19600 a Novel Tool for Data Recovery in Cyber

Total Page:16

File Type:pdf, Size:1020Kb

19600 a Novel Tool for Data Recovery in Cyber Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 19600- 19611 Received 05 March 2021; Accepted 01 April 2021. A Novel tool for Data Recovery in cyber forensics Revathi Jagarlamudi1 MTech Student, Department of CSE (Cyber Security and digital Forensics), Koneru Lakshmaiah Educational Foundation,Vaddeswaram, A.P, India, [email protected] Dr. G. Rama koteswar Rao2 Professor, Department of CSIT(Computer Science and Information Technology),Koneru Lakshmaiah Educational Foundation,Vaddeswaram, A.P, India, [email protected] ABSTRACT-Digital forensics has become an essential bit of many cyber security programs universally and information recovery is a vital segment of cyber forensics. Data recovery mechanism plays a fundamental role in ensuring the security of computer information and it is a hot stock of current informatization in many industries. By exploring the information storage structure of the hard disc, this paper addresses the fundamental technology of hard disc, data recovery and discusses the information recovery technique and its realization combined with the specific software development. FAT and NTFS are considered as the popular file systems supported by Windows OS. Aiming towards information loss on Windows file systems this paper concentrates upon the essential objectives of information recovery on Windows FAT and NTFS and provides corresponding resolution. Keywords: Data Recovery, Hard disc, Windows file systems, File allocation table, NTFS. I. INTRODUCTION With the rapid growth of data technology, computers play a progressively crucial part in every individual’s work and life, and computer information security issues are getting increasingly distressed. Plentiful data is put away as information on file systems. As a principal part of data management, the security of information has been paid increasingly concerned attention by every individual. Stepwise instructions to recuperate lost information rapidly and effectively becomes an important issue. The loss and destruction or disruption of information usually cause irreparable consequences [1]. As of now, the share in market for Windows operating system surpasses 92%, and FAT and NTFS[2] are the mainstream file systems supported by Windows OS. Consequently, this paper focuses predominantly on the development of data recovery application for Windows FAT32 and NTFS[3]. A. Fat File System The file allocation table file system or FAT is developed for hard drives and is used to administer files on the hard drives through the operating system[4]. It is comprised of four areas. They are: Reserved sectors The originally reserved area (logical sector 0) is the Boot Sector (likewise called Volume Boot Record or essentially VBR). It incorporates a territory called the BIOS Parameter Block (BPB) which contains some fundamental file system data, specifically its type and pointers to the area of different sections, and ordinarily contains the boot loader code of OS(operating system). FAT Region FAT Region commonly contains two duplicates of the File Allocation Table with the scope of checking the redundancy. They are occasionally utilized by the disc repair serviceability. These are guides of the Data Region, demonstrating which clusters are utilized by documents and directories. In FAT12 and FAT16 they promptly follow the reserved sectors. FAT Region= (number of FATs) * (number of sectors per FAT) Root Directory Region This is a Directory Table which stores information regarding the documents and directories situated in the root directory. It is just utilized with FAT12 and FAT16 and forces on the root directory a fixed most extreme size which is pre-allocated at making of this volume. FAT32 stores the source index in Data Region, alongside documents and distinct directories, permitting it to develop without such a constraint. Root Directory Region= (number of root entries * 32)/(number of bytes per sector)Data Region This region is the area where the genuine document and the directory data is stored and takes up a large portion of the segment. 19600 http://annalsofrscb.ro Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 19600- 19611 Received 05 March 2021; Accepted 01 April 2021. Data Region= (number of clusters) * (number of sectors per cluster) B. Classification Of Data Recovery From the viewpoint of data recovery strategies, there are especially three kinds of software recovery techniques, they are software and hardware recovery techniques and deep signal recovery techniques. The software recovery technique is mostly to utilize data recuperation software to regain information when the hard disc can in any case be utilized. This recovery technique is low in recuperation cost, yet it is weak for those hard discs that have been physically damaged. Software and hardware mixed technique is to fix the hard disc or open the disc to read the information within the disc and afterwards utilize the software to reestablish the information[5]. The