Freeotfe / Freeotfe4pda

Total Page:16

File Type:pdf, Size:1020Kb

Freeotfe / Freeotfe4pda FreeOTFE / FreeOTFE4PDA PC version: v5.21 PDA version: v5.21 By Sarah Dean [email protected] Last updated: 7th February 2010 http://www.FreeOTFE.org/ A free on-the-fly transparent disk encryption program for MS Windows 2000/XP/Vista/Windows 7 PCs (both 32 and 64 bit) and Windows Mobile 2003/2005 and Windows Mobile 6 and later PDAs. Contents 1 Introduction . 1 1.1 Features . 1 2 Download . 5 3 Installation and Upgrading . 6 3.1 PC Version . 6 3.1.1 Automatic installation . 6 3.1.2 Manual installation . 6 3.1.3 Additional Information for Windows Vista x64 and Windows 7 x64 Users Only . 8 3.2 PDA Version . 12 3.2.1 Faster mounting . 13 3.2.2 Alternative drivers . 13 4 Getting Started Guide . 14 4.1 Installation/Portable mode . 14 4.2 Using FreeOTFE . 14 4.3 Creating a new volume . 14 4.4 Mounting volumes . 16 4.5 Dismounting volumes . 18 4.6 Changing a volume’s password . 19 5 Advanced Topics . 21 5.1 Keyfiles . 21 5.1.1 Creating a new keyfile . 21 5.1.2 Mounting a volume using a keyfile . 21 5.2 Partition/Entire Disk Based Volumes . 22 5.2.1 Safety Precautions . 22 5.2.2 Special Note for Windows Vista x64 (64 bit) and Windows 7 (64 bit) Users .. 23 5.3 Creating Hidden Volumes . 24 5.4 Volume Creation: Advanced Options . 25 5.4.1 Key Iterations . 25 5.4.2 Salt . 25 5.4.3 Drive Letter . 26 5.4.4 CDB Location . 26 5.4.5 Padding . 26 5.5 Password Entry: Advanced Options . 27 5.5.1 Advanced Security Details . 27 5.5.2 Mount Options . 28 5.5.3 Mountpoint . 29 5.6 Driver Control . 29 5.6.1 Installing New Drivers . 30 5.6.2 Modify Existing Drivers . 30 5.7 Enabling/Disabling Hash/Cypher Algorithms . 31 6 Portable Mode . 33 6.1 Portable Mode and Removable Media . 34 7 Security Token/Smartcard Support . 35 7.1 Initial configuration . 35 7.2 Secure Keyfile Store . 36 7.2.1 Usage . 36 7.3 Token Encryption . 37 7.3.1 Usage . 37 i 7.4 PIN Entry . 38. 7.4.1 Secure authentication path . 39. 8 Command Line Interface . 40. 8.1 PC Version . 40. 8.1.1 Synopsis . 40. 8.1.2 Description . 40. 8.1.3 Options . 40. 8.1.4 Exit Codes . 43. 8.1.5 Examples . 43. 8.2 PDA Version . 44. 8.2.1 Synopsis . 44. 8.2.2 Description . 45. 8.2.3 Options . 45. 8.2.4 Exit Codes . 46. 8.2.5 Examples . 46. 9 Linux Volumes . 47. 9.1 Creating Linux Volumes . 47. 9.2 Hiding a Linux Volume Within Another Volume . 48. 9.3 Mounting Volumes Created under Linux . 48. 9.4 Cryptoloop Specific Information . 48. 9.4.1 Hash Selection . 49. 9.4.2 Cryptoloop and RIPEMD-160 . 49. 9.4.3 Cypher Selection . 49. 9.5 dm-crypt Specific Information . 49. 9.5.1 /dev/loop1 Usage in the Examples Included in this Documentation .. 49. 9.5.2 Hash Selection . 50. 9.5.3 ESSIV . 51. 9.6 LUKS Specific Information . 51. 9.6.1 ESSIV . 51. 9.6.2 FreeOTFE Supported LUKS Cyphers . 52. 9.6.3 FreeOTFE Supported LUKS Cypher modes . 52. 9.6.4 FreeOTFE Supported LUKS hashes . 52. 9.7 Additional Notes on Linux Volumes . 53. 9.8 Examples: Cryptoloop . 53. 9.8.1 Initial Setup . 54. 9.8.2 Defaults . 54. 9.8.3 Example #1: Volume Without Encryption . 54. 9.8.4 Example #2: Volume Encrypted Using XOR . 55. 9.8.5 Example #3: Volume Encrypted Using 128 bit AES .. 56. 9.8.6 Example #4: Volume Encrypted Using 256 bit AES .. 57. 9.8.7 Example #5: Volume Encrypted Using 256 bit AES and rmd160 Hash .. 58. 9.8.8 Example #6: Volume Encrypted Using 256 bit AES and Seed Value .. 59. 9.8.9 Example #7: Volume Encrypted Using 256 bit AES and Offset .. 60. 