Client Confidentiality, Computer Security, and Counter Surveillance

Total Page:16

File Type:pdf, Size:1020Kb

Client Confidentiality, Computer Security, and Counter Surveillance I Spy: Client Confidentiality, Computer Security, and Counter Surveillance Wednesday, March 7, 2018 Noon–1 p.m. .5 Practical Skills credit and .5 Ethics credit I SPY: CLIENT CONFIDENTIALITY, COMPUTER SECURITY, AND COUNTER SURVEILLANCE The materials and forms in this manual are published by the Oregon State Bar exclusively for the use of attorneys. Neither the Oregon State Bar nor the contributors make either express or implied warranties in regard to the use of the materials and/or forms. Each attorney must depend on his or her own knowledge of the law and expertise in the use or modification of these materials. Copyright © 2018 OREGON STATE BAR 16037 SW Upper Boones Ferry Road P.O. Box 231935 Tigard, OR 97281-1935 I Spy: Client Confidentiality, Computer Security, and Counter Surveillance ii TABLE OF CONTENTS Schedule . v Faculty . v Presentation Slides. 1 Protecting Your Windows Computer . .43 Standard Disclaimer . .44 BIOS Password . .45 Encrypt Hard Disk Drives—Internal/External . .58 Windows BitLocker Supported Windows Version . 59 Drive Encryption for Windows 10 Home Edition Users. .77 Additional Backup and Encryption Tools to Protect Data on Your Computer . 126 Protecting Mac Computers . 133 Backup MAC OS X. .134 Mac Encryption . 174 Turn Off Encryption . 204 I Spy: Client Confidentiality, Computer Security, and Counter Surveillance iii I Spy: Client Confidentiality, Computer Security, and Counter Surveillance iv SCHEDULE Presented by Tom Howe, Howe & Associates, Portland 11:30 Registration Noon I Spy: Client Confidentiality, Computer Security, and Counter Surveillance F Protecting client confidential information F Securing client data, encryption, and effective passwords F Breach of attorney-client privilege through electronic surveillance and spyware F Backups to prevent data loss 1:00 Adjourn FACULTY Tom Howe, Howe & Associates, Portland. Mr. Howe is one of the leading e-discovery lawyers in the country, providing legal/technology consulting and expert witness services to the United States government, Fortune 500 corporations, law firms, and e-discovery service providers. He has also written major software systems for e-discovery vendors, law firms, and corporate clients. The Legal Operation Tracking System is a comprehensive program that tracks all legal matters within a corporate legal department, including its collection of documents and electronically stored information, enabling faster and more defensible discovery. Mr. Howe is a regular CLE presenter across the United States and internationally and has authored five books on law and technology. He is licensed to practice in Oregon and Washington and is certified in Computer Forensics and Electronic Counter Surveillance. I Spy: Client Confidentiality, Computer Security, and Counter Surveillance v I Spy: Client Confidentiality, Computer Security, and Counter Surveillance vi I Spy - Client Confidentiality, Computer Security, and Counter Surveillance Download Session Materials x Everything you see on these slides is contained in a PDF file. x You have it all! Please download a zip file with all the PowerPoint slides and sample documents for this session. Download Link: http://howelawfirm.com/events x Questions: Tom Howe 503-227-6660 [email protected] I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 1 Links to Vendors x Web links to vendors, products, and services are provided as examples. x Do your own research to find the best vendors, products, and services to meet the specific needs of your law firm. Standard Disclaimer x This material is provided for informational purposes only and does not establish, report, or create the standard of care for attorneys, nor does it represent a complete analysis of the topics presented. Attendees should conduct their own appropriate legal research. The information presented does not represent legal advice. x All technical information covered in this presentation should be confirmed with your IT staff or technical consultant to make sure it is applicable and correct for your IT system. I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 2 Electronic Discovery Lawyer/Expert What to Talk About? x Competency o You must understand and use electronic evidence (phones, computers, and social media) for your cases. o 99% of data is electronic! x Confidentiality o The focus of this presentation. One of the most fundamental concepts in ethics, more important today than ever, and high risk of discipline and licensing issues. I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 3 RULE 4-1.6: CONFIDENTIALITY OF INFORMATION (a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent... A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client. Agenda x Computer Security of Client Data o Laptop Stolen o Passwords o Encryption o Backups x Breach of Attorney-Client Privilege through Electronic Surveillance and Spyware x Computer Files: Metadata x Smartphones: Protecting Confidential Client Data x Closed Files: Destruction of Electronic Evidence I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 4 Protecting Client Data and Encryption Stolen Laptops Statistics x 3.5 million laptops are stolen each year x 10% of all laptops are stolen in the first year x $1.8 billion cost for lost stolen