Electronic Discovery Workbook

Total Page:16

File Type:pdf, Size:1020Kb

Electronic Discovery Workbook Computer Metadata File Electronic Discovery Workbook 2016 University of Texas School of Law LAW335E: E-Discovery and Digital Evidence Fall 2016 Ver. 16.0818 © Craig Ball, All Rights Reserved Name: Course Workbook Reading Assignments NOTE: This table is for your convenience; but, the timing and scope of your responsibilities in this course are established by the latest Syllabus, not this table. Always go by the Syllabus!! The following Workbook exercises and readings should be completed prior to the start of class on the dates set out for same below. There will always be additional readings on Canvas. Monday, August 29 Read pp. 4-84; Complete Exercise 1 Monday, September 12 Read pp. 85-101; Complete Exercise 2 Monday, September 19 (No class meeting this date) Read pp. 102-175; Complete Exercises 3-8 Monday, September 26 Read pp. 176-234; Complete Exercises 9-12 Monday, October 3 Read pp. 235-283, Complete Exercise 13 Monday, October 10 Read pp. 284-327; Complete Exercise 14, Part 1, pp. 282 Monday, October 17 No Workbook selections Monday, October 24 Read pp. 328-351; Complete Exercise 15 Monday, October 31 Read pp. 352-385; Complete Exercises 16-17 Monday, November 7 Read pp. 386-402; Begin Exercise 18 1 Contents Goals for this Workbook ...................................................................................................... 4 Introduction to Electronic Discovery and Digital Evidence .................................................... 6 Introduction to Discovery in U.S. Civil Litigation ................................................................... 9 The “E-Discovery Rules” (1,16,26,34 & 45) of the Federal Rules of Civil Procedure With Committee Notes accompanying 2006 and 2015 Amendments .......................................... 14 TRCP Rule 196.4 Electronic or Magnetic Data (enacted 1999) ............................................ 59 Electronic Discovery Reference Model ............................................................................... 60 What Every Lawyer Should Know About E-Discovery ......................................................... 62 Introduction to Digital Computers, Servers and Storage .................................................... 66 Exercise 1: Identifying Digital Storage Media ..................................................................... 84 Getting your Arms around the ESI Elephant ....................................................................... 85 Exercise 2: Data Mapping ................................................................................................... 91 Introduction to Digital Forensics .......................................................................................102 Exercise 3: Forensic Imaging ..............................................................................................132 Exercise 4: Encoding: Decimal, Binary, Hexadecimal and Base64 ......................................144 Exercise 5: Encoding: Running the Bases ...........................................................................158 Exercise 6: Encoding: File Extensions .................................................................................163 Exercise 7: Encoding: Binary Signatures ............................................................................170 Exercise 8: Encoding: Unicode ...........................................................................................173 Opportunities and Obstacles: E-Discovery from Mobile Devices .......................................176 Introduction to Metadata .................................................................................................184 Exercise 9: Metadata and Hashing ....................................................................................210 Deep Diving into Deduplication.........................................................................................216 2 Exercise 10: Metadata: File Table Data ..............................................................................224 Exercise 11: Metadata: System and Application Metadata ................................................228 Exercise 12: Metadata: Geolocation in EXIF ......................................................................230 Mastering E-Mail in Discovery ...........................................................................................235 Exercise 13: E-Mail Anatomy .............................................................................................273 Custodial Hold: Trust but Verify ........................................................................................277 Elements of an Effective Legal Hold Notice .......................................................................279 Exercise 14: Legal Hold ......................................................................................................282 Luddite Lawyer’s Guide to Computer Backup Systems ......................................................284 Databases in E-Discovery ..................................................................................................303 Search is a Science ............................................................................................................328 Exercise 15: Processing, Culling, Search and Export ...........................................................340 Forms that Function ..........................................................................................................352 Exercise 16: Forms of Production: Load Files .....................................................................372 Exercise 17: Forms of Production and Cost ........................................................................378 Preparing for Meet and Confer .........................................................................................385 