9.8.10 Example #8: Volume Encrypted Using 256 bit Twofish .. 60. 9.9 Examples: dm-crypt . 61. 9.9.1 Initial Setup . 61. 9.9.2 Defaults . 62. 9.9.3 Example #1: Volume Encrypted Using dm-crypt’s Default Encryption .. 62. 9.9.4 Example #2: Volume Encrypted Using 128 bit AES .. 63. 9.9.5 Example #3: Volume Encrypted Using 256 bit AES, using SHA256 ESSIV .. 64. ii 9.9.6 Example #4: Volume Encrypted Using 448 bit Blowfish .. 65. 9.9.7 Example #5: Volume Encrypted Using 256 bit Twofish and Offset .. 66. 9.9.8 Example #6: Volume Encrypted Using 256 bit AES with MD5 Password Hashing . 67. 9.9.9 Example #7: Volume Encrypted Using 448 bit Blowfish, MD5 Password Hashing and SHA-256 ESSIV . 68. 9.9.10 Example #8: Volume Encrypted Using AES-256 in XTS Mode (aka XTS-AES-256) .69 9.10 Examples: LUKS . 70. 9.10.1 Initial Setup . 70. 9.10.2 Defaults . 71. 9.10.3 Example #1: Volume Encrypted Using LUKS’s Default Encryption .. 71. 9.10.4 Example #2: Volume Encrypted Using 256 bit AES .. 72. 9.10.5 Example #3: Volume Encrypted Using 128 bit Twofish .. 73. 9.10.6 Example #4: Volume Encrypted Using 256 bit AES-XTS .. 73. 9.10.7 Example #5: Volume Encrypted Using 256 bit Serpent XTS .. 74. 10 Plausible Deniability . 76. 10.1 Overview . 76. 10.2 Legal Issues . 76. 10.3 Hidden Volumes . 77. 10.4 More Advanced Hidden Volumes . 77. 10.5 In Practice . 78. 11 Miscellaneous Notes . 79. 11.1 PC Version . 79. 11.1.1 Windows Vista and Windows 7 Specific . 80. 11.2 PDA Version . 81. 12 FAQ . 82. 12.1 FAQ Contents . 82. 12.1.1 General . 82. 12.1.2 FreeOTFE Specific (PC) . 83. 12.1.3 FreeOTFE4PDA Specific (PDA) . 85. 12.1.4 FreeOTFE Explorer Specific . 85. 12.2 General . 86. 12.3 FreeOTFE Specific (PC) . 101. 12.4 FreeOTFE4PDA Specific (PDA) . 116. 12.5 FreeOTFE Explorer Specific . 121. 13 Technical Details . 123. 13.1 FreeOTFE Volumes and Keyfiles . 123. 13.1.1 Notes . 123. 13.2 Technical Details: Critical Data Block Layouts . 123. 13.2.1 CDB Format ID 1 . 124. 13.2.2 CDB Format ID 2 . 131. 13.2.3 CDB Format ID 3 . 137. 13.2.4 CDB Format ID 4 . 142. 13.3 Creating FreeOTFE Volumes . 143. 13.3.1 Writing the CDB/keyfile . 143. 13.4 Mounting FreeOTFE Volumes . 144. 13.4.1 Additional information . 145. 13.5 Encrypted Partition Image Encryption/Decryption .. 146. 13.5.1 Per-Sector IV Generation . 146. 13.6 Registry Entries . 147. 13.7 Portable Mode Impact . 148. iii 13.8 Random Number Generators (RNGs) . 148. 13.8.1 Microsoft CryptoAPI . 149. 13.8.2 Mouse Movement . 149. 13.8.3 cryptlib . 149. 13.8.4 PKCS#11 Tokens . 149. 13.9 Building the Software . 149. 13.9.1 FreeOTFE . 150. 13.9.2 FreeOTFE4PDA . 153. 13.9.3 FreeOTFE Explorer . 153. 13.9.4 Building the Command Line Decryption Utilities .. 154. 13.9.5 Signing the Binaries . 155. 13.9.6 Additional Notes . 155. 13.10 Creating a New Hash/Cypher Driver . 156. 13.10.1 Hash Length/Blocksize . 157. 13.10.2 Cypher Keysize/Blocksize . 158. 13.10.3 Miscellaneous Comments: Cypher Drivers .. 159. 13.11 Filename Extensions . 159. 14 Known Bugs . 160. 15 Fault/Bug Reporting . 161. 16 TODO List . 162. 17 Appendix A: Version History . 163. 17.1 PC Version . 163. 17.2 PDA Version . 170. 18 Appendix B: Credits . 173. 18.1 Translations . 173. 19 Appendix C: Licence . 174. 19.1 Preamble . 174. 19.2 FreeOTFE Licence (v1.1) . 174. 19.2.1 Exhibit A . 175. 19.2.2 Exhibit B . 175. 19.2.3 Exhibit C . 175. 19.2.4 Exhibit D . 175. 20 Appendix D: Glossary . 176. 21 Appendix E: PKCS#11 Driver Libraries . 177. 22 Appendix F: Command Line Decryption Utilities . 183. 22.1 Overview . 183. 22.2 Operation.