laptops each year I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 5 Stolen Laptop - Consequences x Ethical problem because of loss of client data. x Cost to replace the laptop x Cost and time to recreate the data (if that is even possible). x According to the National Archives & Records Administration, 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. Of those companies, 50% filed for bankruptcy immediately. x Identity theft Does Malpractice Coverage Exclude Data Breach? Example: Confidential or Private Data Exclusion. This Plan does not apply to any CLAIM arising out of or related to the loss, compromise or breach of or access to confidential or private information or data. If the insurer agrees to defend a SUIT that includes a CLAIM that falls within this exclusion, the PLF will not pay any CLAIMS EXPENSE relating to such CLAIM. I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 6 Stolen Laptop – Set a Bios Password x Set a password to prevent the computer from starting (before the operating system starts) x PC: Set a BIOS/UEFI Password x Mac: Set a firmware password: https://support.apple.com/en- us/HT204455 Protecting Your Windows Computers (132 Page) I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 7 Protecting Your Mac Computers (81 Page) Use Strong Passwords x Combination of letters (upper and lower), numbers, and special characters (#@*&+!). x Use a unique password for your computer and phone. x Do not put our password on post its on your monitor: I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 8 LoJack for Laptops x Remotely locate a stolen laptop. x Remotely wipe (delete) the data on the laptop. x http://www.lojack.com/Laptops x Cost: About $60 for 2 years or $80 for 3 years. Encryption x Encrypted data is highly secure (not human readable). x Demo: Access hard drive with another computer. I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 9 Windows 10 Home vs. Windows 10 Pro x Windows 10 Home edition does not include the BitLocker encryption software. x If you use Windows 10 Home, either upgrade to Windows 10 Pro or use other encryption software. See "Protecting Your Windows Computer." Encrypt All Devices x Computers x Phones x Hard Drives and Thumb Drive I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 10 Computer Backups (Disaster Recovery) x “Because backing up is hard to do” x Daily, weekly, and remote offsite backups. x Human error is the cause of 32% of all data loss. x Backup work throughout the day. Online Backups x www.crashplan.com x www.dropbox.com x www.carbonite.com x www.mozy.com I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 11 Surveillance: Protecting Client Data/Communications Protecting Attorney-Client Privileged Communications x “My spouse/partner is spying on me.” x Protecting Attorney-Client communications. I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 12 Counter Surveillance Overview x I don’t do surveillance; I stop it. x Certified at the largest private counter surveillance training center. x No marketing but more counter surveillance requests each year. x Example: Refog software x Example: Hospital Name Badge Hackers Target Law Firms for Confidential Data x Robert Mueller, former Director of the FBI: "I am convinced that there are only two types of companies: Those that have been hacked and those that will be." x Wall Street Journal: “Hackers Breach Law Firms …” I Spy: Client Confidentiality, Computer Security, and Counter Surveillance 13 Modern Times x There is no reason for a private investigator to sit in a car all night, drinking bad coffee and stale donuts, when you can buy a phone app for $1.99 Take it Serious – Ask Questions x Take it seriously and ask questions? o Who is spying on you? o Why? Motive? o How long? o Suspect knows things they could
Recommended publications
  • CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N
    CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N. Gutierrez Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 DECEPTIVE MEMORY SYSTEMS ADissertation Submitted to the Faculty of Purdue University by Christopher N. Gutierrez In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2017 Purdue University West Lafayette, Indiana ii THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL Dr. Eugene H. Spa↵ord, Co-Chair Department of Computer Science Dr. Saurabh Bagchi, Co-Chair Department of Computer Science Dr. Dongyan Xu Department of Computer Science Dr. Mathias Payer Department of Computer Science Approved by: Dr. Voicu Popescu by Dr. William J. Gorman Head of the Graduate Program iii This work is dedicated to my wife, Gina. Thank you for all of your love and support. The moon awaits us. iv ACKNOWLEDGMENTS Iwould liketothank ProfessorsEugeneSpa↵ord and SaurabhBagchi for their guidance, support, and advice throughout my time at Purdue. Both have been instru­ mental in my development as a computer scientist, and I am forever grateful. I would also like to thank the Center for Education and Research in Information Assurance and Security (CERIAS) for fostering a multidisciplinary security culture in which I had the privilege to be part of. Special thanks to Adam Hammer and Ronald Cas­ tongia for their technical support and Thomas Yurek for his programming assistance for the experimental evaluation. I am grateful for the valuable feedback provided by the members of my thesis committee, Professor Dongyen Xu, and Professor Math­ ias Payer.
