Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material Index Note to the Reader: Throughout this index boldfaced page numbers indicate primary discus- sions of a topic. Italicized page numbers indicate illustrations. Add Keyword List dialog box, 363–364, 364 A Add Local Device dialog box, 156–157, 158 , About the Examiner report, 672 166, 166 Accelerated Graphics Port (AGP) standard Add Note Bookmark dialog box, 386–387, 387 expansion slots, 9 Add Partition dialog box, 577, 578 video cards, 10 Add Partition feature in NTFS, 76 access control lists (ACLs), 26 Add Partition menu, 583–585, 584 – 585 access times in link files, 507 – 509 , 508 Add To Hash Library dialog box, 458, 459 Acquire option in LinEn, 174, 174 Advanced Encryption Standard (AES) acquiring digital evidence, 120 – 121 encryption, 178 boot disks Advanced tab in FastBloc, 161, 161 , 163 booting from, 124 – 127 advanced topics, 572 – 573 creating, 121 – 124 , 121 – 124 Base64 encoding, 619 – 622 , 620 – 621 drive-to-drive DOS acquisition, 128 email, 614 – 619 , 614 – 617 steps, 128 – 132 , 129 – 130 EnCase Decryption Suite, 622 – 629 , 623 – 627 supplemental information, 132 – 135 exam essentials, 648 EnCase Portable, 180 – 188 , 181 – 188 mounting files, 588 – 593 , 589 – 590 , 593 Enterprise and FIM, 176 – 180 , 177 , 179 partitions, 573 – 588 , 573 – 586 exam essentials, 192 – 193 Physical Disk Emulator, 636 – 641 , 637 – 639 FastBloc SE, 163 – 168 , 165 – 168 registry. See registry FastBloc/Tableau, 151 restoration, 633 – 636 , 634 – 636 FastBloc 2 features, 152 – 154 , 153 – 154 review questions, 649 – 652 models, 151 – 152 summary, 645 – 647 steps, 154 – 162 , 156 – 161 Virtual File System, 629 – 632 , 629 , 631 – 632 hints, 188 – 189 Aegis Padlock Pro tool, 668 LinEn, 168 AES (Advanced Encryption Standard) mounting file systems as read-only, encryption, 178 168 – 169 agency seals, 674 overview, 171 – 173 AGP (Accelerated Graphics Port) standard steps, 173 – 176 , 174 – 175 expansion slots, 9 updates, 169 – 171 , 170 – 171 video cards, 10 network. See network acquisitions AIM Plus history files, 372 review questions, 194COPYRIGHTED – 197 aliases MATERIAL summary, 189 – 191 file signature analysis, 443–445 acquisition hashes, 149, 202 long filenames, 50–51 Acquisition menu, 184, 185 allocated clusters, 45 ActiveTimeBias key, 482–483 allocation units, 25 adapters Alter Boot Table option, 170 crossover, 136 Alternate Path option drive, 154 acquisition locations, 160, 206 Add Evidence File option, 617 hashes, 148 Add Evidence screen, 253, 254 America Online (AOL) files, 277 686 ASCII format – body text for reports American Standard Code for Information backup case files, 219, 253 Interchange (ASCII) format, 337 – 338 Backup Every 30 Minutes option, 220 bookmarks, 384 backup utility, 220 – 227 , 221 – 226 low-bit, 619 bad clusters, 45 Analyze EFS module, 494, 623, 624 , 627 bad file signatures, 444 anchors in reports, 675 $BadClus file, 75 AND operators bagging evidence, 110 – 112 indexed searches, 420–421, 420 bar code scanners, 97 registry filters, 612, 613 base-2 numbering system, 327 – 333 , 332 – 333 ANSI Latin - 1 search option, 359 base-16 numbering system, 333 – 336 , 335 – 336 Anson, Steve, 105, 558, 604 base case folders, 250–251 antistatic bags, 111 Base64 encoding AOL (America Online) files, 277 bookmarks, 384–385 application binding, 437 – 438 email attachments, 619 – 622 , 620 – 621 application.evtx file, 554 Basic Input Output System (BIOS) .arc extension, 592 description, 11 Archive attribute in FAT, 50 time in, 476 archive files, 219 batteries .art files, 277 CMOS, 10 – 11 Artifact Parser, 497, 497 – 498 , 509–510, 510 laptops, 109 artifacts BCD (Boot Configuration Data) file, 19 description, 474 BCD (Boot Configuration Data) hive, 598 Windows. See Windows operating system Bemer, Robert W., 337 artifacts BestCrypt software, 103–104 ASCII (American Standard Code for Information Bias key, 482 Interchange) format, 337 – 338 big endian storage, 50 bookmarks, 384 binary numbers, 327 – 333 , 332 – 333 low-bit, 619 binding applications, 437 – 438 ASCII charts, 337 BinHex method, 620 ASCII tables, 337 BIOS (Basic Input Output System) asterisks (*) description, 11 GREP, 365 time in, 476 registry keys, 600 BIOS parameter blocks (BPBs), 38–39 $AttrDef