Recommended publications
  • Omegakey Manage Your Device at the Management Module
    Welcome to use our latest version of Lost Mode How to Start to Use it Bluetooth tracker. Detect the distance between the device and Bluetooth Tracker module your phone under the lost mode .Turn on the Step 1: Download the latest version App(version 1.6.0) from Apple App store. omegakey Manage your device at the management module. alarm at alert whether the device is lost, there Step 2: Open the Bluetooth and App. are two levels of lost alarm mode. Select the Thank you for purchasing omegakey Freely set and remove your device here. Step 3: Tap the Beacon for 3-5 times on hard surface, and the Beacon will be connectable when you Double-click the “call” button to find your device. alarm mode you want from the device. Phone hear a buzz. alarm, and both ends alarm. Step 4: Click the Beacon in the App which you want to configure and enter a name to connect it. Step 5: Now, you can configure and use the Beacon normally. NEXT Note: If you're having trouble with the Bluetooth, we recommend you completely remove the battery from the unit for 10 sec and reinsert it. There are many apps you can download some are better than others, we have linked just click on the apple / android icons on the first page Once you have selected the app you like download it and follow the on screen instructions ATTACH BLUETOOTH BEACON EXTERNALLY FOR MAX PERFORMANCE Found mode More View the alarm location or item's last location Find the device under the find mode according p.s make sure your Bluetooth is on and your phone is compatible with 4.0 Bluetooth to the strength of the signal.
    [Show full text]
  • A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes
    A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes Extremely fast forensic imaging speed surpassing 50GB/min. Clone PCIe to PCIe at speeds above 90GB/min Image to/from Thunderbolt™ 3/USB-C external storage enclosures with an optional I/O card. Image and verify from up to 5 source drives up to 9 destinations simultaneously Create a logical image to capture only specific files needed Concurrent Image+Verify greatly reduces duration of image plus verification process Two 10GbE connections provide fast network imaging performance Network capture feature to capture network traffic, VOIP, internet activity Multi-task. Image from multiple sources simultaneously FEATURES n The Falcon®-NEO achieves imaging speeds when imaging directly to large capacity Thunder- n Image from a Mac® computer with USB-C ports surpassing 50GB/min and can clone PCIe to PCIe bolt 3 RAID storage enclosures for evidence data using a USB-C to USB-A cable and Target Disk at speeds at over 90GB/min. collection. The card connects to the Falcon-NEO’s Mode or use Logicube’s USB boot device to n Image and verify to multiple image formats; 2 write-blocked source I/O ports or 1 destination I/O image a source drive from a Mac computer on the native copy, .dd, dmg, e01 and ex01. The Falcon- port. The I/O card does not currently support imaging same network without booting the Mac computer’s ® NEO provides MD5, SHA1, SHA256, and dual hash in TDM from Mac systems, refer to the Falcon-NEO native OS. The Falcon-NEO supports imaging from ® authentication at extremely fast speeds.