Exercise 18: Meet and Confer ............................................................................................398 APPENDIX A ......................................................................................................................402 Materials for use with Exercises 14 and 18 ........................................................................402 3 Goals for this Workbook The goal of the exercises and readings in this Workbook is to completely change the way you think about electronically stored information. Despite its daunting complexity, all digital content—photos, music, documents, spreadsheets, databases, social media and communications—exist in one common and mind-boggling form: More than 95% of the information in the world exists on electromagnetic hard drives as an unbroken string of ones and zeroes, memorialized as impossibly tiny reversals of magnetic polarity. These minute fluctuations must be read by a detector riding above the surface of a spinning disk on a cushion of air one- thousandth the width of a human hair in an operation akin to a jet fighter flying around the world at more than 800 times the speed of sound, less than a millimeter above the ground…and precisely counting every blade of grass it passes. That’s astonishing, but what should astound you more is that there are no pages, paragraphs, spaces or markers of any kind to define the data stream. That is, the history, knowledge and creativity of humankind have been reduced to two different states (on/off…one/zero) in a continuous, featureless expanse. It’s a data stream that carries not only the information we store but all of the instructions needed to make sense of the data, as well. It holds all of the information about the data required to play it, display it, transmit it or otherwise put it to work. It’s a reductive feat that’ll make your head spin…or at least make you want to buy a computer scientist a beer. These exercises and readings are designed to get you thinking about the fantastic journey data takes from its simple, seamless existence as an endless stream of ones and zeroes to the seemingly-endless variety of documents, communications, records and formats that confound us in e-discovery. These exercises and readings will help you answer such questions as: 1. How do computers store data? 2. What are the differences between common storage media? 3. How do computers encode data? 4. How do computers use binary signatures and file extensions to distinguish file types? 5. How are foreign languages encoded differently from English? 6. What’s the difference between system and application metadata? 7. What are the seen and unseen elements of an e-mail message? 8. Where does deleted data go, if it’s not really gone? 9. How are deleted data recovered? 10. How do search tools and review platforms operate? 11. What is forensic imaging? 4 12. What are load files, how are they used and what challenges do they present? 13. What impact do alternate forms of production have upon cost and utility? 14. What are the key elements of an effective, cost-effective and defensible legal hold? 15. What should occur at meet-and-confer? Some of these questions may seem hyper technical and far removed from the day-to-day of e- discovery and the practice of law; but, they serve as essential building blocks in a solid foundation for development of practical skills. The absence of a solid foundation ultimately limits how high you can go. Thank you for enrolling in this class. Together, I hope we can make it a course you will value all your life. Craig Ball, August 18, 2016 5 Introduction to Electronic Discovery and Digital Evidence Discovery is the legal process governing the right to obtain and the
Recommended publications
  • Unicode Ate My Brain
    UNICODE ATE MY BRAIN John Cowan Reuters Health Information Copyright 2001-04 John Cowan under GNU GPL 1 Copyright • Copyright © 2001 John Cowan • Licensed under the GNU General Public License • ABSOLUTELY NO WARRANTIES; USE AT YOUR OWN RISK • Portions written by Tim Bray; used by permission • Title devised by Smarasderagd; used by permission • Black and white for readability Copyright 2001-04 John Cowan under GNU GPL 2 Abstract Unicode, the universal character set, is one of the foundation technologies of XML. However, it is not as widely understood as it should be, because of the unavoidable complexity of handling all of the world's writing systems, even in a fairly uniform way. This tutorial will provide the basics about using Unicode and XML to save lots of money and achieve world domination at the same time. Copyright 2001-04 John Cowan under GNU GPL 3 Roadmap • Brief introduction (4 slides) • Before Unicode (16 slides) • The Unicode Standard (25 slides) • Encodings (11 slides) • XML (10 slides) • The Programmer's View (27 slides) • Points to Remember (1 slide) Copyright 2001-04 John Cowan under GNU GPL 4 How Many Different Characters? a A à á â ã ä å ā ă ą a a a a a a a a a a a Copyright 2001-04 John Cowan under GNU GPL 5 How Computers Do Text • Characters in computer storage are represented by “small” numbers • The numbers use a small number of bits: from 6 (BCD) to 21 (Unicode) to 32 (wchar_t on some Unix boxes) • Design choices: – Which numbers encode which characters – How to pack the numbers into bytes Copyright 2001-04 John Cowan under GNU GPL 6 Where Does XML Come In? • XML is a textual data format • XML software is required to handle all commercially important characters in the world; a promise to “handle XML” implies a promise to be international • Applications can do what they want; monolingual applications can mostly ignore internationalization Copyright 2001-04 John Cowan under GNU GPL 7 $$$ £££ ¥¥¥ • Extra cost of building-in internationalization to a new computer application: about 20% (assuming XML and Unicode).
