Opentext™ Tableau™ Forensic TX1 Imager – User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Load more

OpenText™ Tableau™ Forensic TX1 Imager User Guide This guide presents a wide range of technical information and procedures for using the Tableau Forensic TX1 Imager. ISTX210300-UGD-EN-1 OpenText™ Tableau™ Forensic TX1 Imager User Guide ISTX210300-UGD-EN-1 Rev.: 2021-July-16 This documentation has been created for OpenText™ Tableau™ Forensic TX1 Imager 21.3. It is also valid for subsequent software releases unless OpenText has made newer documentation available with the product, on an OpenText website, or by any other means. Open Text Corporation 275 Frank Tompa Drive, Waterloo, Ontario, Canada, N2L 0A1 Tel: +1-519-888-7111 Toll Free Canada/USA: 1-800-499-6544 International: +800-4996-5440 Fax: +1-519-888-0677 Support: https://support.opentext.com For more information, visit https://www.opentext.com Copyright © 2021 Open Text. All Rights Reserved. Trademarks owned by Open Text. One or more patents may cover this product. For more information, please visit https://www.opentext.com/patents. Disclaimer No Warranties and Limitation of Liability Every effort has been made to ensure the accuracy of the features and techniques presented in this publication. However, Open Text Corporation and its affiliates accept no responsibility and offer no warranty whether expressed or implied, for the accuracy of this publication. Table of Contents 1 Preface ........................................................................................ 7 1.1 Drive capacity and transfer rate measurement conventions .................. 7 2 Overview ..................................................................................... 9 2.1 TX1 kit contents .............................................................................. 12 2.2 Navigating TX1 ............................................................................... 13 2.2.1 Home screen .................................................................................. 14 2.2.2 Side navigation menu ...................................................................... 15 2.2.3 Jobs tab ......................................................................................... 16 2.2.4 Job status ....................................................................................... 18 2.2.5 Quick Reference Guide ................................................................... 21 2.3 Reading the status LEDs ................................................................. 21 2.4 Interpreting audio feedback .............................................................. 21 2.5 On-screen warnings ........................................................................ 22 2.6 USB keyboard support .................................................................... 22 3 Configuring TX1 ....................................................................... 23 3.1 Startup sequence ............................................................................ 23 3.2 Configuring TX1 .............................................................................. 23 3.2.1 System settings .............................................................................. 23 3.2.2 Network settings ............................................................................. 26 3.2.2.1 Configuring 802.1X network authentication ....................................... 28 3.2.2.2 HTTPS certificate setup ................................................................... 32 3.2.3 Default settings ............................................................................... 33 3.2.4 User management ........................................................................... 35 3.2.5 Locking the system ......................................................................... 38 3.2.6 Updating TX1 firmware .................................................................... 39 3.3 Media utilities .................................................................................. 42 3.3.1 Content breakdown ......................................................................... 42 3.3.2 Wiping destination or accessory drives ............................................. 45 3.3.2.1 NIST 800-88r1 Compliance .............................................................. 51 3.3.3 Formatting destination and accessory drives ..................................... 52 3.3.4 Tableau encryption management ..................................................... 53 3.3.5 Encryption unlock ............................................................................ 55 3.3.5.1 Opal encryption ............................................................................... 55 3.3.5.2 BitLocker encryption ........................................................................ 56 3.3.5.3 APFS encryption ............................................................................. 57 3.3.6 Disabling drive capacity limiting configurations .................................. 58 3.3.6.1 Volatile HPA removal ...................................................................... 59 3.3.6.2 Non-volatile HPA/DCO/AMA removal ............................................... 60 3.3.7 Blank checking ................................................................................ 62 ISTX210300-UGD-EN-1 User Guide iii Table of Contents 3.3.8 Browse filesystem ........................................................................... 64 3.3.9 SMART data ................................................................................... 65 3.3.10 Export ............................................................................................ 66 3.3.11 Eject ............................................................................................... 68 3.4 Connecting drives ........................................................................... 69 3.4.1 Source drives .................................................................................. 69 3.4.2 Destination drives ........................................................................... 70 3.4.3 Accessory drives ............................................................................. 70 3.4.4 Drive detection ................................................................................ 70 4 Using TX1 ................................................................................. 73 4.1 Navigating TX1 features and options ................................................ 73 4.1.1 Home screen .................................................................................. 73 4.1.2 Jobs screen .................................................................................... 73 4.1.3 Side navigation menu ...................................................................... 73 4.2 Preconditions checking .................................................................... 74 4.3 Duplicating ..................................................................................... 74 4.3.1 Cloning ........................................................................................... 74 4.3.2 Imaging .......................................................................................... 75 4.3.3 Performing a duplication .................................................................. 75 4.3.3.1 Files created during disk-to-file duplication ........................................ 84 4.3.4 Using automated acquisition ............................................................ 85 4.3.5 Duplication over a network ............................................................... 93 4.3.5.1 Adding an iSCSI target .................................................................... 93 4.3.5.2 Adding a CIFS share ....................................................................... 99 4.3.6 Pausing and resuming a duplication job .......................................... 107 4.4 Hashing ........................................................................................ 114 4.5 Logical imaging ............................................................................. 118 4.5.1 Performing a logical image acquisition ............................................ 119 4.5.2 Include/exclude criteria .................................................................. 129 4.5.2.1 File type ....................................................................................... 131 4.5.2.2 Path ............................................................................................. 132 4.5.2.3 Folder .......................................................................................... 134 4.5.2.4 File size ........................................................................................ 134 4.5.2.5 File date ....................................................................................... 135 4.5.3 About the logical imaging process .................................................. 135 4.5.3.1 Logical image job status ................................................................ 135 4.5.3.2 Files created during logical imaging ................................................ 137 4.5.3.3 Logical image verification ............................................................... 138 4.5.3.4 Advanced logical imaging setup ..................................................... 138 4.5.4 File extensions .............................................................................. 139 4.5.5 Folders ......................................................................................... 141 iv OpenText™ Tableau™ Forensic TX1 Imager ISTX210300-UGD-EN-1 Table
Recommended publications
  • Tools and Prerequisites for Image Processing