    [Show full text]
  • Mobiflage: Deniable Storage Encryption for Mobile Devices 3
    TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Mobiflage: Deniable Storage Encryption for Mobile Devices Adam Skillen and Mohammad Mannan Abstract—Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for storing hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms. Index Terms—File system security, Mobile platform security, Storage Encryption, Deniable encryption ✦ 1 INTRODUCTION AND MOTIVATION plaintext can be recovered by decrypting with the true key. In the event that a ciphertext is intercepted, and the Smartphones and other mobile computing devices are user is coerced into revealing the key, she may instead being widely adopted globally.
    [Show full text]
  • Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P
    Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P. Wright, Jay Dave, and Erez Zadok Stony Brook University Appears in the proceedings of the 2003 IEEE Security In Storage Workshop (SISW 2003) Abstract interact with disks, caches, and a variety of other com- plex system components — all having a dramatic effect Securing data is more important than ever, yet cryp- on performance. tographic file systems still have not received wide use. In this paper we perform a real world performance One barrier to the adoption of cryptographic file systems comparison between several systems that are used is that the performance impact is assumed to be too high, to secure file systems on laptops, workstations, and but in fact is largely unknown. In this paper we first moderately-sized file servers. We also emphasize multi- survey available cryptographic file systems. Second, programming workloads, which are not often inves- we perform a performance comparison of a representa- tigated. Multi-programmed workloads are becoming tive set of the systems, emphasizing multiprogrammed more important even for single user machines, in which workloads. Third, we discuss interesting and counterin- Windowing systems are often used to run multiple appli- tuitive results. We show the overhead of cryptographic cations concurrently. We expect cryptographic file sys- file systems can be minimal for many real-world work- tems to become a commodity component of future oper- loads, and suggest potential improvements to existing ating systems. systems. We have observed not only general trends with We present results from a variety of benchmarks, an- each of the cryptographic file systems we compared but alyzing the behavior of file systems for metadata op- also anomalies based on complex interactions with the erations, raw I/O operations, and combined with CPU operating system, disks, CPUs, and ciphers.
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • Mobigyges: a Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot
    MobiGyges: A Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot Wendi Fenga, Chuanchang Liua, Zehua Guob,c, Thar Bakerd, Gang Wangb,c, Meng Wanga, Bo Chenga, and Junliang Chena aBeijing University of Posts and Telecommunications, 10 Xitucheng RD, 100876, Beijing, China bBeijing Institute of Technology, 5 Zhongguancun ST South, 100081, Beijing, China cUniversity of Minnesota Twin Cities, 117 Pleasant ST, 55455, Minneapolis, USA dLiverpool John Moores University, James Parson Building, Liverpool, L3 3AF, UK Abstract Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage because of the \reserved area" used for avoiding data loss, and require device reboot when using the hidden volume. This paper presents MobiGyges, a hidden volume based mobile PDE system, to fill the gap. MobiGyges addresses the problem of data loss by restricting each storage block used only by one volume, and it improves storage utilization by eliminating the \reserved area". MobiGyges can also avoid device reboot by mounting the hidden volume dynamically on-demand with the Dynamic Mounting service. Moreover, we identify two novel PDE oriented attacks, the capacity comparison attack and the fill-to-full attack. MobiGyges can defend them by jointly leveraging the Shrunk U-disk method and multi-level deniability. We implement the MobiGyges proof-of-concept system on a real mobile phone Google Nexus 6P with LineageOS 13. Experimental results show that MobiGyges prevents data loss, avoids device reboot, improves storage utilization by over 30% with acceptable performance overhead compared with current works.
    [Show full text]
  • Or As I Like to Call It, Occult Computing Adrian Crenshaw
    Or as I like to call it, Occult Computing Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I don’t know everything - I’m just a geek with time on my hands http://Irongeek.com Occult comes from the Latin word occultus (clandestine, hidden, secret), referring to "knowledge of the hidden". Forensic: Relating to the use of science and technology in the investigation and establishment of facts or evidence in a court of law. Since hiding activities is what we are doing, Occult Computing seems like a good name. Since people are not necessarily hiding their activities from a court of law, the term anti-forensics may not apply. Occult Computing sounds cooler than Anti-forensics Cthulhu fhtagn http://Irongeek.com Thanks to Wikipedia and Wiktionary for wording of definitions Why: Not about just hiding your stash from the Fuzz… Law/policy enforcement may find it useful to know how folks hide their computer activities Users may want to know how to hide their activities from invasive law/policy enforcement Companies may want to know how to clear boxes before donating them What: Mostly Windows, but most ideas are applicable to other operating systems Not going to cover malware analysis, nor network anti-forensics (at least not much) Mostly we will cover hiding tracks left on storage media http://Irongeek.com 1. Don’t leave tracks in the first place 2. Selective file removal and encryption tools 3. Parlor Tricks 4. Nuke it from orbit, it's the only way to be sure http://Irongeek.com Bow down before my Venn diagram of doom!!! If it’s not easy, folks won’t do it.
