Locating and Extracting Digital Evidence from Hosted Virtual Desktop Infrastructures: Cloud Context

Total Page:16

File Type:pdf, Size:1020Kb

Locating and Extracting Digital Evidence from Hosted Virtual Desktop Infrastructures: Cloud Context Locating and Extracting Digital Evidence from Hosted virtual desktop Infrastructures: Cloud Context NIRBHAY JAWALE B.C.I.S (AUT University) New Zealand A thesis submitted to the graduate faculty of Design and Creative Technologies AUT University in partial fulfilment of the Requirements for the degree of Master of Forensic Information Technology School of Computing and Mathematical Sciences Auckland, New Zealand 2010 II Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ........................... Signature III Acknowledgements This thesis was conducted at the Faculty of Design and Creative Technologies in the school of Computing and Mathematical Sciences at AUT University, New Zealand. During the course of writing this thesis, I have received a valuable support from many people. Firstly, I would like to thank my family for their blessings, encouragement and believing that I could get through this study. Secondly, I am deeply thankful and honored by having Professor Ajit Narayanan as my thesis supervisor. This thesis would not have been possible without his guidance, encouragement and interest; he took to supervise my thesis topic. I very much enjoyed the critical discussions and comments on my research topic with Professor Ajit Narayanan, this thesis would not have been in the present form without his valuable contribution. I would also like to thank Dr Brian Cusack for his ongoing support during the course of Masters in Forensic IT. He has been extremely helpful during my PG1 approval, without his input this research topic would not have been approved in the first place. Lastly, I would like to thank everyone once again from the bottom of my heart for their support, encouragement and enthusiasm that has kept me going throughout this period. I also greatly appreciate all the MFIT staff and lecturers for sharing their knowledge and concepts; this has deepened my knowledge at a critical point of my life. IV Abstract The development of virtualization started in 1960, when VMware introduced partitioning of large mainframes for better hardware utilization. (Virtualization History, 2010) Since then virtualization has matured and been adopted to a wide extent in the industry. Recent developments include branching into areas of server virtualization, storage and application virtualization and, very recently, desktop virtualization. Desktop virtualization has so far been through two models: the Client hosted model, which is typically operated from the user’s workstation using Windows Virtual PC; and the VMware workstation or Java Virtual Machine (VM). However, recently a third model has emerged, called the server hosted model or Hosted virtual desktop (HVD), which is a virtualized form of desktop (VM) delivered to users from the cloud infrastructure. In other words virtualization in computing has progressed to an extent where desktops can be virtualized and accessed from anywhere. The server hosted model has already surpassed 1% market share of the worldwide professional PC market, with estimates indicating that this is a rapidly growing area. This study investigates the adequacy of current digital forensic procedures on hosted virtual desktops (HVDs) as there does not appear to be specific methods of locating and extracting evidences from this infrastructure. Using the Forensic Iterative Development Model (FIDM), HVDs deployed in private cloud were simulated to reflect three different computer crime (quasi- experimental) scenarios. It was found that current digital forensic procedures may not be adequate for locating and extracting evidence, since the infrastructure in scenario 2 and 3 introduces complications such as non-persistent disk modes and segregating data in a multi- tenant environment. However in scenario 1, findings illustrate that all standard investigation techniques can be followed as a result of the persistent user environment. Furthermore, suggestions are made to extend the current research in the areas of techniques to acquire virtual machines from hypervisors, hashing evidence and forensic readiness in environments consisting HVDs. V Table of Contents Declaration ...................................................................................................................................... ii Acknowledgements ........................................................................................................................ iii Abstract .......................................................................................................................................... iv List of Figures .............................................................................................................................. viii List of Tables ................................................................................................................................. ix List of Abbreviations ...................................................................................................................... x Chapter 1 - Introduction 1.0 INTRODUCTION ............................................................................................................... 1 1.1 PROBLEM DEFINITION ................................................................................................... 2 1.2 MOTIVATION .................................................................................................................... 3 1.2.1 Hosted virtual desktops and Forensics ......................................................................... 3 1.2.2 Forensic Challenges in Virtualized Environments ....................................................... 4 1.2.3 Thinking of What the Future Holds .............................................................................. 5 1.3 CONCLUSION - THESIS STRUCTURE .......................................................................... 5 Chapter 2 - Literature Review 2.0 INTRODUCTION ............................................................................................................... 8 2.1 THE CURRENT STATE OF DIGITAL FORENICS ......................................................... 8 2.1.1 Disciplines of Digital Forensics ................................................................................... 