    Tools and Prerequisites for Image Processing

    Tools and Prerequisites for Image Processing EE4830 Digital Image Processing http://www.ee.columbia.edu/~xlx/ee4830/ Lecture 1, Jan 26 th , 2009 Part 2 by Lexing Xie -2- Outline Review and intro in MATLAB A light-weight review of linear algebra and probability An introduction to image processing toolbox A few demo applications Image formats in a nutshell Pointers to image processing software and programming packages -3- Matlab is … : a numerical computing environment and programming language. Created by The MathWorks, MATLAB allows easy matrix manipulation, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs in other languages. Main Features: basic data structure is matrix optimized in speed and syntax for matrix computation Accessing Matlab on campus Student Version Matlab + Simulink $99 Image Processing Toolbox $59 Other relevant toolboxes $29~59 (signal processing, statistics, optimization, …) th CUNIX and EE lab (12 floor) has Matlab installed with CU site- license -4- Why MATLAB? Shorter code, faster computation Focus on ideas, not implementation C: #include <math.h> double x, f[500]; for( x=1.; x < 1000; x=x+2) f[(x-1)/2]=2*sin(pow(x,3.))/3+4.56; MATLAB: f=2*sin((1:2:1000).^3)/3+4.56; But: scripting language, interpreted, … … -5- MATLAB basic constructs M-files: functions scripts Language constructs Comment: % if .. else… for… while… end Help: help function_name, helpwin, helpdesk lookfor, demo -6- matrices … are rectangular “tables” of entries where the entries are numbers or abstract quantities … Some build-in matrix constructors a = rand(2), b = ones(2), c=eye(2), Addition and scalar product d = c*2; Dot product, dot-multiply and matrix multiplication c(:)’*a(:), d.*a, d*a Matrix inverse, dot divide, etc.
  • Leveraging Activation Sparsity for Training Deep Neural Networks