    [Show full text]
  • Comparison of Disk Encryption Software 1 Comparison of Disk Encryption Software
    Comparison of disk encryption software 1 Comparison of disk encryption software This is a technical feature comparison of different disk encryption software. Background information Name Developer First released Licensing Maintained? ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes [1] BestCrypt Jetico 1993 Proprietary Yes BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes BitLocker Drive Encryption Microsoft 2006 Proprietary Yes Bloombase Keyparc Bloombase 2007 Proprietary Yes [2] CGD Roland C. Dowdeswell 2002-10-04 BSD Yes CenterTools DriveLock CenterTools 2008 Proprietary Yes [3][4][5] Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999 Proprietary Yes [6] CrossCrypt Steven Scherrer 2004-02-10 GPL No Cryptainer Cypherix (Secure-Soft India) ? Proprietary Yes CryptArchiver WinEncrypt ? Proprietary Yes [7] cryptoloop ? 2003-07-02 GPL No cryptoMill SEAhawk Proprietary Yes Discryptor Cosect Ltd. 2008 Proprietary Yes DiskCryptor ntldr 2007 GPL Yes DISK Protect Becrypt Ltd 2001 Proprietary Yes [8] cryptsetup/dmsetup Christophe Saout 2004-03-11 GPL Yes [9] dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05 GPL Yes DriveCrypt SecurStar GmbH 2001 Proprietary Yes DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary Yes [10] E4M Paul Le Roux 1998-12-18 Open source No e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes Dustin Kirkland, Tyler Hicks, (formerly [11] eCryptfs 2005 GPL Yes Mike Halcrow) FileVault Apple Inc. 2003-10-24 Proprietary Yes FileVault 2 Apple Inc. 2011-7-20 Proprietary
    [Show full text]
  • A New Standard in Digital Forensics
    A New Standard in Digital Forensics Extremely fast forensic imaging at over 30GB/min* Image and verify from 4 source drives to 5 destinations Write-blocked preview & triage of suspect drive contents Image to or from a network location Multi-task. Set Image, wipe, hash tasks to run concurrently Targeted Imaging feature allows you to create a logical image using pre-set, custom filters, file signature filters and/or keyword search to capture only specific files needed Supports PCIe SSDs (M.2 SATA/AHCI/NVME type) with optional adapters Without exception, the most technologically advanced forensic imaging solution available. Blazing fast performance, feature-packed, and designed to meet future technology advances, the Falcon sets a new standard of excellence in digital forensic imaging solutions. FEATURES ­n The Falcon is blazing fast with imaging speeds of ­n Built-in support for SAS/SATA/USB3/FireWire n Write-blocked preview/triage hard drive contents. over 30GB/min* storage devices. Adapters are included with Use the Falcon as a write-blocker. The file browser ­n Image and verify to multiple image formats; Falcon to support 1.8”/2.5”/3.5”/1.8” ZIF IDE and feature provides write-blocked access to source or native copy, dd image, e01, ex01 and file-based microSATA drive interfaces. Optional adapters are destination drives connected to Falcon. View the copy. Compression available for E01/Ex01 available for eSATA, mSATA and compact flash drive’s partitions and contents and view text files, formats. Uses SHA1, SHA256, MD5 and dual-hash drives. An optional SCSI module provides support jpeg, PDF, XML, or HTML files.