9 2.1.2 Investigation frameworks ........................................................................................... 11 2.1.3 Capability of Current Tools ........................................................................................ 14 2.1.3.1 Encase v7 ................................................................................................................ 14 2.1.3.2 Paraben and FTK .................................................................................................... 15 2.2 CURRENT STATE OF DESKTOP COMPUTING ......................................................... 15 2.2.1 Virtual Desktops ......................................................................................................... 17 2.3 CURRENT STATE OF DISTRIBUTED COMPUTING (CLOUD CONTEXT) ............ 19 2.3.1 Service Models ........................................................................................................... 20 2.3.2 Cloud Deployment Methods ....................................................................................... 21 2.3.3 Virtual Desktops in Clouds ........................................................................................ 23 2.3.4 Security and Forensic Challenges ............................................................................... 26 2.4 CURRENT FORENSIC CAPABILITIES ......................................................................... 28 2.4.1 Hiding in a Virtual World ........................................................................................... 29 2.4.2 Live Digital Forensics in the Virtual World ............................................................... 31 VI 2.4.3 Virtualization and Forensics ....................................................................................... 34 2.5 CONCLUSION .................................................................................................................. 38 Chapter 3 - Research Methodology 3.0 INTRODUCTION ............................................................................................................. 40 3.1 WHAT IS METHODOLOGY ........................................................................................... 41 3.2 RANGE OF METHODOLOGY'S..................................................................................... 42 3.2.1 Grounded Theory ........................................................................................................ 42 3.2.2 Descriptive Research Methodology............................................................................ 45 3.2.3 Case Study .................................................................................................................. 46 3.2.4 Scientific Methodology (SM) - Research ................................................................... 48 3.3 RESEARCH DESIGN ......................................................................................................
Recommended publications
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Understanding Microsoft Virtualization Solutions Ebook
    MICROSOFT LICENSE TERMS MICROSOFT EBOOK These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the licensed content named above, which includes the media on which you received it, if any. By using the licensed content, you accept these terms. If you do not accept them, do not use the licensed content. If you comply with these license terms, you have the rights below. 1. OVERVIEW. Licensed Content. The licensed content includes the eBook and associated media. License Model. The licensed content is licensed on a per user per device basis. 2. INSTALLATION AND USE RIGHTS. a. General. One user may install and use one copy of the licensed content on a single computer. b. Portable Device. You may install an additional copy of the licensed content on a portable device for the exclusive use of the primary user of the first copy of the licensed content. 3. SCOPE OF LICENSE. The licensed content is licensed, not sold. This agreement only gives you some rights to use the licensed content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the licensed content only as expressly permitted in this agreement. You agree Not to make copies of the licensed content; Not to distribute, rent, lease, lend, reproduce, transit, adapt, modify, link to, post, forward, make derivative works based upon, disseminate, publish or sublicense the licensed content or combine the licensed content with
    [Show full text]
  • Microsoft Corporation As Amicus Curiae in Support of Petitioner ————
    No. 18-956 IN THE Supreme Court of the United States ———— GOOGLE LLC, Petitioner, v. ORACLE AMERICA, INC., Respondent. ———— On Writ of Certiorari to the United States Court of Appeals for the Federal Circuit ———— BRIEF OF MICROSOFT CORPORATION AS AMICUS CURIAE IN SUPPORT OF PETITIONER ———— LISA W. BOHL JEFFREY A. LAMKEN MOLOLAMKEN LLP Counsel of Record 300 N. LaSalle St. MICHAEL G. PATTILLO, JR. Chicago, IL 60654 MOLOLAMKEN LLP (312) 450-6700 The Watergate, Suite 660 600 New Hampshire Ave., NW LEONID GRINBERG Washington, DC 20037 MOLOLAMKEN LLP (202) 556-2000 430 Park Ave. [email protected] New York, NY 10022 (212) 607-8160 Counsel for Amicus Curiae :,/621(3(635,17,1*&2,1&± ±:$6+,1*721'& TABLE OF CONTENTS Page Interest of Amicus Curiae ......................................... 1 Summary of Argument ............................................... 3 Argument ...................................................................... 6 I. Innovation in Today’s Computer Industry Depends on Collaborative Development and Seamless Interoperability—Both of Which Require Reuse of Functional Code .............................. 7 A. Innovation in the Modern Computer Industry Relies on Collaborative Development ..................... 7 B. Interoperability Is a Key Component of Technological Innovation Today ....................................... 10 C. Reuse of Functional Software Code, Including APIs, Is Critical To Promoting Collaborative Development and Interoperability ......... 12 II. Courts Have Long Applied a Flexible Fair Use Doctrine To Address Software’s Unique Nature ............................. 15 A. Software’s Collaborative and Functional Elements Distinguish It from Traditional Creative Works Subject to Copyright Protection ............. 16 B. A Flexible Fair Use Doctrine Is Essential To Promoting Collaboration and Interoperability in Modern Software Development— As Courts Have Long Recognized .......... 18 (i) ii TABLE OF CONTENTS—Continued Page C.