    [Show full text]
  • File Scavenger User Guide
    File Scavenger® Version 3.2 Comprehensive Data Recovery Tool For Microsoft® Windows® 7, Vista, XP, 2008, 2003, 2000 and NT User’s Guide Revision: 4 Date: September 2010 QueTek® Consulting Corporation COPYRIGHT © Copyright 1998-2010. This document contains materials protected by International Copyright Laws. All rights reserved. No part of this manual may be reproduced, transmitted or transcribed in any form and for any purpose without the express written permission of QueTek® Consulting Corporation. TRADEMARKS Companies and products mentioned in this manual are for identification purpose only. Product names or brand names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. NOTICE Reasonable effort has been made to ensure that the information in this manual is accurate. QueTek® Consulting Corporation assumes no liability for technical inaccuracies, typographical, or other errors contained herein. QueTek® Consulting Corporation provides this manual “as is” without warranty of any kind, either express or implied, including, but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall QueTek® Consulting Corporation be liable for any loss of profits, or for direct, indirect, special, incidental or consequential damages arising from any defect or error in QueTek® Consulting Corporation’s products or manuals. Information in this manual is subject to change without notice and does not represent a commitment on the part of QueTek® Consulting Corporation. User Guide - ii LICENSE AGREEMENT AND LIMITED WARRANTY READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY PRIOR TO PURCHASING THE LICENSE CODE TO UNLOCK FILE SCAVENGER®.
    [Show full text]
  • User's Manual Undelete® for Windows
    User’s Manual Undelete® for Windows® Up-to-the-minute Data Protection® July 2007 This document describes the installation and operation of the Undelete file recovery solutions. It applies to the Server, Desktop Client, Professional and Home Editions of Undelete and is intended for Windows users and system managers. Revision/Update Information: This is a revised manual Software Versions: Undelete 5.0 Server Edition Undelete 5.0 Professional Edition Undelete 5.0 Home Edition Undelete 5.0 Desktop Client Operating Systems: Windows Server 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California ________________________ July 2007 _________ © 2000 — 2007 by Diskeeper Corporation The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • System Profile
    Steve Sample’s Power Mac G5 6/16/08 9:13 AM Hardware: Hardware Overview: Model Name: Power Mac G5 Model Identifier: PowerMac11,2 Processor Name: PowerPC G5 (1.1) Processor Speed: 2.3 GHz Number Of CPUs: 2 L2 Cache (per CPU): 1 MB Memory: 12 GB Bus Speed: 1.15 GHz Boot ROM Version: 5.2.7f1 Serial Number: G86032WBUUZ Network: Built-in Ethernet 1: Type: Ethernet Hardware: Ethernet BSD Device Name: en0 IPv4 Addresses: 192.168.1.3 IPv4: Addresses: 192.168.1.3 Configuration Method: DHCP Interface Name: en0 NetworkSignature: IPv4.Router=192.168.1.1;IPv4.RouterHardwareAddress=00:0f:b5:5b:8d:a4 Router: 192.168.1.1 Subnet Masks: 255.255.255.0 IPv6: Configuration Method: Automatic DNS: Server Addresses: 192.168.1.1 DHCP Server Responses: Domain Name Servers: 192.168.1.1 Lease Duration (seconds): 0 DHCP Message Type: 0x05 Routers: 192.168.1.1 Server Identifier: 192.168.1.1 Subnet Mask: 255.255.255.0 Proxies: Proxy Configuration Method: Manual Exclude Simple Hostnames: 0 FTP Passive Mode: Yes Auto Discovery Enabled: No Ethernet: MAC Address: 00:14:51:67:fa:04 Media Options: Full Duplex, flow-control Media Subtype: 100baseTX Built-in Ethernet 2: Type: Ethernet Hardware: Ethernet BSD Device Name: en1 IPv4 Addresses: 169.254.39.164 IPv4: Addresses: 169.254.39.164 Configuration Method: DHCP Interface Name: en1 Subnet Masks: 255.255.0.0 IPv6: Configuration Method: Automatic AppleTalk: Configuration Method: Node Default Zone: * Interface Name: en1 Network ID: 65460 Node ID: 139 Proxies: Proxy Configuration Method: Manual Exclude Simple Hostnames: 0 FTP Passive Mode:
    [Show full text]
  • (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes
    Minnesota Journal of Law, Science & Technology Volume 7 Issue 2 Article 13 2006 Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes Andrew Moerke Mason Follow this and additional works at: https://scholarship.law.umn.edu/mjlst Recommended Citation Andrew M. Mason, Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes, 7 MINN. J.L. SCI. & TECH. 777 (2006). Available at: https://scholarship.law.umn.edu/mjlst/vol7/iss2/13 The Minnesota Journal of Law, Science & Technology is published by the University of Minnesota Libraries Publishing. MASON_FINAL_UPDATED 6/7/2006 6:39:12 PM Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes * Andrew Moerke Mason Electronic discovery (e-discovery) consumes time, money, and resources like few other aspects of modern-day litigation. Deleted data, metadata, backup data, and other intangible forms of information make e-discovery more complex and contentious than traditional discovery.1 Computer users generate and retain electronic documents with ease, leading to significantly greater amounts of data than in a paper-only world.2 E-discovery’s volume and complexity increase litigation costs and complicate discovery disputes between parties, draining both party and judicial resources. More vexing than other areas of e-discovery, e-discovery of deleted data demands expensive forensic techniques, dampens business productivity, and holds no guarantee of yielding evidence. Parties anguish over whether deleted files on a computer hard drive could contain information critical to a © 2006 Andrew Moerke Mason. * J.D. expected 2007, University of Minnesota Law School; B.S. 1999, University of California, Berkeley.
    [Show full text]
  • Mis Chuletas De Mac OS X Impreso El 9 De Junio De 2009, a Las 11:03 Horas
    Mis chuletas de Mac OS X Impreso el 9 de junio de 2009, a las 11:03 horas Índice 1 Versiones de Mac OS X 2 2 Hardware 2 2.1 MacBook casa 2 2.2 iMac trabajo 2 3 Uso 2 3.1 Atajos de teclado 2 3.2 Terminal (y comandos) 3 3.3 Aplicación por defecto 3 3.4 Arranque 4 3.4.1 Modo usuario único 4 3.4.2 Modo seguro 4 3.4.3 Arranque múltiple 4 3.4.4 Arranque de unidad de CD/DVD 4 3.5 Capturas de pantalla 4 3.5.1 Captura de pantalla de ordenador remoto 4 3.6 Redes mixtas: Windows 4 3.6.1 Compartiendo FAT32 y NTFS con Samba 5 3.7 Cambio de nombre de carpeta en red 5 3.8 Buscando símbolos 6 3.9 Dos instancias simultáneas de una aplicación 6 3.10 Finder 6 3.10.1 Atajo a carpeta superior 6 3.10.2 Ordena alfabéticamente 6 3.10.3 Ruta en Finder 6 3.10.4 Preferencias vista columnas 7 3.11 Vista previa 7 3.11.1 Añadir extensiones 7 3.11.2 Ver pdf inmediatamente o descargarlo 7 3.11.3 Zoom en modo vista previa 7 3.11.4 Crear pdf multipáginas desde imágenes en Vista Previa 7 3.12 Calendarios 8 3.12.1 Mezclar múltiples calendarios en uno 8 3.12.2 Sincronizar iCal y Google Calendar 8 3.13 Opciones avanzadas en cuentas 8 3.14 Correo 8 3.14.1 Thunderbird es indexado por Spotlight 8 3.14.2 Reparar índice en Mail 8 3.14.3 Correos con CCO (con copia oculta) 8 3.14.4 Copia del perfil de Mail 8 3.14.5 MS Entourage 9 3.15 Conexión a escritorio remoto 9 3.16 Añadir radios a iTunes 9 3.17 CD / DVD 9 3.17.1 Quemar un DVD-Video 9 3.17.2 Pasdar de .iso a .dmg y al revés 9 3.17.3 Crear una imagen ISO 9 3.18 Borrado seguro espacio libre 10 3.19 Borrar todas las papeleras de
    [Show full text]
  • Encase Forensic Version 6.18.0.59
    EnCase Forensic Version 6.18.0.59 Test Results for Deleted File Recovery and Active File Listing Tool (Revised) June 23, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division by the Office of Law Enforcement Standards of the National Institute of Standards and Technology. For additional information about the Cyber Security Division and ongoing projects, please visit www.cyber.st.dhs.gov. June 2014 Test Results for Deleted File Recovery and Active File Listing Tool: EnCase Forensic Version 6.18.0.59 Revised Contents Introduction ......................................................................................................................... 1 How to Read This Report ................................................................................................... 1 1 Results Summary .......................................................................................................... 2 1.1 FAT ........................................................................................................................ 3 1.2 ExFat ...................................................................................................................... 3 1.3 NTFS ...................................................................................................................... 3 1.4 ext ........................................................................................................................... 3 1.5 HFS+ .....................................................................................................................