    [Show full text]
  • Character Set Migration Best Practices For
    Character Set Migration Best Practices $Q2UDFOH:KLWH3DSHU October 2002 Server Globalization Technology Oracle Corporation Introduction - Database Character Set Migration Migrating from one database character set to another requires proper strategy and tools. This paper outlines the best practices for database character set migration that has been utilized on behalf of hundreds of customers successfully. Following these methods will help determine what strategies are best suited for your environment and will help minimize risk and downtime. This paper also highlights migration to Unicode. Many customers today are finding Unicode to be essential to supporting their global businesses. Oracle provides consulting services for very large or complex environments to help minimize the downtime while maximizing the safe migration of business critical data. Why migrate? Database character set migration often occurs from a requirement to support new languages. As companies internationalize their operations and expand services to customers all around the world, they find the need to support data storage of more World languages than are available within their existing database character set. Historically, many legacy systems required support for only one or possibly a few languages; therefore, the original character set chosen had a limited repertoire of characters that could be supported. For example, in America a 7-bit character set called ASCII is satisfactory for supporting English data exclusively. While in Europe a variety of 8 bit European character sets can support specific subsets of European languages together with English. In Asia, multi byte character sets that could support a given Asian language and English were chosen. These were reasonable choices that fulfilled the initial requirements and provided the best combination of economy and performance.
    [Show full text]
  • Windows NLS Considerations Version 2.1
    Windows NLS Considerations version 2.1 Radoslav Rusinov [email protected] Windows NLS Considerations Contents 1. Introduction ............................................................................................................................................... 3 1.1. Windows and Code Pages .................................................................................................................... 3 1.2. CharacterSet ........................................................................................................................................ 3 1.3. Encoding Scheme ................................................................................................................................ 3 1.4. Fonts ................................................................................................................................................... 4 1.5. So Why Are There Different Charactersets? ........................................................................................ 4 1.6. What are the Difference Between 7 bit, 8 bit and Unicode Charactersets? ........................................... 4 2. NLS_LANG .............................................................................................................................................. 4 2.1. Setting the Character Set in NLS_LANG ............................................................................................ 4 2.2. Where is the Character Conversion Done? .........................................................................................
    [Show full text]
  • [MS-VUVP-Diff]: VT-UTF8 and VT100+ Protocols
    [MS-VUVP-Diff]: VT-UTF8 and VT100+ Protocols Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation (“this documentation”) for protocols, file formats, data portability, computer languages, and standards as well as overviews of the interaction among each of these technologiessupport. Additionally, overview documents cover inter-protocol relationships and interactions. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you maycan make copies of it in order to develop implementations of the technologies that are described in the Open Specifications this documentation and maycan distribute portions of it in your implementations usingthat use these technologies or in your documentation as necessary to properly document the implementation. You maycan also distribute in your implementation, with or without modification, any schema, IDL'sschemas, IDLs, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. documentation. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that maymight cover your implementations of the technologies described in the Open Specifications. documentation. Neither this notice nor Microsoft's delivery of thethis documentation grants any licenses under those patents or any other Microsoft patents. However, a given Open Specification maySpecifications document might be covered by the Microsoft Open Specifications Promise or the Microsoft Community Promise. If you would prefer a written license, or if the technologies described in the Open Specificationsthis documentation are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • Electronic Document Preparation Pocket Primer
    Electronic Document Preparation Pocket Primer Vít Novotný December 4, 2018 Creative Commons Attribution 3.0 Unported (cc by 3.0) Contents Introduction 1 1 Writing 3 1.1 Text Processing 4 1.1.1 Character Encoding 4 1.1.2 Text Input 12 1.1.3 Text Editors 13 1.1.4 Interactive Document Preparation Systems 13 1.1.5 Regular Expressions 14 1.2 Version Control 17 2 Markup 21 2.1 Meta Markup Languages 22 2.1.1 The General Markup Language 22 2.1.2 The Extensible Markup Language 23 2.2 Markup on the World Wide Web 28 2.2.1 The Hypertext Markup Language 28 2.2.2 The Extensible Hypertext Markup Language 29 2.2.3 The Semantic Web and Linked Data 31 2.3 Document Preparation Systems 32 2.3.1 Batch-oriented Systems 35 2.3.2 Interactive Systems 36 2.4 Lightweight Markup Languages 39 3 Design 41 3.1 Fonts 41 3.2 Structural Elements 42 3.2.1 Paragraphs and Stanzas 42 iv CONTENTS 3.2.2 Headings 45 3.2.3 Tables and Lists 46 3.2.4 Notes 46 3.2.5 Quotations 47 3.3 Page Layout 48 3.4 Color 48 3.4.1 Theory 48 3.4.2 Schemes 51 Bibliography 53 Acronyms 61 Index 65 Introduction With the advent of the digital age, typesetting has become available to virtually anyone equipped with a personal computer. Beautiful text documents can now be crafted using free and consumer-grade software, which often obviates the need for the involvement of a professional designer and typesetter.