file, 75 bit-flag values for FAT, 49 – 50 attributes of FAT files and directories, 49 – 50 , BitBucket key, 499 54, 55 BitLocker, 103–104 audit policies, 549, 549 $Bitmap file, 74 – 75 auditing levels, 552 – 554 , 552 bits Auto Extents feature, 282 binary numbers, 327–328, 331–333, 332 – 333 autodetect driver option, 140 hexadecimal numbers, 334–336, 335 AUTOEXEC.BAT file, 17, 596 block size evidence files, 203 LinEn, 175 in network acquisitions, 145–147 B blocking device writes, 130 backslashes (\) blocks in file systems, 25 GREP, 366–367 blocks of data, 203–204 registry keys, 600 body text for reports, 404 Body Text tab – Case category on Home screen 687 Body Text tab, 403–404, 403 booting up Bookmark Data dialog box, 378, 380 from forensic boot disks, 124 – 127 Bookmark Data option, 56 in network acquisitions, 139 Bookmark Field menu, 408–409, 409 BOOTMGR file, 19 Bookmark option, 377 bootstrap program, 14–15 Bookmark Single Item dialog box, 387, 388 BPBs (BIOS parameter blocks), 38–39 bookmarks, 377 breathing masks, 100 color for, 314 browser history, 348 data types, 382, 384 – 386 burning reports to CDs and DVDs, 678 – 679 , 679 exercise, 414 – 415 bypass, Recycle Bin, 498 – 500 , 499 FAT directory entries, 56–58, 57 byte ordering Highlighted Data, 378 – 386 , 378 – 383 description, 50 Home screen, 248 FAT, 49 INFO2 records, 491 time stamps, 476, 480 Internet history, 529–530, 530 bytes miscellaneous, 390 – 397 , 391 – 396 binary numbers, 330–332 notable file, 387 – 389 , 387 – 389 hexadecimal numbers, 334–336, 335 notes, 386 – 387 , 387 .bzip2 extension, 592 organizing, 397 – 398 , 397 partitions, 580–582, 581 – 582 , 585 reports, 397 – 414 , 397 – 403 , 405 – 413 , 675 – 678 , 676 – 678 C search hits, 377 .cab extension, 592 selected items, 389 – 390 , 390 cables Bookmarks view flat-ribbon, 155 Internet history, 530, 530 network acquisition, 136 – 137 partitions, 23, 581–582, 585 photographing, 110 Boolean conditions, 310 cache folders Boolean operators evidence, 231 , 232 GREP, 366 Internet, 532–533, 533 indexed searches, 420–421, 420 caches registry filters, 612, 613 backing up, 220 Boot Configuration Data (BCD) file, 19 path setting, 251 Boot Configuration Data (BCD) hive, 598 cameras boot disks scene photographing, 99 booting from, 124 – 127 screen photographing, 102 creating, 121 – 124 , 121 – 124 Carve HTML Files option, 615 LinEn, 169 Carve Webmail Files option, 615 network acquisitions, 137 , 137 Case Analysis tool, 619 $Boot file, 75 Case Analyzer boot indicator byte, 15 Internet history, 531 BOOT.INI file, 19 link files, 509, 510 boot mode in FireWire, 134 Case Analyzer EnScript boot order in setup routine, 127 event logs, 557, 557 boot process, 14 – 17 , 16 Job Summary report, 610, 610 DOS, 17 , 18 Recycle Bin file status, 497, 498 Windows, 17 – 18 time zone offsets, 483, 484 boot sectors, 36 – 43 , 36 – 38 Case Analyzer Report, 483 bootable partitions, 574 Case category on Home screen, 242 688 Case Info fields – Complementary Metal-Oxide Semiconductor (CMOS) Case Info fields, 251 Clean Boot option, 139 case numbers, 251 Clear All confirmation window, 167 Case Options dialog box, 218, 218 , 249, 249 CLFS (Common Log File System), 75 Case Processor, 609 – 611 , 610 – 611 Client Info tab, 638, 639 case-sensitivity .CLOOP extension, 592 custom strings, 313 Cluster Number field, 296 searches, 357, 359, 421, 421 Cluster view, 282 Case tab, 222, 222 clusters, 25 cases and case files, 217 – 219 , 218 – 219 Disk view, 280, 282 backups, 222, 222 exFAT, 82 creating, 249 – 254 , 253 – 254 FAT. See FAT (File Allocation Table) file description, 2–3 system categories navigation data, 296 hash analysis, 464, 464 NTFS, 73–74 hash sets, 458, 460 Virtual File System, 629 Home screen, 242 CMOS (Complementary Metal-Oxide Category column in Table view, 271 Semiconductor) CD Inspector CD images, 79 batteries, 10 – 11 CD-ROM (Compact Disc - Read-Only Memory) boot process, 15 drives, 8 description, 10 CD-RW (Compact Disc - Read/Write) drives, 8 CMOS chips, 10–11 CDs CMOS data, 10 burning reports to, 678 – 679 , 679 Code Page column, 272 file systems, 77 – 79 , 78 Code Page tab Linux, 169 – 171 , 170 – 171 FAT directory entries, 54, 56 network boot, 138 searches, 360 central processing units (CPUs), 3 Text view, 285, 285 – 286 boot