Take Control of Your Digital Storage (2.1)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
RECON-IMAGER-Manual.Pdf
RECON IMAGER Manual 1.Introduction Version 4.0.5 RECON IMAGER was developed by SUMURI to provide the digital forensic practitioner with a bootable imaging utility that supports all modern Macintosh computers with Intel processors. This is accomplished via three macOS based boot environments that have been modified to ensure that there are no writes to internal or externally attached media. Additionally, RECON IMAGER helps the practitioner to easily identify Apple File System (APFS) container disks and volumes, FileVault, Fusion and other Core Storage volumes. RECON IMAGER has been designed to get as much data as possible to include the Apple Extended Attributes and Local Time Machine Snapshots (APFS Snapshots). In addition to creating forensic images of physical disks and/or volumes, RECON IMAGER can also image Mac RAM without the need for an administrator password within RECON IMAGER’s boot environment. RECON IMAGER also supports imaging Macs with T2 Security Chipsets via Target Disk Mode or disabling Secure Boot via the Mac’s Recovery Mode. Copyright © 2010-2020 SUMURI LLC. All rights reserved. 1 RECON IMAGER Manual 2. Version Comparisons There are two versions of RECON IMAGER – Standard and PRO. RECON IMAGER (standard) RECON IMAGER (standard) is based on macOS. Since it is based on macOS it natively boots Intel Macs. It also supports Apple proprietary technology such as Apple File System (APFS) container disks and volumes, FileVault, Fusion and other Core Storage volumes. RECON IMAGER includes the option to image logically which allows an examiner to import Apple data into forensic tools that do not natively support proprietary Apple file systems. -
Computer Service Technician- CST Competency Requirements
Computer Service Technician- CST Competency Requirements This Competency listing serves to identify the major knowledge, skills, and training areas which the Computer Service Technician needs in order to perform the job of servicing the hardware and the systems software for personal computers (PCs). The present CST COMPETENCIES only address operating systems for Windows current version, plus three older. Included also are general common Linux and Apple competency information, as proprietary service contracts still keep most details specific to in-house service. The Competency is written so that it can be used as a course syllabus, or the study directed towards the education of individuals, who are expected to have basic computer hardware electronics knowledge and skills. Computer Service Technicians must be knowledgeable in the following technical areas: 1.0 SAFETY PROCEDURES / HANDLING / ENVIRONMENTAL AWARENESS 1.1 Explain the need for physical safety: 1.1.1 Lifting hardware 1.1.2 Electrical shock hazard 1.1.3 Fire hazard 1.1.4 Chemical hazard 1.2 Explain the purpose for Material Safety Data Sheets (MSDS) 1.3 Summarize work area safety and efficiency 1.4 Define first aid procedures 1.5 Describe potential hazards in both in-shop and in-home environments 1.6 Describe proper recycling and disposal procedures 2.0 COMPUTER ASSEMBLY AND DISASSEMBLY 2.1 List the tools required for removal and installation of all computer system components 2.2 Describe the proper removal and installation of a CPU 2.2.1 Describe proper use of Electrostatic Discharge -
Review of Data Storage by Fusion Drive In