deep signal recovery technique analyzes the condition of the deep magnetic medium on the surface area of the disc and illuminates the crystal with rays of various wavelengths and various intensities to generate distinctive reflection, refraction and diffraction signals [6]. However, because of the complexness of the technology and the high price of recovery along these lines, and as of now couple of countries on the planet can have such technology. just few large-scale computer organizations and government offices at no cost will have this degree of data recovery equipment [7]. II. LITERATURE SURVEY Ref [7] Zhang Kai, Cheng En and Gao Qinquan focused on the demand of cyber forensics dependent on NTFS file system and proposed a strategy for object-arranged technique to design and examine NTFS file system. The acquire relationship and encapsulation of classes are utilized to profoundly examine various kinds of data resources. It accomplishes the typical file analysis as well as recovers the deleted file. A solid data source for the PC forensics is given. Simultaneously, numerous interfaces have reference incentive for the idea of upper cyber forensic software. Ref [8] Sameer H. Mahant B.B. Meshram stated that discovering evidence in deleted documents and restoring them is significant for investigation. They portrayed the inward details on NTFS file system and how does it handle the deleted documents, which could be utilized to check the results of recovery applications. They have likewise proposed a strategy which will help in quicker recovery of deleted documents. Ref [16] Van Dai Tran, Dong-Joo Park targeted on flash memory, this memory has an ever-increasing number of applications throughout everyday life and capacity improvement solutions are generally applied in the support gadgets. It is critical to recover information when something turns out badly with Flash memory in cases a sudden power outage or failure. In this manner, recovering information is a fast and furious research field and draws in a great deal of researchers. Until now, there are numerous specialized solutions have been proposed. Ref [20] Joe Buchanan-Wollaston, Tim Storer and William Glisson has compared the information recovery abilities of five applications under indistinguishable conditions to survey the recovery speed with which applications complete the information recovery process and the degree of the variations between the applications regarding the files recovered. No two applications produced identical outcomes, and no application recuperated all the files in a disk image ("all" is characterized at the aggregate of the distinct documents collectively recuperated by the tools). Ref [21] Yinghua Guo and Jill Slay focused on mapping the essential elements of the cyber forensic discipline is an amazing methodology for making a function- oriented validation and confirmation worldview for computerized forensic tools. The utility of the methodology is shown with regards to the information recovery function through the specification of information recovery prerequisites and a reference set for testing applications that actualize the information recovery function. Validating a computerized forensic application is reduced to testing the application against the reference set. III. ANALYSIS ON DATA RECOVERY TECHNOLOGY A. Hard Disk Storage Structure To recover the deleted data, right off the bat we should comprehend the standards of data storage. The storage structure of the hard disc includes five sections MBR area, DBR region, FAT area, Dir section and data area. 2 19601 http://annalsofrscb.ro Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 4, 2021, Pages. 19600- 19611 Received 05 March 2021; Accepted 01 April 2021. Fig1: Hard disk storage structure The MBR (Main Boot Record) area [8] is situated in the 0 track 0 Cylinder 1 sector of the whole hard disc, which possesses a total of 512 bytes. It comprises of a 446-byte master boot program, a 64-byte partition table record and a 2-byte end tag ("55AA"). Its definitive content is produced by the partition program and it does not have a place with any operating system. Its principal function is to check whether the partition table is correct and reel off the OS boot program in boot partition [9]. It cannot be instantly accessed by the operating system, and information is commonly read through Int 13 or extended Int 13. The DBR (DOS Boot Record) region is situated at track 0, 1 cylinder, and 1 sector. It is the primitive area which can be straightforwardly accessed by the OS (operating system). It consists of the boot program and BPB (BIOS Parameter Block). It is produced by the formatter distinctive partition format of DBR vary. The FAT (File Allocation Table) area file system to a(FAT) file allocation table space and it has the accordance with the disc data blocks. Every item consumes 1.5 bytes in FAT12, each item occupies 2 bytes in FAT16, and every item possesses 4 bytes in FAT32. In this way, it is not too hard to determine the length or range of the FAT when the partition volume or size is known.
