Review of Data Storage by Fusion Drive In
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
RECON-IMAGER-Manual.Pdf
RECON IMAGER Manual 1.Introduction Version 4.0.5 RECON IMAGER was developed by SUMURI to provide the digital forensic practitioner with a bootable imaging utility that supports all modern Macintosh computers with Intel processors. This is accomplished via three macOS based boot environments that have been modified to ensure that there are no writes to internal or externally attached media. Additionally, RECON IMAGER helps the practitioner to easily identify Apple File System (APFS) container disks and volumes, FileVault, Fusion and other Core Storage volumes. RECON IMAGER has been designed to get as much data as possible to include the Apple Extended Attributes and Local Time Machine Snapshots (APFS Snapshots). In addition to creating forensic images of physical disks and/or volumes, RECON IMAGER can also image Mac RAM without the need for an administrator password within RECON IMAGER’s boot environment. RECON IMAGER also supports imaging Macs with T2 Security Chipsets via Target Disk Mode or disabling Secure Boot via the Mac’s Recovery Mode. Copyright © 2010-2020 SUMURI LLC. All rights reserved. 1 RECON IMAGER Manual 2. Version Comparisons There are two versions of RECON IMAGER – Standard and PRO. RECON IMAGER (standard) RECON IMAGER (standard) is based on macOS. Since it is based on macOS it natively boots Intel Macs. It also supports Apple proprietary technology such as Apple File System (APFS) container disks and volumes, FileVault, Fusion and other Core Storage volumes. RECON IMAGER includes the option to image logically which allows an examiner to import Apple data into forensic tools that do not natively support proprietary Apple file systems. -
Computer Service Technician- CST Competency Requirements
Computer Service Technician- CST Competency Requirements This Competency listing serves to identify the major knowledge, skills, and training areas which the Computer Service Technician needs in order to perform the job of servicing the hardware and the systems software for personal computers (PCs). The present CST COMPETENCIES only address operating systems for Windows current version, plus three older. Included also are general common Linux and Apple competency information, as proprietary service contracts still keep most details specific to in-house service. The Competency is written so that it can be used as a course syllabus, or the study directed towards the education of individuals, who are expected to have basic computer hardware electronics knowledge and skills. Computer Service Technicians must be knowledgeable in the following technical areas: 1.0 SAFETY PROCEDURES / HANDLING / ENVIRONMENTAL AWARENESS 1.1 Explain the need for physical safety: 1.1.1 Lifting hardware 1.1.2 Electrical shock hazard 1.1.3 Fire hazard 1.1.4 Chemical hazard 1.2 Explain the purpose for Material Safety Data Sheets (MSDS) 1.3 Summarize work area safety and efficiency 1.4 Define first aid procedures 1.5 Describe potential hazards in both in-shop and in-home environments 1.6 Describe proper recycling and disposal procedures 2.0 COMPUTER ASSEMBLY AND DISASSEMBLY 2.1 List the tools required for removal and installation of all computer system components 2.2 Describe the proper removal and installation of a CPU 2.2.1 Describe proper use of Electrostatic Discharge -
Take Control of Your Digital Storage (2.1)
EBOOK EXTRAS: v2.1 Downloads, Updates, Feedback TAKE CONTROL OF YOUR DIGITAL STORAGE FOR MAC by JEFF CARLSON $14.99 Click here to buy the full 145-page “Take Control of Your Digital Storage” for only $14.99! Table of Contents Read Me First ............................................................... 4 Updates and More ............................................................. 4 What’s New in Version 2.1 .................................................. 5 What Was New in Version 2.0 ............................................. 6 Introduction ................................................................ 7 Your Digital Storage Quick Start .................................. 8 Understand Storage ................................................... 10 Hard Drives .................................................................... 10 Solid-State Drives ........................................................... 15 External Drives ............................................................... 22 How Much Storage Do You Need? ...................................... 30 How to Dispose of a Hard Drive ......................................... 32 RAID ............................................................................. 33 Disk Images ................................................................... 44 Cloud Storage ................................................................. 51 Format and Partition Disks ........................................ 55 Understand File Systems ................................................. -
Exploring Forensic Implications of the Fusion Drive
Journal of Digital Forensics, Security and Law Volume 9 Number 2 Article 12 2014 Exploring Forensic Implications of the Fusion Drive Shruti Gupta Purdue University Marcus Rogers Purdue University, [email protected] Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Gupta, Shruti and Rogers, Marcus (2014) "Exploring Forensic Implications of the Fusion Drive," Journal of Digital Forensics, Security and Law: Vol. 9 : No. 2 , Article 12. DOI: https://doi.org/10.15394/jdfsl.2014.1177 Available at: https://commons.erau.edu/jdfsl/vol9/iss2/12 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Exploring Forensic Implications of the Fusion Drive JDFSL V9N2 This work is licensed under a Creative Commons Attribution 4.0 International License. EXPLORING FORENSIC IMPLICATIONS OF THE FUSION DRIVE Shruti Gupta and Marcus Rogers Purdue University 401 N. Grant St., IN 47906, Unites States fshruti,[email protected] ABSTRACT This paper explores the forensic implications of Apple's Fusion Drive. The Fusion Drive is an example of auto-tiered storage. It uses a combination of a flash drive and a magnetic drive. Data is moved between the drives automatically to maximize system performance. This is different from traditional caches because data is moved and not simply copied. -
2020-06-02-RECON IMAGER Manual
M A N U A L 1.Introduction 4 2. Version Comparisons 4 3. Supported Hardware 6 3.1 MODE A - SUPPORTED HARDWARE (Version 4.0.0) 6 3.2 MODE B - BOOT SUPPORTED HARDWARE (Version 5.0.0) 6 3.3 MODE C - SUPPORTED HARDWARE (Version 5.0.2 A1) 7 4. Before You Start 7 4.1 How Will You Process The Image? 7 4.2 What To Image? 8 4.3 What Image Format Should I Use? 8 5. Key Concepts To Understand 9 5.1 Apple File System (APFS) 9 5.2 Apple Extended Attributes 9 5.3 Fusion Drives 10 5.4 Core Storage 10 5.5 FileVault 11 5.6 T2 Security Chipset 11 5.7 Local Time Machine Snapshots (APFS) 12 5.8 Apple Boot Camp 12 6. Booting RECON IMAGER 13 6.1 Instant On - Portable Macs 13 6.2 Firmware Password 13 6.3 Connecting RECON IMAGER 14 6.4 Connecting Your Destination Drive 15 6.5 Starting RECON IMAGER 15 7. Using RECON Imager 17 7.1 Disk Manager 18 7.1.1 Refresh To Detect Changes 19 RECON IMAGER Copyright © 2010-2020 SUMURI LLC 1 of 58 7.1.2 Formatting a Collection Drive 20 7.1.3 Decrypting A FileVault Volume 22 7.1.4 System Date and Time 24 7.2 Disk Imager 24 7.2.1 Source 25 7.2.2 Image Type 25 7.2.3 Compression Options 27 7.2.4 Processing Local Time Machine Snapshots (APFS) 27 7.2.5 Destination 28 7.2.6 Image Name 28 7.2.7 Segment Size 29 7.2.8 Evidence Descriptor Fields 29 7.2.9 Hashing and Verification 30 8.