Volume 4, No. 3, March 2013 (Special Issue) International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info Review of Data storage by Fusion Drive in MAC Pranav Nerurkar Vinay Gentyala IT SFIT, Mumbai University IT ARMIET, Mumbai University Mumbai, India Mumbai, India [email protected] [email protected] Abstract: In the age of technology and performance big players are working arduously to compete with evolving technology. Apple has always tried to remain ahead when it comes to technology, sophistication, and performance. Apple Inc recently released a product which was often referred to as ‘a game changer’ in the data storage market. A product called ‘fusion drive’ was promoted which is a fast and efficient storage solution as claimed by Apple Inc. It was therefore necessary to investigate these claims made by Apple Inc, to find whether it delivers on all enumerations. In this paper, we performed a study and review of this technology and cite its pro’s and con’s. Also, we have laid out certain experimental results to demonstrate each function of the fusion drive along with metrics for measuring its performance. In this paper, we investigate this new technology along with its various aspects and testify if it is better than the current data storage methods. Also, we present a simple example which displays the working of this technology and the concept behind it. Keywords: Fusion Drives, Caching, Data Storage, Emerging Trends. performing both caching for faster writes and auto tiering I. INTRODUCTION for faster reads. Due to similarity in features of Apples Fusion Drive and As we all know Apple has been involved in inventing new current Hybrid drives which incorporate a large amount of range of technology that has been successful evidently. -
Exploring Forensic Implications of the Fusion Drive
Journal of Digital Forensics, Security and Law Volume 9 Number 2 Article 12 2014 Exploring Forensic Implications of the Fusion Drive Shruti Gupta Purdue University Marcus Rogers Purdue University, [email protected] Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Gupta, Shruti and Rogers, Marcus (2014) "Exploring Forensic Implications of the Fusion Drive," Journal of Digital Forensics, Security and Law: Vol. 9 : No. 2 , Article 12. DOI: https://doi.org/10.15394/jdfsl.2014.1177 Available at: https://commons.erau.edu/jdfsl/vol9/iss2/12 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Exploring Forensic Implications of the Fusion Drive JDFSL V9N2 This work is licensed under a Creative Commons Attribution 4.0 International License. EXPLORING FORENSIC IMPLICATIONS OF THE FUSION DRIVE Shruti Gupta and Marcus Rogers Purdue University 401 N. Grant St., IN 47906, Unites States fshruti,[email protected] ABSTRACT This paper explores the forensic implications of Apple's Fusion Drive. The Fusion Drive is an example of auto-tiered storage. It uses a combination of a flash drive and a magnetic drive. Data is moved between the drives automatically to maximize system performance. This is different from traditional caches because data is moved and not simply copied. -
2020-06-02-RECON IMAGER Manual
M A N U A L 1.Introduction 4 2. Version Comparisons 4 3. Supported Hardware 6 3.1 MODE A - SUPPORTED HARDWARE (Version 4.0.0) 6 3.2 MODE B - BOOT SUPPORTED HARDWARE (Version 5.0.0) 6 3.3 MODE C - SUPPORTED HARDWARE (Version 5.0.2 A1) 7 4. Before You Start 7 4.1 How Will You Process The Image? 7 4.2 What To Image? 8 4.3 What Image Format Should I Use? 8 5. Key Concepts To Understand 9 5.1 Apple File System (APFS) 9 5.2 Apple Extended Attributes 9 5.3 Fusion Drives 10 5.4 Core Storage 10 5.5 FileVault 11 5.6 T2 Security Chipset 11 5.7 Local Time Machine Snapshots (APFS) 12 5.8 Apple Boot Camp 12 6. Booting RECON IMAGER 13 6.1 Instant On - Portable Macs 13 6.2 Firmware Password 13 6.3 Connecting RECON IMAGER 14 6.4 Connecting Your Destination Drive 15 6.5 Starting RECON IMAGER 15 7. Using RECON Imager 17 7.1 Disk Manager 18 7.1.1 Refresh To Detect Changes 19 RECON IMAGER Copyright © 2010-2020 SUMURI LLC 1 of 58 7.1.2 Formatting a Collection Drive 20 7.1.3 Decrypting A FileVault Volume 22 7.1.4 System Date and Time 24 7.2 Disk Imager 24 7.2.1 Source 25 7.2.2 Image Type 25 7.2.3 Compression Options 27 7.2.4 Processing Local Time Machine Snapshots (APFS) 27 7.2.5 Destination 28 7.2.6 Image Name 28 7.2.7 Segment Size 29 7.2.8 Evidence Descriptor Fields 29 7.2.9 Hashing and Verification 30 8.