    [Show full text]
  • Vcenter Server Upgrade
    vCenter Server Upgrade Update 2 VMware vSphere 7.0 vCenter Server 7.0 vCenter Server Upgrade You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2018-2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents 1 About vCenter Server Upgrade 7 2 vCenter Server Upgrade Options 8 Overview of the vSphere Upgrade Process 8 Overview of the vCenter Server Upgrade Process 10 vCenter Server Upgrade Compatibility 12 vCenter Server 7.0 Component Behavior Changes That Affect Upgrade 13 Removal of Platform Services Controller 14 Upgrade or Migration for vCenter Server Instances with an External Platform Services Controller 14 Upgrading or Migrating to vSphere License Service 15 Upgrading the Trust Authority vCenter Server 16 Differences Between vSphere Upgrades, Patches, Updates, and Migrations 16 Support for Upgrading a vCenter Server with Multi-Homing 17 Support for Federal Information Processing Standard 140-2 17 Support for Transport Security Layer 1.2 17 Moving from a Deprecated to a Supported vCenter Server Deployment Topology Before Upgrade or Migration 18 Example Upgrade Paths from vCenter Server 6.5 and 6.7 to vCenter Server 7.0 19 Example Migration Paths from vCenter Server for Windows to vCenter Server 7.0 20 3 Upgrading the vCenter Server Appliance 22 About the Upgrade Process of the vCenter Server Appliance 24 System Requirements for the New vCenter Server Appliance
    [Show full text]
  • Data Spillage Remediation Techniques in Hadoop
    Data Spillage Remediation Techniques in Hadoop Srinivas Jantali, Sunanda Mani College of Computer and Information Science Northeastern University Boston, USA {jantali.s, mani.s}@husky.neu.edu Abstract— Hadoop implements its own file system HDFS to different Hadoop clusters. A situation may arise where the (Hadoop Distributed File System) designed to run on commodity employee accidentally places a classified piece of data on the hardware to store and process large data sets. Data Spillage is a cluster meant for unclassified data. This situation is called data condition where a data set of higher classification is accidentally spillage and threatens the confidentiality of the classified data. stored on a system of lower classification. When deleted, the spilled Hadoop further augments the situation by replicating the data data remains forensically retrievable due to the fact that file across multiple data nodes, since it is designed to do so. The systems implement deletion by merely resetting pointers and spilled data is generally referred to as “dirty data” and the data marking corresponding space as available. The problem is nodes on which the dirty data resides are referred to as “dirty augmented in Hadoop as it is designed to create and store multiple nodes”. copies of same data to ensure high availability, thereby increasing risk to confidentiality of data. This paper proposes three approaches to eliminate such risk. In the first approach, the spilled data is securely overwritten with zero and random fills multiple times at the OS level, to render it forensically irretrievable. In the second approach, the Hadoop inbuilt delete function is enhanced to implement a secure deletion mechanism.