Recommended publications
  • A New Generation of Hard Disk Recovery Software
    EASEUS Data Recovery Wizard Free Edition – A New Generation of Hard Disk Recovery Software NEW YORK CITY, N.Y., June 29 (SEND2PRESS NEWSWIRE) — EASEUS Data Recovery Wizard Free Edition, the innovative and leading data recovery software, has proven itself to be the first world-wide free hard disk recovery software and a new generation in its category since its release. Totally free and providing powerful features that no other free data recovery software like Recuva™ and Pandora™ have, even some commercial ones, it is the most popular and feature-rich hard disk recovery freeware for Windows today. With the use of computers continuing to increase, hard disk recovery is not a welcome task, but something that is very important for our business and daily life. Those who have computers know data loss is a common possibility because of accidental deletion, format, partition damage or loss, software crash, computer virus infection, power failure, etc. Whatever the cause, quality free hard disk recovery software is a preferable remedy to data loss and to get those lost files back quickly and easily. EASEUS Data Recovery Wizard Free Edition, the professional and comprehensive Windows disk recovery software, helps recover deleted or lost files easily from hard drive disks or other storage media whenever needed, and is tops in other areas due to: * Totally free and with powerful features of commercial ones; * Unformat files with original file name and storage paths; * FAT/NTFS Partition recovery when partitions are deleted or damaged; * Recover files from dynamic disk and RAID; * Recover lost files from Linux (EXT2/EXT3) files system under Windows; * Recover files from all kinds of storage media like external hard drive, USB disk, SD card, memory card; * Continue data recovery process at any time you want.
    [Show full text]
  • Networker Jukebox Control Command Nsrjb
    Maintenance Procedures NSRJB ( 8 ) NAME nsrjb − NetWorker jukebox control command SYNOPSIS nsrjb [ −C ][−j name ][−s server ][−v ][−f device ][−S slots | −T Ta gs | volume names ] nsrjb −L [ −j name ][−s server ][−gimnqvG ][−Y | −N ][−R | −B ][−b pool ][−f device | −J hostname ][−e forev er ][−c capacity ][−o mode ][−S slots | −T tags | volume names ] nsrjb −l [ −j name ][−s server ][−nvqrG ][−R [ −b pool ]][−f device | −J hostname ][−S slot | −T tags | volume names ] nsrjb −u [ −j name ][−s server ][−qv ][−f device ][−S slot | −T tags | volume names ] nsrjb −I [ −j name ][−s server ][−Evpq ][−I | −f device ][−S slots | −T tags | volume_names ] nsrjb −p [ −j name ][−s server ][−vq ][−f device ][−S slot | −T tag | volume name ] nsrjb −o mode [ −j name ][−s server ][−Y ][−S slots | −T tags | volume names ] nsrjb −H [ −j name ][−s server ][−EHvp ] nsrjb −h [ −j name ][−s server ][−v ] nsrjb −U uses [ −j name ][−s server ][−S slots | −T tags ] nsrjb −V [ −j name ][−s server ] nsrjb −d [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots ][−T tags ][volume names ] nsrjb −w [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots | −T tags | volume names ] nsrjb −a [ −j name ][−s server ][−vd ][−T tags |[−T tags ] volume names ] nsrjb −x [ −j name ][−s server ][−vwX ][−T tags | −S slots ] nsrjb −F [ −j name ][−s server ][−v ] −f device DESCRIPTION The nsrjb program manages resources in two broad classes of jukeboxes, remotely managed jukeboxes and locally managed jukeboxes. Remotely managed jukeboxes are controlled through an external agent.
    [Show full text]
  • Command Control Interface Command Reference
    Command Control Interface Command Reference Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Contents Product Version Getting Help MK-90RD7009-19 © 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries.