    [Show full text]
  • SCRAPING PHOTOGRAPHS Maggie King
    SCRAPING PHOTOGRAPHS Maggie King INTRODUCTION ................................................................ 188 I. TECHNICAL BACKGROUND ON SCRAPING ................................... 190 A. How to Scrape a Photograph ....................................... 190 B. Why Scrape a Photograph? ......................................... 192 II. THE LAW OF SCRAPING ................................................... 193 A. CFAA Claims ......................................................... 194 1. CFAA Background: Ambiguous Statutory Language ......... 194 2. CFAA Scraping Claims in Caselaw .............................. 195 B. Contract Claims ..................................................... 197 C. Copyright Claims .................................................... 198 III. SCRAPING PHOTOGRAPHS ............................................. 200 A. Copyright and Photographs ........................................ 201 1. Analogous scraping activities are fair use ..................... 202 2. Face Scans are not protectible derivative works. ............ 203 B. Data Ownership ..................................................... 205 1. Non-exclusive licenses bar platforms from asserting claims for user-generated data ............................................... 205 2. Paths to asserting user claims directly ........................ 206 IV. UNRESTRICTED SURVEILLANCE AND STRONGER PROTECTIONS FOR CYBERPROPERTY .............................................................. 207 CONCLUSION .................................................................
    [Show full text]
  • Copyright and Copy-Reliant Technology. Matthew As G Loyola University Chicago, [email protected]
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2009 Copyright and Copy-Reliant Technology. Matthew aS g Loyola University Chicago, [email protected] Follow this and additional works at: http://lawecommons.luc.edu/facpubs Part of the Law Commons Recommended Citation Sag, Matthew, Copyright and Copy-Reliant Technology,103 NU L.R. 1607 (2009) This Article is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Faculty Publications & Other Works by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. Copyright 2009 by Northwestern University School of Law Printed in U.S.A. Northwestern University Law Review Vol. 103, No. 4 COPYRIGHT AND COPY-RELIANT TECHNOLOGY Matthew Sag* INTRODUCTION ........................................................................................................... 1607 I. COPY-RELIANT TECHNOLOGIES AND THE INTERNET ............................................ 1610 A. New Technologies, Copyright Markets, and Copyright Law ..................... 1611 B. Four Case Studies of Copy-Reliant Technology ........................................ 1616 II. THE DOCTRINAL IMPLICATIONS OF NONEXPRESSIVE USE .................................... 1624 A. The Principle of Nonexpressive Use ......................................................... 1624 B. Doctrinal Incorporation of Nonexpressive Use ......................................... 1639 C. Fair Use and Nonexpressive Use .............................................................