process, 14–15 Codemeter device, 182, 186 description, 4 Collapse All option, 258, 258 chain of custody, 110 collisions, hash, 210, 449 Change Desktop Icons option, 517 color and color codes Change from a System Diskette to a Boot Floppy crossover cables, 136 option, 122–123 Disk view, 280 Change Hash Library option, 462 settings, 313 – 314 , 314 Change Icon dialog box, 505, 505 Timeline view, 279, 280 characters, 336 Colors tab, 314 ASCII, 337 – 338 Colors view, 313, 314 Unicode, 338 – 339 , 339 COMMAND.COM file, 17, 121, 121 – 122 chassis, 2–3 comments for bookmarks, 378, 379 , 392, 393 checklists for first response, 92 – 94 Common Log File System (CLFS), 75 chmod command, 174 Compact Disc - Read-Only Memory (CD-ROM) Choose Destination dialog box, 170, 170 drives, 8 chronological sorts, 268 Compact Disc - Read/Write (CD-RW) drives, 8 CHS (Cylinder Head Sector) system, 4–5, 574 Complementary Metal-Oxide Semiconductor chunks (CMOS) evidence acquisition, 131 batteries, 10 – 11 LinEn, 175 boot process, 15 circumflexes (^) in GREP, 365
Recommended publications
  • Active@ UNDELETE Documentation
    Active @ UNDELETE Users Guide | Contents | 2 Contents Legal Statement.........................................................................................................5 Active@ UNDELETE Overview............................................................................. 6 Getting Started with Active@ UNDELETE.......................................................... 7 Active@ UNDELETE Views And Windows...................................................................................................... 7 Recovery Explorer View.......................................................................................................................... 8 Logical Drive Scan Result View..............................................................................................................9 Physical Device Scan View......................................................................................................................9 Search Results View...............................................................................................................................11 File Organizer view................................................................................................................................ 12 Application Log...................................................................................................................................... 13 Welcome View........................................................................................................................................14 Using
    [Show full text]
  • RAID, LVM, WSS, Verschlüsselung)
    Hochschule Wismar University of Applied Sciences Technology, Business and Design Fakultät für Ingenieurwissenschaften, Bereich EuI Projektarbeit Aufbereitung besonderer Speicherkonfigurationen als analysefähiges Material (RAID, LVM, WSS, Verschlüsselung) Eingereicht am: 6. Juli 2019 von: Melanie Wetzig Sven Lötgering Tom Gertenbach Stefan Depping Inhaltsverzeichnis Inhaltsverzeichnis 1 Vorüberlegungen4 1.1 Motivation und Zielstellung.......................4 1.2 Anforderung an den Ermittlungsprozess.................4 1.3 Einordnung in Ermittlungsprozess....................6 1.4 Write-Blocker...............................6 1.5 Software..................................7 1.5.1 Rohdatenformat (RAW).....................7 1.5.2 Expert Witness Format (EWF).................8 1.5.3 Advanced Forensic Format (AFF)................8 1.5.4 Xmount..............................8 2 Rechtliche Betrachtung9 2.1 Einleitung.................................9 2.2 Private Ermittlungen........................... 10 2.3 Behördliche Ermittlungen........................ 11 2.4 Zusammenfassung............................. 11 3 Speichermedien 13 3.1 Einleitung................................. 13 3.2 Magnetspeicher.............................. 13 3.2.1 Speicherung auf einer HDD................... 14 3.2.2 Löschen von Daten auf einer HDD............... 15 3.2.3 Forensische Relevanz....................... 15 3.3 Flash-Speicher............................... 15 3.3.1 Speicherung auf einer Solid-State-Drive (SSD)......... 16 3.3.2 Löschen von Daten auf einer SSD...............