    [Show full text]
  • Windows Mbox Viewer User Manual 1.0.2.6 Table of Contents 1 Modification History
    Windows MBox Viewer User Manual 1.0.2.6 Table of Contents 1 Modification History.......................................................................................................................3 2 Feedback..........................................................................................................................................3 3 Overview.........................................................................................................................................4 4 Installation.......................................................................................................................................4 5 Running the MBox viewer..............................................................................................................4 5.1 Argument List Summary..............................................................................................................4 5.2 Setting Options from GUI............................................................................................................5 5.3 Basic Use Case.............................................................................................................................6 5.4 Mail Context Menu.......................................................................................................................7 5.5 Mail Archive Context menu.........................................................................................................8 5.6 Mail Attachments..........................................................................................................................9
    [Show full text]
  • ASCII, Unicode, and in Between Douglas A. Kerr Issue 3 June 15, 2010 ABSTRACT the Standard Coded Character Set ASCII Was Formall
    ASCII, Unicode, and In Between Douglas A. Kerr Issue 3 June 15, 2010 ABSTRACT The standard coded character set ASCII was formally standardized in 1963 and, in its “complete” form, in 1967. It is a 7-bit character set, including 95 graphic characters. As personal computers emerged, they typically had an 8-bit architecture. To exploit that, they typically came to use character sets that were “8-bit extensions of ASCII”, providing numerous additional graphic characters. One family of these became common in computers using the MS-DOS operating system. Another similar but distinct family later became common in computers operating with the Windows operating system. In the late 1980s, a true second-generation coded character set, called Unicode, was developed, and was standardized in 1991. Its structure provides an ultimate capacity of about a million graphic characters, catering thoroughly to the needs of hundreds of languages and many specialized and parochial uses. Various encoding techniques are used to represent characters from this set in 8- and 16-bit computer environments. In this article, we will describe and discuss these coded character sets, their development, their status, the relationships between them, and practical implications of their use. Information is included on the entry, in Windows computer systems, of characters not directly accessible from the keyboard. BEFORE ASCII As of 1960, the interchange of data within and between information communication and processing systems was made difficult by the lack of a uniform coded character set. Information communication in the traditional “teletypewriter” sense generally used a 5-bit coded character set, best described as the “Murray code” (although as a result of historical misunderstandings it is often called the “Baudot code”).
    [Show full text]
  • Windows Code Page -Wikipedia, the Free Encyclopedia Page 1 of 4
    Windows code page -Wikipedia, the free encyclopedia Page 1 of 4 Windows code page From Wikipedia, the free encyclopedia Windows code pages are sets of characters or code pages (known as character encodings in other operating systems) used in Microsoft Windows from the 1980s and 1990s. Windows code pages were gradually superseded when Unicode was implemented in Windows, although they are still supported both within Windows and other platforms. There are two groups of code pages in Windows systems: OEM and ANSI code pages. Code pages in both of these groups are extended ASCII code pages. Contents ◾ 1 ANSI code page ◾ 2 OEM code page ◾ 3 History ◾ 4 List ◾ 5 Problems arising from the use of code pages ◾ 6 See also ◾ 7 References ◾ 8 External links ANSI code page ANSI code pages (officially called "Windows code pages"[1] after Microsoft accepted the former term being a misnomer[2]) are used for native non-Unicode (say, byte oriented) applications using a graphical user interface on Windows systems. ANSI Windows code pages, and especially the code page 1252, were called that way since they were purportedly based on drafts submitted or intended for ANSI. However, ANSI and ISO have not standardized any of these code pages. Instead they are either supersets of the standard sets such as those of ISO 8859 and the various national standards (like Windows-1252 vs. ISO-8859-1), major modifications of these (making them incompatible to various degrees, like Windows-1250 vs. ISO-8859-2) or having no parallel encoding (like Windows- 1257 vs. ISO-8859-4; ISO-8859-13 was introduced much later).[2] About twelve of the typography and business characters from CP1252 at code points 0x80–0x9F (in ISO 8859 occupied by C1 control codes, which are useless in Windows) are present in many other ANSI/Windows code pages at the same codes.