    [Show full text]
  • Copyrighted Material
    Index Numbers AMD RVI, 88 6to4, 436 APM (Application Platform Monitoring), 382 8.3 filename format, 112 App Controller, 381, 399–401 App-V, 3. See also application virtualization A 8.3 filename format, 112 Access Control System (ACS), 479 benefits, 151–154 Active Desktop, 26 cache file, 137–139 Active Directory client-side infrastructure, 131–141 ADAC (Active Directory Administrative Center), DSC (Dynamic Suite Composition), 128–130, 156 501–502 file type associations, 103–104, 135–137, 142– ADDS (Active Directory Domain Services), 144, 146, 157 501–502 Package Accelerators, 126–128 Windows Server 2012, 501–504 Q: drive, 101–102, 107–108, 111–114, 123, Active screening, 180 137–140 active/active mode, 276 Server App-V, 361–365 active/passive mode, 276 server-side infrastructure ActiveSync, 431, 435 full mode, 142–150 ADAC (Active Directory Administrative Center), lightweight mode, 150–151 501–502 standalone mode, 141–142 ADDS (Active Directory Domain Services), 501–502 in Session Host environments, 235 Administration Toolkit interface (MED-V), 84–85 virtual layers, 102–103 Administrator Console, SCVMM,COPYRIGHTED 317–320 App-V MATERIAL Client, 131–141, 361–364 AdminStudio, 159 Application Virtual Client, 137 Aero Glass, 30–33 Application Virtualization Service Agent, 137 Aero Peek, 33 installing, 132–135 Aero Shake, 33 operating systems supporting, 131 Aero Snap, 33 versus Server App-V, 361–364 Agent Server, UE-V, 202–204 workspaces, 135–137 AIK (Automated Installation Kit), 313 Amazon Elastic Compute Cloud (EC2), 14 517 293164bindex_updated.indd
    [Show full text]
  • Cryptographic Key Management Workshop Summary – June 8-9, 2009
    NIST Interagency Report 7609 Cryptographic Key Management Workshop Summary – June 8-9, 2009 Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid Cryptographic Key Management NIST Interagency Report 7609 Workshop Summary – June 8-9, 2009 Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director CRYPTOGRAPHIC KEY MANAGEMENT WORKSHOP SUMMARY Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7609 59 pages (January 2010) Commercial Disclaimer Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessa rily the best available for the purpose.
    [Show full text]
  • Rethinking Anticircumvention's Interoperability Policy
    Case Western Reserve University School of Law Scholarly Commons Faculty Publications 2009 Rethinking Anticircumvention's Interoperability Policy Aaron K. Perzanowski Case Western University School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.case.edu/faculty_publications Part of the Intellectual Property Law Commons Repository Citation Perzanowski, Aaron K., "Rethinking Anticircumvention's Interoperability Policy" (2009). Faculty Publications. 44. https://scholarlycommons.law.case.edu/faculty_publications/44 This Article is brought to you for free and open access by Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. Rethinking Anticircumvention’s Interoperability Policy Aaron K. Perzanowski* Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act (“DMCA”) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and narrow statutory text render those safeguards largely ineffective. One approach to counteracting the DMCA’s restrictions on interoperability is to rely on antitrust scrutiny and the resulting mandatory disclosure of technical information. However, both doctrinal and policy considerations suggest that antitrust offers a less than ideal means of lessening the DMCA’s impact on interoperability.
    [Show full text]
  • ARCHIVE 2825.Pdf
    ComputorEdge 6/18/10 ComputorEdge™ Online — 06/18/10 This issue: Virtual Machine Software Update Keep your operating system options open with virtual machine software, which allows you to run multiple operating systems simultaneously. Table of Contents: Digital Dave by Digital Dave Digital Dave answers your tech questions. A reader is getting unwanted spam e-mail from someone despite trying to block him through Outlook; a reader wants to stream her favorite news channel instead of paying for cable TV; and a tip on creating a directory of all 271 Windows troubleshooting how-to statements. Virtual Machines: What They Are and What They Can Do by Pete Choppin A safe and easy way to learn and use a new OS. Virtual machines are the ideal solution for software testing, or even just for learning new operating systems such as Linux. (Click Banner) Using Windows 7 Virtual PC to Run Other Operating Systems by Andrea Dunning Keep your operating system options open. Windows XP Mode and Windows Virtual PC are two sides of a software package, allowing you to run Windows XP or the operating system of your choice (unofficially), on your Windows 7 machine. Windows Tips and Tricks by Jack Dunning Utilizing the Send To Feature Send To is a Windows file-manipulation tool that can help with your data, file and folder management. 1 of 48 ComputorEdge 6/18/10 (Click Banner) Wally Wang's Apple Farm by Wally Wang Virtual Machines: The Best of Both Worlds If you want to switch to the Macintosh but still feel tied to Windows for running certain programs, a virtualization program lets you have the best of both worlds.