    [Show full text]
  • SLDXA /T /L1 – SLX Component List
    SLDXA /T /L1 – SLX Component List SLDXA.exe ver 1.0 Copyright (c) 2004-2006 SJJ Embedded Micro Solutions, LLC All Rights Reserved SLXDiffC.exe ver 2.0 / SLXtoTXTC.exe ver 2.0 www.sjjmicro.com Processing... File1 to TXT file. Opening XSL File Reading RTF for final conversion F:\SLXTEST\LOCKDOWN_DEMO2.SLX has the following Components Total Count is: 577 -------------------------------------------------- .NET Framework 1.1 - Security Update KB887998 Accessibility Control Panel Accessibility Core ACPI Fixed Feature Button Active Directory Service Interface (ADSI) Core Active Directory Service Interface (ADSI) LDAP Provider Active Directory Service Interface (ADSI) Windows NT Provider Active Template Library (ATL) Add Hardware Control Panel Add/Remove Programs Control Panel Administration Support Tools Administrator Account Advanced Configuration and Power Interface (ACPI) PC Analog TV Application Compatibility Core Audio Codecs Audio Control Panel Base Component Base Performance Counters Base Support Binaries CD-ROM Drive Certificate Request Client & Certificate Autoenrollment Certificate User Interface Services Class Install Library - Desk Class Install Library - Mdminst Class Install Library - Mmsys Class Install Library - Msports Class Install Library - Netcfgx Class Install Library - Storprop Class Install Library - System Devices Class Installer - Computer Class Installer - Disk drives Class Installer - Display adapters Class Installer - DVD/CD-ROM drives Class Installer - Floppy disk controllers Class Installer - Floppy disk drives
    [Show full text]
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • Veeam Backup 7 Release Notes
    VEEAM BACKUP & REPLICATION 7.0 RELEASE NOTES This Release Notes document provides last-minute information about Veeam Backup & Replication 7.0, including system requirements, installation and upgrade procedure, as well as relevant information on technical support, documentation, online resources and so on. The current version of Veeam Backup & Replication 7.0 is available for download at: http://www.veeam.com/vmware-esx-backup/download.html starting from August 15, 2013. See next: • System Requirements • Known Issues • Installing Veeam Backup & Replication • Uninstalling Veeam Backup & Replication • Upgrading Veeam Backup & Replication • Licensing • Updating Veeam Backup & Replication License • Technical Documentation References • Technical Support • Contacting Veeam Software 1 | Veeam Backup & Replication 7.0.0.690 | RELEASE NOTES System Requirements VMware Infrastructure Platforms • vSphere 5.0, 5.1 • vSphere 4.x • Infrastructure 3.5 (VI3.5) Hosts • ESXi 5.0, 5.1 • ESX(i) 4.x • ESX(i) 3.5 Software • vCenter Server 5.0, 5.1 (optional) • vCenter Server 4.x (optional) • Virtual Center 2.5 (optional) VMware Virtual Machines Virtual Hardware • All types of virtual hardware are supported. • Virtual machines with disks engaged in SCSI bus sharing are not supported, because VMware does not support snapshotting such VMs. • RDM virtual disks in physical mode, Independent disks and disks connected via in-guest iSCSI initiator are not supported, and are skipped from processing automatically. OS • All operating systems supported by VMware. • Application-aware
    [Show full text]
  • Jim Allchin on Longhorn, Winfs, 64-Bit and Beyond Page 34 Jim
    0805red_cover.v5 7/19/05 2:57 PM Page 1 4 Scripting Solutions to Simplify Your Life Page 28 AUGUST 2005 WWW.REDMONDMAG.COM MrMr WindowsWindows Jim Allchin on Longhorn, WinFS, 64-Bit and Beyond Page 34 > $5.95 05 • AUGUST Make Room for Linux Apps Page 43 25274 867 27 Active Directory Design Disasters Page 49 71 Project1 6/16/05 12:36 PM Page 1 Exchange Server stores & PSTs driving you crazy? Only $399 for 50 mailboxes; $1499 for unlimited mailboxes! Archive all mail to SQL and save 80% storage space! Email archiving solution for internal and external email Download your FREE trial from www.gfi.com/rma Project1 6/16/05 12:37 PM Page 2 Get your FREE trial version of GFI MailArchiver for Exchange today! GFI MailArchiver for Exchange is an easy-to-use email archiving solution that enables you to archive all internal and external mail into a single SQL database. Now you can provide users with easy, centralized access to past email via a web-based search interface and easily fulfill regulatory requirements (such as the Sarbanes-Oxley Act). GFI MailArchiver leverages the journaling feature of Exchange Server 2000/2003, providing unparalleled scalability and reliability at a competitive cost. GFI MailArchiver for Exchange features Provide end-users with a single web-based location in which to search all their past email Increase Exchange performance and ease backup and restoration End PST hell by storing email in SQL format Significantly reduce storage requirements for email by up to 80% Comply with Sarbanes-Oxley, SEC and other regulations.