    Leveraging Activation Sparsity for Training Deep Neural Networks

    Compressing DMA Engine: Leveraging Activation Sparsity for Training Deep Neural Networks Minsoo Rhu Mike O’Connor Niladrish Chatterjee Jeff Pool Stephen W. Keckler NVIDIA Santa Clara, CA 95050 fmrhu, moconnor, nchatterjee, jpool, [email protected] Abstract—Popular deep learning frameworks require users to the time needed to copy data back and forth through PCIe is fine-tune their memory usage so that the training data of a deep smaller than the time the GPU spends computing the DNN neural network (DNN) fits within the GPU physical memory. forward and backward propagation operations, vDNN does Prior work tries to address this restriction by virtualizing the memory usage of DNNs, enabling both CPU and GPU memory not affect performance. For networks whose memory copying to be utilized for memory allocations. Despite its merits, vir- operation is bottlenecked by the data transfer bandwidth of tualizing memory can incur significant performance overheads PCIe however, vDNN can incur significant overheads with an when the time needed to copy data back and forth from CPU average 31% performance loss (worst case 52%, Section III). memory is higher than the latency to perform the computations The trend in deep learning is to employ larger and deeper required for DNN forward and backward propagation. We introduce a high-performance virtualization strategy based on networks that leads to large memory footprints that oversub- a “compressing DMA engine” (cDMA) that drastically reduces scribe GPU memory [13, 14, 15]. Therefore, ensuring the the size of the data structures that are targeted for CPU-side performance scalability of the virtualization features offered allocations.
  • A Large-Scale Study of File-System Contents

    A Large-Scale Study of File-System Contents

    A Large-Scale Study of File-System Contents John R. Douceur and William J. Bolosky Microsoft Research Redmond, WA 98052 {johndo, bolosky}@microsoft.com ABSTRACT sizes are fairly consistent across file systems, but file lifetimes and file-name extensions vary with the job function of the user. We We collect and analyze a snapshot of data from 10,568 file also found that file-name extension is a good predictor of file size systems of 4801 Windows personal computers in a commercial but a poor predictor of file age or lifetime, that most large files are environment. The file systems contain 140 million files totaling composed of records sized in powers of two, and that file systems 10.5 TB of data. We develop analytical approximations for are only half full on average. distributions of file size, file age, file functional lifetime, directory File-system designers require usage data to test hypotheses [8, size, and directory depth, and we compare them to previously 10], to drive simulations [6, 15, 17, 29], to validate benchmarks derived distributions. We find that file and directory sizes are [33], and to stimulate insights that inspire new features [22]. File- fairly consistent across file systems, but file lifetimes vary widely system access requirements have been quantified by a number of and are significantly affected by the job function of the user. empirical studies of dynamic trace data [e.g. 1, 3, 7, 8, 10, 14, 23, Larger files tend to be composed of blocks sized in powers of two, 24, 26]. However, the details of applications’ and users’ storage which noticeably affects their size distribution.
  • NXP Eiq Machine Learning Software Development Environment For

    NXP Eiq Machine Learning Software Development Environment For

    AN12580 NXP eIQ™ Machine Learning Software Development Environment for QorIQ Layerscape Applications Processors Rev. 3 — 12/2020 Application Note Contents 1 Introduction 1 Introduction......................................1 Machine Learning (ML) is a computer science domain that has its roots in 2 NXP eIQ software introduction........1 3 Building eIQ Components............... 2 the 1960s. ML provides algorithms capable of finding patterns and rules in 4 OpenCV getting started guide.........3 data. ML is a category of algorithm that allows software applications to become 5 Arm Compute Library getting started more accurate in predicting outcomes without being explicitly programmed. guide................................................7 The basic premise of ML is to build algorithms that can receive input data and 6 TensorFlow Lite getting started guide use statistical analysis to predict an output while updating output as new data ........................................................ 8 becomes available. 7 Arm NN getting started guide........10 8 ONNX Runtime getting started guide In 2010, the so-called deep learning started. It is a fast-growing subdomain ...................................................... 16 of ML, based on Neural Networks (NN). Inspired by the human brain, 9 PyTorch getting started guide....... 17 deep learning achieved state-of-the-art results in various tasks; for example, A Revision history.............................17 Computer Vision (CV) and Natural Language Processing (NLP). Neural networks are capable of learning complex patterns from millions of examples. A huge adaptation is expected in the embedded world, where NXP is the leader. NXP created eIQ machine learning software for QorIQ Layerscape applications processors, a set of ML tools which allows developing and deploying ML applications on the QorIQ Layerscape family of devices.
  • Table of Contents Modules and Packages