    [Show full text]
  • Falcon®-NEO User's Manual
    Falcon®-NEO User’s Manual Logicube, Inc. Chatsworth, CA 91311 USA Phone: 818 700 8488 Fax: 818 700 8466 Version: 3.2u1 Date: 10/22/2020 MAN-FALCON-NEO Logicube Falcon®-NEO User’s Manual I Limitation of Liability and Warranty Information Logicube Disclaimer LOGICUBE IS NOT LIABLE FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO PROPERTY DAMAGE, LOSS OF TIME OR DATA FROM USE OF A LOGICUBE PRODUCT, OR ANY OTHER DAMAGES RESULTING FROM PRODUCT MALFUNCTION OR FAILURE OF (INCLUDING WITHOUT LIMITATION, THOSE RESULTING FROM: (1) RELIANCE ON THE MATERIALS PRESENTED, (2) COSTS OF REPLACEMENT GOODS, (3) LOSS OF USE, DATA OR PROFITS, (4) DELAYS OR BUSINESS INTERRUPTIONS, (5) AND ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE (OR FROM DELAYS IN SERVICING OR INABILITY TO RENDER SERVICE ON ANY) LOGICUBE PRODUCT. LOGICUBE MAKES EVERY EFFORT TO ENSURE PROPER OPERATION OF ALL PRODUCTS. HOWEVER, THE CUSTOMER IS RESPONSIBLE TO VERIFY THAT THE OUTPUT OF LOGICUBE PRODUCT MEETS THE CUSTOMER’S QUALITY REQUIREMENT. THE CUSTOMER FURTHER ACKNOWLEDGES THAT IMPROPER OPERATION OF LOGICUBE PRODUCT AND/OR SOFTWARE, OR HARDWARE PROBLEMS, CAN CAUSE LOSS OF DATA, DEFECTIVE FORMATTING, OR DATA LOADING. LOGICUBE WILL MAKE EFFORTS TO SOLVE OR REPAIR ANY PROBLEMS IDENTIFIED BY CUSTOMER, EITHER UNDER WARRANTY OR ON A TIME AND MATERIALS BASIS. Warranty DISCLAIMER IMPORTANT - PLEASE READ THE TERMS OF THIS AGREEMENT CAREFULLY. BY INSTALLING OR USING LOGICUBE PRODUCTS, YOU AGREE TO BE BOUND BY THIS AGREEMENT. IN NO EVENT WILL LOGICUBE BE LIABLE (WHETHER UNDER THIS AGREEMENT, RESULTING FROM THE PERFORMANCE OR USE OF LOGICUBE PRODUCTS, OR OTHERWISE) FOR ANY AMOUNTS REPRESENTING LOSS OF PROFITS, LOSS OR INACCURACY OF DATA, LOSS OR DELAYS OF BUSINESS, LOSS OF TIME, COSTS OF PROCUREMENT OF SUBSTITUTE GOODS, SERVICES, OR TECHNOLOGY, PROPERTY DAMAGE, OR INDIRECT, CONSEQUENTIAL, OR PUNITIVE DAMAGES OF A PURCHASER OR USER OF LOGICUBE PRODUCTS OR ANY THIRD PARTY.
    [Show full text]
  • Joseph Migga Kizza Fourth Edition
    Computer Communications and Networks Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Computer Communications and Networks Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham Campus Swindon, UK The Computer Communications and Networks series is a range of textbooks, monographs and handbooks. It sets out to provide students, researchers, and nonspecialists alike with a sure grounding in current knowledge, together with comprehensible access to the latest developments in computer communications and networking. Emphasis is placed on clear and explanatory styles that support a tutorial approach, so that even the most complex of topics is presented in a lucid and intelligible manner. More information about this series at http://www.springer.com/series/4198 Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Joseph Migga Kizza University of Tennessee Chattanooga, TN, USA ISSN 1617-7975 ISSN 2197-8433 (electronic) Computer Communications and Networks ISBN 978-3-319-55605-5 ISBN 978-3-319-55606-2 (eBook) DOI 10.1007/978-3-319-55606-2 Library of Congress Control Number: 2017939601 # Springer-Verlag London 2009, 2013, 2015 # Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities
    Katana Tool Kit: Portable Applications Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities Portable applications are those which do not require installation on a system to be executed. They can be run directly from an external device allowing you to bring all your favorite applications around with you on one drive. The Katana Tool Kit comes preconfigured with over a hundred portable applications. Anti-Virus ClamAV 0.96 ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind. SpyDLLRemover 3.2 SpyDLLRemover is the standalone tool to effectively detect and delete spywares from the system. It comes with advanced spyware scanner which quickly discovers hidden Rootkit processes as well suspcious/injected DLLs within all running processes. StreamArmor 1 StreamArmor is the sophisticated tool for discovering hidden alternate data streams (ADS) as well as clean them completely from the system. It's advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. StreamArmor comes with fast multi threaded ADS scanner which can recursively scan over entire system and quickly uncover all hidden streams. Backup Unstoppable Copier 4.4 Unstoppable Copier is a Free Portable tool that allows you to recover files from hard drives, flash drives, CDs/DVDs and other media disks that have physical damage or are starting to go bad.
    [Show full text]