    [Show full text]
  • U.S. EPA, Pesticide Product Label, COMMAND 4E HERBICIDE, 09/02
    Don carlson, Ph.D. FMC corporation Agricultural Chemical Group 1735 Market street Philadelphia, PA 1910 3 Dear Dr. Carlson: Subject: Camand 4 EC Herbi,lde EPA Reg. No. 279-30~1 RE: Amended Labeling (tillage/nQ-tillage directions) Your Submission Dated August 13, 1992 ~he labeling refprred to above, submitted in connection with registration under the Federal Insecticide, Fungicide, and Rodenticide Act, as amended, is acceptable. A stamped copy is enclosed for your records. Sincerely yours, Robert J. Taylor Product I'anager (25) Fungicide-Herbicide Branch Registration Division (H7505C) CONCURRENCES SYMBOL;: l/7.)~.$P" ............... ... .................. ................. ................. ................................................... ::N£AM~, '%f:1; .... ........................................................................................................................ OFFICIAL FILE COPY _ i2 a a all a an a. .a $A 4SQS4 4t P ) ) Code 1139 Net Contents Command®4 E Herbicide For Agricultural or Commercial Use Only NOT FOR SALE OR USE IN CAUFORNIA EPA Reg. No. 279-3071 EPA Est. 279- Active Ingredient: By Wt. Clomazone: 2-(2-Chlorophenyl)methyl-4. 4-dimethyl-3-isoxazolidinone •...........••••..... 44.4% Inert Ingredients: .........•..............•......... 55.6% 100.0% Contains 4 pounds 01 active ingredient per gallon U.S. Patent No. 4.405,357 KEEP OUT OF REACH OF CHILDREN CAUTION FIRST AID " In SyH: Flush with plenty 0/ water. Get medical attention as AtlL.C OF CONTENTS 'Ossible. ' aI inlormations an pages 1-4 belore referring 10 specific ; swallowed: Drink prompUy large quatltities 01 crop use. alcohol. Do nol ind~'C8 vomiting. cau a physician, " Inh8led: Remove to fresh air. " Page lion. prelerably mouth·to-mouth.·. possible. ~~.::::::::::::::::::::::::::::::::::::::::::::: 1 Precautionary Statements ............................ ... 1 " on akin: Wash Skin Diredions lor Use ....................................... 1 allention. ~ and ~ ...............•.......•.......•... 2 For Emergency f!prayer CIeanuo ......................................
    [Show full text]
  • Weed Control Guide for Ohio, Indiana and Illinois
    Pub# WS16 / Bulletin 789 / IL15 OHIO STATE UNIVERSITY EXTENSION Tables Table 1. Weed Response to “Burndown” Herbicides .............................................................................................19 Table 2. Application Intervals for Early Preplant Herbicides ............................................................................... 20 Table 3. Weed Response to Preplant/Preemergence Herbicides in Corn—Grasses ....................................30 WEED Table 4. Weed Response to Preplant/Preemergence Herbicides in Corn—Broadleaf Weeds ....................31 Table 5. Weed Response to Postemergence Herbicides in Corn—Grasses ...................................................32 Table 6. Weed Response to Postemergence Herbicides in Corn—Broadleaf Weeds ..................................33 2015 CONTROL Table 7. Grazing and Forage (Silage, Hay, etc.) Intervals for Herbicide-Treated Corn ................................. 66 OHIO, INDIANA Table 8. Rainfast Intervals, Spray Additives, and Maximum Crop Size for Postemergence Corn Herbicides .........................................................................................................................................................68 AND ILLINOIS Table 9. Herbicides Labeled for Use on Field Corn, Seed Corn, Popcorn, and Sweet Corn ..................... 69 GUIDE Table 10. Herbicide and Soil Insecticide Use Precautions ......................................................................................71 Table 11. Weed Response to Herbicides in Popcorn and Sweet Corn—Grasses
    [Show full text]
  • Cheatsheet V2.4.Pdf