    Table of Contents Modules and Packages

    Table of Contents Modules and Packages...........................................................................................1 Software on NAS Systems..................................................................................................1 Using Software Packages in pkgsrc...................................................................................4 Using Software Modules....................................................................................................7 Modules and Packages Software on NAS Systems UPDATE IN PROGRESS: Starting with version 2.17, SGI MPT is officially known as HPE MPT. Use the command module load mpi-hpe/mpt to get the recommended version of MPT library on NAS systems. This article is being updated to reflect this change. Software programs on NAS systems are managed as modules or packages. Available programs are listed in tables below. Note: The name of a software module or package may contain additional information, such as the vendor name, version number, or what compiler/library is used to build the software. For example: • comp-intel/2016.2.181 - Intel Compiler version 2016.2.181 • mpi-sgi/mpt.2.15r20 - SGI MPI library version 2.15r20 • netcdf/4.4.1.1_mpt - NetCDF version 4.4.1.1, built with SGI MPT Modules Use the module avail command to see all available software modules. Run module whatis to view a short description of every module. For more information about a specific module, run module help modulename. See Using Software Modules for more information. Available Modules (as
  • Gaussplot 8.0.Pdf

    Gaussplot 8.0.Pdf

    GAUSSplotTM Professional Graphics Aptech Systems, Inc. — Mathematical and Statistical System Information in this document is subject to change without notice and does not represent a commitment on the part of Aptech Systems, Inc. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of the agreement. The purchaser may make one copy of the software for backup purposes. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose other than the purchaser’s personal use without the written permission of Aptech Systems, Inc. c Copyright 2005-2006 by Aptech Systems, Inc., Maple Valley, WA. All Rights Reserved. ENCSA Hierarchical Data Format (HDF) Software Library and Utilities Copyright (C) 1988-1998 The Board of Trustees of the University of Illinois. All rights reserved. Contributors include National Center for Supercomputing Applications (NCSA) at the University of Illinois, Fortner Software (Windows and Mac), Unidata Program Center (netCDF), The Independent JPEG Group (JPEG), Jean-loup Gailly and Mark Adler (gzip). Bmptopnm, Netpbm Copyright (C) 1992 David W. Sanderson. Dlcompat Copyright (C) 2002 Jorge Acereda, additions and modifications by Peter O’Gorman. Ppmtopict Copyright (C) 1990 Ken Yap. GAUSSplot, GAUSS and GAUSS Engine are trademarks of Aptech Systems, Inc. Tecplot RS, Tecplot, Preplot, Framer and Amtec are registered trademarks or trade- marks of Amtec Engineering, Inc. Encapsulated PostScript, FrameMaker, PageMaker, PostScript, Premier–Adobe Sys- tems, Incorporated. Ghostscript–Aladdin Enterprises. Linotronic, Helvetica, Times– Allied Corporation.
  • Latency-Aware, Inline Data Deduplication for Primary Storage

    Latency-Aware, Inline Data Deduplication for Primary Storage

    iDedup: Latency-aware, inline data deduplication for primary storage Kiran Srinivasan, Tim Bisson, Garth Goodson, Kaladhar Voruganti NetApp, Inc. fskiran, tbisson, goodson, [email protected] Abstract systems exist that deduplicate inline with client requests for latency sensitive primary workloads. All prior dedu- Deduplication technologies are increasingly being de- plication work focuses on either: i) throughput sensitive ployed to reduce cost and increase space-efficiency in archival and backup systems [8, 9, 15, 21, 26, 39, 41]; corporate data centers. However, prior research has not or ii) latency sensitive primary systems that deduplicate applied deduplication techniques inline to the request data offline during idle time [1, 11, 16]; or iii) file sys- path for latency sensitive, primary workloads. This is tems with inline deduplication, but agnostic to perfor- primarily due to the extra latency these techniques intro- mance [3, 36]. This paper introduces two novel insights duce. Inherently, deduplicating data on disk causes frag- that enable latency-aware, inline, primary deduplication. mentation that increases seeks for subsequent sequential Many primary storage workloads (e.g., email, user di- reads of the same data, thus, increasing latency. In addi- rectories, databases) are currently unable to leverage the tion, deduplicating data requires extra disk IOs to access benefits of deduplication, due to the associated latency on-disk deduplication metadata. In this paper, we pro- costs. Since offline deduplication systems impact la-
  • My Sons Postponed to March 18-19 Artist Series Please: Return Those Books!

    My Sons Postponed to March 18-19 Artist Series Please: Return Those Books!