    [Show full text]
  • Acronis® Disk Director® 12 User's Guide
    User Guide Copyright Statement Copyright © Acronis International GmbH, 2002-2015. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure Zone", Acronis True Image, Acronis Try&Decide, and the Acronis logo are trademarks of Acronis International GmbH. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Third party code may be provided with the Software and/or Service. The license terms for such third-parties are detailed in the license.txt file located in the root installation directory. You can always find the latest up-to-date list of the third party code and the associated license terms used with the Software and/or Service at http://kb.acronis.com/content/7696 Acronis patented technologies Technologies, used in this product, are covered and protected by one or more U.S.
    [Show full text]
  • Federal Implementation Guideline for Electronic Data Interchange
    NIST RESEARCH LIBRARY NIST Special Publication 881-38 APR 6 " 1998 Federal Implementation Guideline for Electronic Data Interchange ASC X12 Version/Release 003070 FEDERAL CONVENTIONS FOR USING ASC XI 2 TRANSACTION SETS Implementation Convention Nisr U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology rhe National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . , . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering, and develops measurement techniques, test methods, standards, and related services. The Institute does generic and precompetitive work on new and advanced technologies.
    [Show full text]
  • Drobo Dashboard Release Notes Release Date: May 14, 2013 VERSION INFORMATION Drobo Dashboard: Version 2.5.2 [64171] (Mac) Version 2.5.2 [64171] (Windows)
    Drobo Dashboard Release Notes Release Date: May 14, 2013 VERSION INFORMATION Drobo Dashboard: Version 2.5.2 [64171] (Mac) Version 2.5.2 [64171] (Windows) KEY HIGHLIGHTS This is a new release version of Drobo Dashboard for Mac and Windows. Key highlights of this release are: This version of Drobo Dashboard is compatible with all Drobo models - Drobo Gen 2, Drobo FS, Drobo S, DroboPro, DroboPro FS, B800fs, DroboElite, B800i, B1200i, Drobo 5D, Drobo Mini and Drobo 5N. Fixed iSCSI connectivity issues due to Java update on Mac OSX 10.8.x hosts Localization improvements Fixed unexpected quit on Mac OSX 10.8.x hosts KNOWN ISSUES All Operating Systems Symptom: Attempting to install multiple versions of Drobo Dashboard at the same time, will fail. Condition: Installing a different (newer or older) Drobo Dashboard version over the existing Drobo Dashboard version installed on the host system, will overwrite the existing version. Workaround: Always use the latest supported version of Drobo Dashboard. Symptom: Attempting to log in with an incorrect iSCSI CHAP password will return generic error. Condition: When logging in a volume with an incorrect CHAP password, Drobo Dashboard will report “Operation failed” error. Workaround: Enter the correct password. If you do not remember the correct password, you can reset the password by logging in as administrator in Drobo Dashboard, disabling CHAP password and re-enabling CHAP password by entering a new value in the password field. Symptom: Formatting volumes when connected to Drobo B1200i via the management port is not available. Condition: When connected to Drobo B1200i via the management port, Drobo Dashboard can be used for changing device settings and creating or deleting volumes.