    ! ! 2.4!Edition! Cross!reference!processes!with!various!lists:! Scan!a!block!of!code!in!process!or!kernel!memory! psxview! for!imported!APIs:! ! impscan!! Show!processes!in!parent/child!tree:! !!!!Hp/HHpid=PID!!!!!!!!!Process!ID!! pstree! !!!!Hb/HHbase=BASE!!!Base!address!to!scan! & !!!!Hs/HHsize=SIZE!!!!!!!Size!to!scan!from!start!of!base! Process&Information& ! ! Logs&/&Histories& Specify!–o/HHoffset=OFFSET!or!Hp/HHpid=1,2,3!! ! ! Recover!event!logs!(XP/2003):! Display!DLLs:! evtlogs!! ! ! dlllist! !!!!HS/HHsaveHevt!!!!!!!!!!!!!!!!!!!!Save!raw!event!logs! Development!build!and!wiki:! ! !!!!HD/HHdumpHdir=PATH!!!Write!to!this!directory! github.com/volatilityfoundation!! Show!command!line!arguments:! ! ! cmdline! Recover!command!history:! Download!a!stable!release:! ! cmdscan!and!consoles!! volatilityfoundation.org!! Display!details!on!VAD!allocations:! ! ! vadinfo![HHaddr]! Recover!IE!cache/Internet!history:! Read!the!book:! ! iehistory!! artofmemoryforensics.com! Dump!allocations!to!individual!files:! ! ! vaddump!HHdumpHdir=PATH![HHbase]! Show!running!services:! Development!Team!Blog:! ! svcscan!! http://volatilityHlabs.blogspot.com!! Dump!all!valid!pages!to!a!single!file:! !!!!Hv/HHverbose!!!!Show!ServiceDll!from!registry! ! memdump!HHdumpHdir=PATH! ! (Official)!Training!Contact:! ! Networking&Information& Display!open!handles:! [email protected]!! ! handles!! ! Active!info!(XP/2003):! !!!!Ht/HHobjectHtype=TYPE!!!Mutant,!File,!Key,!etc…! Follow:!@volatility! connections!and!sockets!! !!!!Hs/HHsilent!!!!!!!!!!!!!!!!!!!!!!!!!!!Hide!unnamed!handles!
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • Command Control Interface Command Reference Error Codes
    Command Control Interface 01-43-03-01 Command Reference This document describes and provides instructions for using the Command Control Interface (CCI) software to configure and perform operations on the Hitachi RAID storage systems. Hitachi Virtual Storage Platform G series and F series Hitachi Virtual Storage Platform Hitachi Unified Storage VM Hitachi Universal Platform V/VM MK-90RD7009-33 October 2017 © 2010, 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively, “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.HitachiVantara.com/ en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements.
    [Show full text]
  • Defraggler Windows 10 Download Free - Reviews and Testimonials
    defraggler windows 10 download free - Reviews and Testimonials. It's great to hear that so many people have found Defraggler to be the best defrag tool available. Here's what people are saying in the media: "Defraggler is easy to understand and performs its job well. if you want to improve computer performance, this is a great place to start." Read the full review. LifeHacker. "Freeware file defragmentation utility Defraggler analyzes your hard drive for fragmented files and can selectively defrag the ones you choose. The graphical interface is darn sweet." Read the full review. PC World. "Defraggler will show you all your fragmented files. You can click one to see where on the disk its various pieces lie, or defragment just that one. This can be useful when dealing with very large, performance critical files such as databases. Piriform Defraggler is free, fast, marginally more interesting to watch than the default, and has useful additional features. What's not to like?" Read the full review. - Features. Most defrag tools only allow you to defrag an entire drive. Defraggler lets you specify one or more files, folders, or the whole drive to defragment. Safe and Secure. When Defraggler reads or writes a file, it uses the exact same techniques that Windows uses. Using Defraggler is just as safe for your files as using Windows. Compact and portable. Defraggler's tough on your files – and light on your system. Interactive drive map. At a glance, you can see how fragmented your hard drive is. Defraggler's drive map shows you blocks that are empty, not fragmented, or needing defragmentation.