    » LWA Darlings Don Colonial Garb for Minuet Ans^nsçhuetz, Bekkdal, Jensen and Ladw ig Lib*.Ire Honored at Traditional Banquet A dainty Mozart minuet intro-1 duced Lawrence college’s four Best tian. president of the Spanish Loved senior women at the annual club. « colonial banquet last Monday eve­ Tekla Bekkedal as vice-president ning in the dining hall of the First of the Student Christian association, Congregational church. Chosen for the Best Loved honor this year and is active in the International were Mary Anschuetz, Tekla Bek- Relations club, the German club kedal, Mary Ellen Jensen and Joan tind on The Lawrentian staff. She Ladwig. Complete with powdered wras chosen for membership in hair, they were dressed in tradi­ Sigrna, underclass scholastic group, tional colonial costumes of George and is now a counselor to freshman and Martha Washington and James women. and Dolly Madison. Miss Jensen is yico-president and The best loved tradition, which Pled*e mistress of Alpha Chi Ome- has been observed for more than 20 *?a- ^lcr social sorority, and also is years, is sponsored by the Lawrencei^fHiated w'ith Sigma Alpha Iota, Women’s association, under the so- professional music sorority. A music Cial chairmanship this year of Viv- major, she sings in the college con- ia n Grady and Betty Wheeler. V iv - cert choir and plays in several in- ia n was toastmistress for the ban- strumental groups. Last fall she was quet and Mrs. Kenneth Davis, Ap-¡chosen attendant to the homecom- pleton. a Best Loved in 1947, gave ¡ ‘ " 8 queen and she has also served a toast to the new electees and pre- as a counselor to freshman women, tented them with small bracelets on! Best Loved banquets are not behalf of last year’s group.
  • On the Performance Variation in Modern Storage Stacks

    On the Performance Variation in Modern Storage Stacks

    On the Performance Variation in Modern Storage Stacks Zhen Cao1, Vasily Tarasov2, Hari Prasath Raman1, Dean Hildebrand2, and Erez Zadok1 1Stony Brook University and 2IBM Research—Almaden Appears in the proceedings of the 15th USENIX Conference on File and Storage Technologies (FAST’17) Abstract tions on different machines have to compete for heavily shared resources, such as network switches [9]. Ensuring stable performance for storage stacks is im- In this paper we focus on characterizing and analyz- portant, especially with the growth in popularity of ing performance variations arising from benchmarking hosted services where customers expect QoS guaran- a typical modern storage stack that consists of a file tees. The same requirement arises from benchmarking system, a block layer, and storage hardware. Storage settings as well. One would expect that repeated, care- stacks have been proven to be a critical contributor to fully controlled experiments might yield nearly identi- performance variation [18, 33, 40]. Furthermore, among cal performance results—but we found otherwise. We all system components, the storage stack is the corner- therefore undertook a study to characterize the amount stone of data-intensive applications, which become in- of variability in benchmarking modern storage stacks. In creasingly more important in the big data era [8, 21]. this paper we report on the techniques used and the re- Although our main focus here is reporting and analyz- sults of this study. We conducted many experiments us- ing the variations in benchmarking processes, we believe ing several popular workloads, file systems, and storage that our observations pave the way for understanding sta- devices—and varied many parameters across the entire bility issues in production systems.
  • Multi-Media Imager Horizon ® G1 Multi-Media Imager

