Explain common data-hiding techniques
More informationWA day Java prereq for Selenium. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2685 1 day Java prereq for Selenium Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationArchivists Toolkit Internal Database
Archivists Toolkit Internal Database The Archivists Toolkit now includes (AT 2.0, update 9 and later), support for an internal database based on HyperSQL 2.0 (HSQLDB). HyperSQL is a small, reliable, high
More information'phred dist acd.tar.z'
Phred is free for academic use but does require registration and for you to obtain a licence. Please visit http://www.phrap.org/consed/consed.html#howtoget and follow the instructions. A copy of the Phred
More information