    [Show full text]
  • LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS
    LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS Commands,Rules for naming files in DOS and Types of files Operating System Operating system is a set of software that controls and manages hardware and basic system operations for a computer. The operating system loads programs into the computer's memory, runs these programs, and manages peripherals like disks and printers. Example: Disk Operating System (DOS) Windows LINUX Mac UNIX Disk Operating System (DOS) • In the 1980s or early 1990s, the operating system that shipped with most PCs was a version of the Disk Operating System (DOS) created by Microsoft: MS-DOS. • MS-DOS is a disk-based, single-user, single-task and character based user interface (CUI) operating system. Goto MSDOS from Windows Operating System: Click Start Button Choose Program Choose Accessories Click Command Prompt as shown below: Or Click Start Button Choose Run Type cmd in the Open tab as shown below: Command Prompt will get displayed as shown: The DOS commands can be entered in the command prompt and executed. Some Examples of DOS commands DIR Command The dir command allows you to see the available files in the current and/or parent directories. Examples: 1. DIR Lists all files and directories in the directory that you are currently in. 2. dir /w If information on the date / time and other information on the files are not needed, then this command can be used to list just the files and directories going horizontally, taking as little as space needed. 3. dir /on List the files in alphabetical order by the names of the files.
    [Show full text]
  • Introduction: DOS (Disk Operating System) Is an Oldest Type of Operating System
    DOS (Disk Operating System) 1 Introduction: DOS (Disk Operating System) is an oldest type of Operating System. Disk Operating System is abbreviated as DOS. DOS is a CUI type of Operating System. In computer science, a generic term describing any operating system is system software which is loaded from disk devices when the system is started or rebooted. DOS is a single-tasking, single-user operating system with a command-line interface. DOS acts on commands. Because DOS is ready to perform when given proper command hence, it is also known as Command Prompt. Commands are certain words of English language or short form of English words. The meaning of these word or short form is already known to DOS. Since, DOS recognized these words and hence acts accordingly. These words and short forms of the English words are better known as commands. Internal Command:-Those commands which are already stored in the “Command.Com” file of DOS are known as internal commands. For example, CLS, VOL, TIME, DATE, COPY etc External Command:-Those commands which are not included in the command.com file of DOS rather included in other files of DOS are known as external commands. It is formatted according to programme. For example, TREE, FORMAT, MODE etc Some Internal Commands:- 1. CLS To clear the screen. \>cls 2. DIR To view the directory and files C:\>Dir 3. DATE To View and change the date C:\>Date Current date is: 01-01-2008 Enter new date (mm/dd/yy):21-03-2009 4. TIME To view and change the time.
    [Show full text]
  • Compute Blade Built-In LAN Switch Module Software Manual Operation Commands, Vol
    Compute Blade Built-in LAN Switch Module Software Manual Operation Commands, Vol. 1 Ver.10.5 and 10.7 and 11.6 compatible BSLANSW-S003X-50 MK-99COM094-01 HITACHI Applicable product This manual describes model Compute Blade Built in LAN Switch Module. It also describes Built in LAN Switch Module software Ver.10.5 and Ver.10.7 and 11.6 functions. Software functions supported by software OS-L3A and OS-L3SA is also described. ------------------------------------------------------------------- The BladeSymphony server name has been changed to Hitachi Compute Blade. If you are using BladeSymphony based server products, substitute references to Hitachi Compute Blade with BladeSymphony. This manual describes as substitution product code GV-BE2LSW1X1-Y for GV-BE2LSW1XR-Y and GV-BE2LSW2X1-Y for GV-BE2LSW2XR-Y. If you use OS-L3SA, please add the prefix of ‘0/’ to the interface number of gigabitethernet to be specified by some commands. ------------------------------------------------------------------- Caution when exporting The necessary procedures are to be adopted when exporting this product after first confirming the regulations of the Foreign Exchange and Foreign Trade Law, U.S. export control related regulations, etc. If any questions remains, please consult with our sales department. Trademarks Cisco is a registered trademark of U.S. Cisco Systems, Inc. in the U.S. and other countries. Ethernet is a product name of the Xerox Corp. IPX is a trademark of Novell,Inc. Microsoft is a registered trademark of the Microsoft Corp. in the U.S. and other countries. Octpower is a trademark of NEC Corporation. UNIX is a registered trademark in the U.S. and other countries exclusively licensed by X/Open Company Limited.
    [Show full text]