    Multi-Media Imager Horizon ® G1 Multi-Media Imager

    Hori zon ® G1 Multi-media Imager Horizon ® G1 Multi-media Imager Ove rview The Horizon G1 is an intelligent, desktop dry imager that produces diagnostic quality medical films plus grayscale paper prints if you choose the optional paper feature. The imager is compatible with many industry standard protocols including DICOM and Windows network printing. Horizon also features direct modality connection, with up to 24 simultaneous DICOM connections . High speed image processing, Optional A, A4 ,14”x17” 8” x10”, 14” x17” 11” x 14” Grayscale Pape r Blue and Clear Film Blue Film networking and spooling are standard. Speci fica tions Print Technology: Direct thermal (dry, daylight safe operatio n) Spatial Resolution: 320 DP I (12.6 pixels/mm) Throughput: Up to 100 films per hour Time To Operate: 5 minutes (ready to print from “of f”) Grayscale Contrast Resolutio n: 12 bits (4096) Media Inputs: One supply cassette, 8 0-100 sheets Media Outputs: One receive tray, 5 0-sheet capacity Media Sizes: 8” x 1 0”, 14” x 17” (blue and clea r), 11” x 14 ”(blu e) DirectVista ® Film Optional A, A4, 14” x 17” Direct Vista Grayscale Paper Dmax: >3.10 with Direct Vista Film Archival: >20 years with DirectVista Film, under ANSI extended-term storage conditions Media Supply: All media is pre-packaged and factory sealed Interfaces: Standard: 10/ 100/1,000 Base-T Ethernet (RJ- 45), Serial Console Network Protocols: Standard: 24 DICOM connections, FT P, LPR Optional: Windows network printing Image Formats: Standard: DICOM, TIFF, GIF, PCX, BMP, PGM, PNG, PPM, XWD, JPEG, SGI (RGB), Sunrise Express “Swa p” Service Sun Raster, Targa Smart Card from imager being replaced Optional: PostScript™ compatibility contains all of your internal settings such a s Image Qualit y: Manual calibration IP addresses, gamma and contras t .
  • The Ark Handbook

    The Ark Handbook

    The Ark Handbook Matt Johnston Henrique Pinto Ragnar Thomsen The Ark Handbook 2 Contents 1 Introduction 5 2 Using Ark 6 2.1 Opening Archives . .6 2.1.1 Archive Operations . .6 2.1.2 Archive Comments . .6 2.2 Working with Files . .7 2.2.1 Editing Files . .7 2.3 Extracting Files . .7 2.3.1 The Extract dialog . .8 2.4 Creating Archives and Adding Files . .8 2.4.1 Compression . .9 2.4.2 Password Protection . .9 2.4.3 Multi-volume Archive . 10 3 Using Ark in the Filemanager 11 4 Advanced Batch Mode 12 5 Credits and License 13 Abstract Ark is an archive manager by KDE. The Ark Handbook Chapter 1 Introduction Ark is a program for viewing, extracting, creating and modifying archives. Ark can handle vari- ous archive formats such as tar, gzip, bzip2, zip, rar, 7zip, xz, rpm, cab, deb, xar and AppImage (support for certain archive formats depends on the appropriate command-line programs being installed). In order to successfully use Ark, you need KDE Frameworks 5. The library libarchive version 3.1 or above is needed to handle most archive types, including tar, compressed tar, rpm, deb and cab archives. To handle other file formats, you need the appropriate command line programs, such as zipinfo, zip, unzip, rar, unrar, 7z, lsar, unar and lrzip. 5 The Ark Handbook Chapter 2 Using Ark 2.1 Opening Archives To open an archive in Ark, choose Open... (Ctrl+O) from the Archive menu. You can also open archive files by dragging and dropping from Dolphin.
  • Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P

    Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P

    Cryptographic File Systems Performance: What You Don't Know Can Hurt You Charles P. Wright, Jay Dave, and Erez Zadok Stony Brook University Appears in the proceedings of the 2003 IEEE Security In Storage Workshop (SISW 2003) Abstract interact with disks, caches, and a variety of other com- plex system components — all having a dramatic effect Securing data is more important than ever, yet cryp- on performance. tographic file systems still have not received wide use. In this paper we perform a real world performance One barrier to the adoption of cryptographic file systems comparison between several systems that are used is that the performance impact is assumed to be too high, to secure file systems on laptops, workstations, and but in fact is largely unknown. In this paper we first moderately-sized file servers. We also emphasize multi- survey available cryptographic file systems. Second, programming workloads, which are not often inves- we perform a performance comparison of a representa- tigated. Multi-programmed workloads are becoming tive set of the systems, emphasizing multiprogrammed more important even for single user machines, in which workloads. Third, we discuss interesting and counterin- Windowing systems are often used to run multiple appli- tuitive results. We show the overhead of cryptographic cations concurrently. We expect cryptographic file sys- file systems can be minimal for many real-world work- tems to become a commodity component of future oper- loads, and suggest potential improvements to existing ating systems. systems. We have observed not only general trends with We present results from a variety of benchmarks, an- each of the cryptographic file systems we compared but alyzing the behavior of file systems for metadata op- also anomalies based on complex interactions with the erations, raw I/O operations, and combined with CPU operating system, disks, CPUs, and ciphers.