    [Show full text]
  • Matthew Sag* Abstract This Article Studies the Rise
    COPYRIGHT AND COPY-RELIANT TECHNOLOGIES Matthew Sag* Abstract This article studies the rise of copy-reliant technologies – technologies such as Internet search engines and plagiarism detection software that, although they do not read, understand or enjoy copyrighted works, necessarily copy them in large quantities. This article provides a unifying theoretical framework for the legal analysis of topics that tend to be viewed discretely. Search engines, plagiarism detection software, reverse engineering and Google’s nascent library cataloging effort, are each part of a broader phenomenon brought about by digitization, that of copy-reliant technologies. These technologies raise two novel, yet central, questions of copyright law. First, whether a non-expressive use that nonetheless requires copying the entirety of a copyright work should be found to infringe the exclusive rights of the copyright owner. Second, whether the transaction costs associated with copy-reliant technologies justify switching copyright’s default rule that no copying may take place without permission to one in which copyright owners must affirmatively opt-out of specific uses of their works. Keywords: Internet, Copyright, Non-expressive use, Opt-out, Fair use, Transaction costs. Word-count: 34,987. * Visiting Assistant Professor, University of Virginia School of Law & Assistant Professor, DePaul University College of Law. Please address comments to [email protected]. Thanks to Tonja Jacobi, Adam Mossoff, Dotan Oliar, Glen Robinson, and Christopher Sprigman and to participants at the American Intellectual Property Law Association Annual Meeting, and the Intellectual Property Scholars Conference for their comments and suggestions. Special thanks to the University of Virginia School of Law Library staff for their invaluable assistance.
    [Show full text]
  • 01}March 02} Issue Volume
    VolumeVolume 02}05} Issue 01}March 2013 Editorials Editorial 1 Daniel M. German Articles Copyleft, -right and the case law on APIs on both sides of the Atlantic 5 Walter van Holst Lisping Copyleft: A Close Reading of the Lisp LGPL 15 Eli Greenbaum Platform The Rise and Evolution of the Open Source Software Foundation 31 Paula Hunter, Stephen Walli Legislative Review FOSS in the Italian public administration: fundamental law principles 43 Simone Aliprandi, Carlo Piana Available online at: http://www.ifosslr.org Volume 02}05} Issue 01} March 2013 Editorial Committee !aniel German Daniel German is is Associate Professor, Computer Science, This publication is managed by a rotating Editorial Committee. University of Victoria. His main area of research is software The membership of the Committee for this issue is as follows: engineering. In particular, software evolution, open source and intellectual property. Daniel teaches several courses at Uvic, Malcolm Bain primarily Database Systems (CSC370), Social and Professional Malcolm is partner at id law partners, a Barcelona based law Issues (SENG401), Media Applications (SENG410) and more firm specialising in IT law, with a focus on FOSS projects. As recently Intro to Software Engineering (SENG265). well as his private practice, Malcolm participates pro bono in a number of FOSS related initiatives and teaches the legal "ilayne #o$e%oy aspects of FOSS at university. Jilayne Lovejoy is corporate counsel at OpenLogic, a provider of open source software support, provisioning, and compliance Amanda Brock solutions to enterprises. In addition to traditional corporate Amanda Brock is Director at the international technology law counsel responsibilities, Jilayne helps develop OpenLogic’s firm, Origin, www.origin.co.uk.
    [Show full text]
  • How to Make Your System Mobile with Paragon Drive Copy 11 and Microsoft Windows Virtual PC
    PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email [email protected] How to make your system mobile with Paragon Drive Copy 11 and Microsoft Windows Virtual PC Contents Introduction .................................................................................................................................................. 3 Creating a Virtual Machine ............................................................................................................................ 3 Running the Virtual Machine ...................................................................................................................... 12 Conclusion and an additional advice ........................................................................................................... 15 Introduction This document is intended to show you how to transfer your system alongside with all data and programs to your pocket hard drive with help of Paragon Drive Copy 11. Your system will be converted to a virtual machine, which is an exact clone of your software environment. With this virtual machine you will be no longer restricted of your physical computer boundaries. You’ll become able to do your work, listen music and play video on any computer you reach. All your files and program will be with you anywhere. Let’s see how to transfer your whole system to the removable media. Creating a Virtual Machine First of all you have to create an exact clone of your software environment with the operating system, programs and files. But before attach the removable media (a hard disk drive or a flash disk) where you want to save virtual disk file to. Step 1 Run Paragon Drive Copy 11 Professional And select Migrate Virtual Disk Step 2 The Wizard’s welcome screen opens. Click Next. Step 3 On the next window select your physical hard disk drive, which contains partitions with OS and data.
    [Show full text]