    [Show full text]
  • Wxrt VCS for Windows 5.1 SCL Based GA Version
    Release Revision 1.6 25 Oct 2012 Software Compatibility List (SCL) Veritas Cluster Server 5.1 Service Pack 2 for Windows® Symantec Veritas Cluster Server for Windows 5.1 SP2 S x86, IA64, x64 Note 01, 02 5.1, 5.1AP1, Symantec Veritas Cluster Server for Windows U x86, IA64, x64 5.1SP1,5.1SP1AP1 Symantec Veritas Cluster Server for NetApp SnapMirror 5.0 RP1a, 5.0RP2 U x86, IA64, x64 Symantec Veritas Cluster Server Agent for Websphere 5.1 S x86, x64 Note 05 Symantec Veritas Cluster Server Agent for Websphere MQ 5.0 S x86, x64, IA64 Note 06 Symantec Veritas Cluster Server Agent for SAP NetWeaver 4.3.01.0 S x86, x64, IA64 Note 07 Symantec Veritas Storage Foundation for Windows All versions X x86, x64, IA64 Note 02 Symantec Veritas Enterprise Vault 8.0 SP1-SP5, 9.0.x S x86 Symantec Veritas Enterprise Vault C Note 31 10.0 x86 Note 21, 22, 23, 28, Veritas NetBackup 6.0 MP1-MP3 Symantec L x86 29 Symantec Veritas NetBackup 6.0 MP4-MP6 C x86 Note 22, 23,28, 29 Symantec Veritas NetBackup 6.5, 6.5.2-6.5.4 C x86, x64 Note 22, 23, 28, 29 Symantec Veritas NetBackup 6.5.1 L x86, x64 Note 22, 23, 28, 29 Symantec Veritas NetBackup 7.0, 7.0.1 L x86, x64 Note 22, 23, 27, 28 Symantec Symantec Backup Exec for Windows Servers 10.x X x86 Note 28 Symantec Symantec Backup Exec for Windows Servers 11.0, 11d C x86 Note 28 Symantec Symantec Backup Exec for Windows Servers 12.0, 12.5 C x86 Note 28 Symantec Symantec Backup Exec for Windows Servers 2010, 2010 R2 L x86 Note 24, 25, 28 Symantec Symantec Backup Exec System Recovery 6.5, 7.0 C x86 Note 28 Symantec Symantec
    [Show full text]
  • AIX V4.3 and Windows 2000, Side by Side
    AIX V4.3 and Windows 2000, Side by Side Laurent Vanel, Leonardo Antonelli, Angela Keelan, Miha Music International Technical Support Organization www.redbooks.ibm.com SG24-4784-01 SG24-4784-01 International Technical Support Organization AIX V4.3 and Windows 2000, Side by Side April 2000 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix A, “Special notices” on page 521. Second Edition (April 2000) This edition applies to AIX Version 4.3.3, Program Number 5765-C34. This document was created or updated on April 14, 2000. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2000. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures....................................................ix Tables....................................................xv Preface.................................................. xvii The team that wrote this redbook. ................................. xvii Commentswelcome............................................xviii
    [Show full text]
  • Spectrum Reference Manual
    Apple® IIGS Spectrum™ 2.5.6 Reference Manual Notes on Freeware Edition From an initial inception as a IIgs communications program called Impala, Spectrum was developed and released under the guidance of Dave Hecker of Seven Hills International. Originally released back in 1991, it was sold by Seven Hills until their eventual closure. Seven Hills agreed I could continue to sell Spectrum, so I asked Eric Shepherd of Syndicomm to sell Spectrum on my behalf. In 2011 Tony Diaz took over Syndicomm and continued to sell it for me. With the declining sales over the years, I finally decided that the time had come in 2012 to make Spectrum Freeware. To coincide with its reclassification, this PDF manual has been compiled from the original Seven Hills manuals. I have changed a few words and links here and there, and added new screen shots and illustrations. Ewen Wannop - 2012 2 Spectrum About Seven Hills Software No Copy Protection We don’t believe in copy protection—all it does is impair the honest user’s ability to use software to its fullest. We strive to provide high quality products at reasonable prices. We hope you will support our efforts by not allowing your family or friends to copy this software. Questions and Comments We always welcome feedback—if you have any questions, or suggestions for improving this product, please let us know. In addition, we would like to hear your ideas for new programs. Copyrights and Trademarks This manual and the software (computer program) described in it are copyrighted with all rights reserved.
    [Show full text]