    [Show full text]
  • Security Target for Entrust/Truedeleteä (Eal 1)
    SECURITY TARGET FOR ENTRUST/TRUEDELETEä (EAL 1) Prepared for: Communications Security Establishment Prepared by: CGI Information Systems and Management Consultants Inc. 31 March 1999 Author: CGI Senior Consultant, Mr. Mike Riley Valid: 31 March 1999 CGI File number: CGI-ITSETF-99-01-ST-04 CB File number: 1999-CGI-02 Issue Number: 1.3 Page Count: 16 Security Target - CGI-ITSETF-99-01-ST-04 EAL 1 Trial Evaluation of Entrust/TrueDelete Document Change Log ST Section Change Reason for Change Date Changed Sec 5.1 Conformance to FDP_RIP OR CGI-1999-02-01 28 Feb 1999 Title Page CB Reference Number and Version OR CGI-1999-02-02 16 Feb 1999 Number Sec 5.1 Clarify description of “file clearing” OR CGI-1999-02-02 16 Feb 1999 Sec 5.3 Amend security requirements for the IT OR CGI-1999-02-03 20 Feb 1999 environment Sec 6.1 Clarify TOE Summary Specification OR CGI-1999-02-04 20 Feb 1999 Sec 6.1 TSS for the assurance requirements OR CGI-1999-02-05 20 Feb 1999 Sec 6.1 Description of TOE Security Functions OR CGI-1999-02-11 28 Feb 1999 Sec 1.1 Include Windows ’95 in ST ST Evaluation 7 March 1999 Identification Sec 1.2 Clarify file clearing (overwrite) ST Evaluation 7 March 1999 Sec 2 Clarify file clearing (overwrite) ST Evaluation 7 March 1999 Sec 3.1 Expand Assumptions ST Evaluation 7 March 1999 Sec 4.2 Trace Back to Threat ST Evaluation 7 March 1999 Sec 5.1 Clarify file clearing (overwrite) ST Evaluation 7 March 1999 Sec 6.1 Added to improve Certifier comments 7 March 1999 Sec 6.2 Re-numbered from 6.1 and revised to Addition of 6.1 7 March 1999 clarify file clearing (overwrite) Sec 6.3 Re-numbered from 6.2 Addition of 6.1 7 March 1999 Sec 8.2 Added Mapping ST Evaluation 7 March 1999 Sec 8.4 Added Mapping ST Evaluation 7 March 1999 CGI Information Systems and 31 March 1999 Management Consultants Inc.
    [Show full text]
  • Accidentally Deleted Documents Folder
    Accidentally Deleted Documents Folder Abbott often temper vivaciously when reconciliatory Davidson presumed dyspeptically and displume her dolium. Nikita is saturable and stabilized doggedly as inattentive Knox spatted indecorously and focalizes bluntly. Unsleeping Ritchie romanticized exigently and cutely, she summerset her lustrums besots mockingly. No longer recognized as recognising you delete the cabinet, select restore previous versions, pages visited and a perfect blend of accidentally deleted documents folder This folder deleted folders and delete a conspicuous notice. However, clear about some disk space force what not. Select the hard drive due to accidentally deleted, open a specific folder names and password you take to recover deleted? Volume Shadow Copy has burst be turned on customer the server to minor the backups. What does a data needing to delete a future. Note: key will recreate the file structure that resemble original file was in if it might also deleted. If the files with original file names and folder structures cannot be opened, music, team the AODocs library administration interface. Can someone getting help me hit this? PC much imagine the meantime. Delete keys instead of using the Delete option. Pro version of the program. Click upon the sorting option or prefer. My documents folders in my documents and then clear tree structure. You have deleted accidentally deleted files in windows? Can accidentally deleting an error is restored, accidental or the detailed steps. Here confirm this pull you will run how manifest can batch your accidentally deleted files using simple data recovery tool. So that folder, accidental deletion you accidentally deleted. Google Drive storage that clarify a safety net of sorts when thinking about how to fit a Google Drive recovery to recover deleted items from Google Drive due form the scenarios that are mentioned above below.
    [Show full text]
  • The Sleuth Kit (TSK)/Autopsy Software Version: Version 3.2.2/Version 2.24
    The Sleuth Kit (TSK) 3.2.2/Autopsy 2.24 Test Results for Deleted File Recovery and Active File Listing Tool July 2, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division by the Office of Law Enforcement Standards of the National Institute of Standards and Technology. For additional information about the Cyber Security Division and ongoing projects, please visit www.cyber.st.dhs.gov. July 2014 Test Results for Deleted File Recovery and Active File Listing Tool: The Sleuth Kit (TSK) 3.2.2/Autopsy 2.24 Contents Introduction ......................................................................................................................... 1 How to Read This Report .................................................................................................... 1 1 Results Summary .......................................................................................................... 2 1.1 FAT ........................................................................................................................ 3 1.2 ExFat ...................................................................................................................... 3 1.3 NTFS ............................................................................................................................4 1.4 ext ........................................................................................................................... 4 1.5 HFS+ .....................................................................................................................
    [Show full text]