    [Show full text]
  • Dl4 Installation & Configuration Guide for Unix
    Installation & Configuration Guide Unix Revision 4.3 Information in this document is subject to change without notice and does not represent a commitment on the part of Dynamic Concepts Inc. (DCI). Every attempt was made to present this document in a complete and accurate form. DCI shall not be responsible for any damages (including, but not limited to consequential) caused by the use of or reliance upon the product(s) described herein. The software described in this document is furnished under a license agreement or nondisclosure agreement. The purchaser may use and/or copy the software only in accordance with the terms of the agreement. No part of this manual may be reproduced in any way, shape or form, for any purpose, without the express written consent of DCI. © Copyright 2001 Dynamic Concepts Inc. (DCI). All rights reserved. Dynamic Concepts Inc. 18-B Journey Aliso Viejo, CA 92656 www.dynamic.com dL4 is a trademark of Dynamic Concepts Inc. UniBasic is a trademark of Dynamic Concepts Inc. Dynamic Windows is a trademark of Dynamic Concepts Inc. BITS is a trademark of Dynamic Concepts Inc. IRIS is a trademark of Point 4 Data Corporation. c-tree is a trademark of Faircom. IQ is a trademark of IQ Software Corporation. UNIX is a registered trademark of UNIX Systems Laboratories. SYBASE is a registered trademark of Sybase Inc. CodeBase is a trademark of Sequiter Software Inc. Microsoft, MS, MS-DOS, Microsoft Access, and FoxPro are registered trademarks, and ODBC, Windows and Windows NT are trademarks of Microsoft Corporation in the USA and other countries.
    [Show full text]
  • Supporting the Chinese Language in Oracle Text
    Supporting the Chinese Language in Oracle® Text Masterarbeit im Fach Arbeits-, Lern- und Präsentationstechniken Masterstudiengang Informationswirtschaft der Fachhochschule Stuttgart – Hochschule der Medien Poh Choo Lai Erstprüfer: Prof. Dr.-Ing. Peter Lehmann Zweitprüferin: Frau Barbara Steinhanses Bearbeitungszeitraum: 20. Okt 2003 bis 31. Mär 2004 Stuttgart, März 2004 Erklärung ii Erklärung Hiermit erkläre ich, dass ich die vorliegende Masterarbeit selbständig angefertigt habe. Es wurden nur die in der Arbeit ausdrücklich benannten Quellen und Hilfsmittel benutzt. Wörtlich oder sinngemäß übernommenes Gedankengut habe ich als solches kenntlich gemacht. Ort, Datum Unterschrift Kurzfassung iii Kurzfassung Gegenstand dieser Arbeit sind die Problematik von chinesischem Information Retrieval (IR) sowie die Faktoren, die die Leistung eines chinesischen IR-System beeinflussen können. Experimente wurden im Rahmen des Bewertungsmodells von „TREC-5 Chinese Track“ und der Nutzung eines großen Korpusses von über 160.000 chinesischen Nachrichtenartikeln auf einer Oracle10g (Beta Version) Datenbank durchgeführt. Schließlich wurde die Leistung von Oracle® Text in einem so genannten „Benchmarking“ Prozess gegenüber den Ergebnissen der Teilnehmer von TREC-5 verglichen. Die Hauptergebnisse dieser Arbeit sind: (a) Die Wirksamkeit eines chinesischen IR Systems ist durch die Art und Weise der Formulierung einer Abfrage stark beeinflusst. Besonders sollte man während der Formulierung einer Anfrage die Vielzahl von Abkürzungen und die regionalen Unterschiede
    [Show full text]
  • Using Unicode Skywire Software, L.L.C
    Start Using Unicode Skywire Software, L.L.C. Phone: (U. S.) 972.377.1110 3000 Internet Boulevard (EMEA) +44 (0) 1372 366 200 Suite 200 FAX: (U. S.) 972.377.1109 Notice Frisco, Texas 75034 (EMEA) +44 (0) 1372 366 201 www.skywiresoftware.com Support: (U. S.) 866.4SKYWIRE (EMEA) +44 (0) 1372 366 222 [email protected] PUBLICATION COPYRIGHT NOTICE Copyright © 2008 Skywire Software, L.L.C. All rights reserved. Printed in the United States of America. This publication contains proprietary information which is the property of Skywire Software or its subsidiaries. This publication may also be protected under the copyright and trade secret laws of other countries. TRADEMARKS Skywire® is a registered trademark of Skywire Software, L.L.C. Docucorp®, its products (Docucreate™, Documaker™, Docupresentment™, Docusave®, Documanage™, Poweroffice®, Docutoolbox™, and Transall™) , and its logo are trademarks or registered trademarks of Skywire Software or its subsidiaries. The Docucorp product modules (Commcommander™, Docuflex®, Documerge®, Docugraph™, Docusolve®, Docuword™, Dynacomp®, DWSD™, DBL™, Freeform®, Grafxcommander™, Imagecreate™, I.R.I.S. ™, MARS/NT™, Powermapping™, Printcommander®, Rulecommander™, Shuttle™, VLAM®, Virtual Library Access Method™, Template Technology™, and X/HP™ are trademarks of Skywire Software or its subsidiaries. Skywire Software (or its subsidiaries) and Mynd Corporation are joint owners of the DAP™ and Document Automation Platform™ product trademarks. Docuflex is based in part on the work of Jean-loup Gailly and Mark Adler. Docuflex is based in part on the work of Sam Leffler and Silicon Graphic, Inc. Copyright © 1988-1997 Sam Leffler. Copyright © 1991-1997 Silicon Graphics, Inc. Docuflex is based in part on the work of the Independent JPEG Group.
    [Show full text]
  • Code Pages Supported by Windows -- OEM
    Code Pages Supported by Windows -- OEM http://www.microsoft.com/globaldev/reference/oem.mspx Microsoft.com Home | Site Map Search Microsoft.com for: Go Search for Go Advanced Search References GlobalDev Home Code Pages Supported by Windows -- OEM Customer Outreach Get World-Ready OEM Code Pages Dr. International Hands-On The list below provides links to graphical representations, and textual References listings, of each of the Windows OEM codepages: Tools & Utilities 437 (US) Perspectives 720 (Arabic) About 737 (Greek) Contact Us 775 (Baltic) 850 (Multilingual Latin I) 852 (Latin II) 855 (Cyrillic) 857 (Turkish) 858 (Multilingual Latin I + Euro) 862 (Hebrew) 866 (Russian) The following codepages are used as both Windows ANSI and OEM codepages: 874 (Thai) 932 (Japanese Shift-JIS) 936 (Simplified Chinese GBK) 949 (Korean) 950 (Traditional Chinese Big5) 1258 (Vietnam) Manage Your Profile ©2004 Microsoft Corporation. All rights reserved. Terms of Use | Trademarks | Privacy Statement 1 von 1 03.12.2004 12:50 OEM 437 http://www.microsoft.com/globaldev/reference/oem/437.htm Microsoft Windows OEM Codepage : 437 (US) 00 = U+0000 : NULL 01 = U+0001 : START OF HEADING 02 = U+0002 : START OF TEXT 03 = U+0003 : END OF TEXT 04 = U+0004 : END OF TRANSMISSION 05 = U+0005 : ENQUIRY 06 = U+0006 : ACKNOWLEDGE 07 = U+0007 : BELL 08 = U+0008 : BACKSPACE 09 = U+0009 : HORIZONTAL TABULATION 0A = U+000A : LINE FEED 0B = U+000B : VERTICAL TABULATION 0C = U+000C : FORM FEED 0D = U+000D : CARRIAGE RETURN 0E = U+000E : SHIFT OUT 0F = U+000F : SHIFT IN 10 = U+0010
    [Show full text]