Computer System Storage Fundamentals

Total Page:16

File Type:pdf, Size:1020Kb

Computer System Storage Fundamentals Color profile: Generic CMYK printer profileHacking / Incident Response & Computer Forensics / Prosise & Mandia / 222696-x / Chapter 10 Composite Default screen CHAPTER 10 Computer System Storage Fundamentals 217 P:\010Comp\Hacking\696-x\ch10.vp Friday, June 27, 2003 12:03:27 PM Color profile: Generic CMYK printer profileHacking / Incident Response & Computer Forensics / Prosise & Mandia / 222696-x / Chapter 10 Composite Default screen 218 Incident Response & Computer Forensics efore you can dive head first into exciting investigations involving computer intru- sions from foreign countries, international money-laundering schemes, foreign Bstate-sponsored agents, or who posted your purity test score to Usenet, you need to have a solid understanding of basic computer hardware, software, and operating sys- tems. In this chapter, we focus on system storage—hard drives and the file systems on those drives. If you can answer the following three questions, skip ahead to Chapter 11. ▼ What is the 32GB barrier? ■ What are the differences between SCSI P and SCSI A cables? ▲ How do you format a FAT32 partition under Linux? This chapter begins with an overview of the various hard drive interface standards and how they affect your forensic duplications (including how to avoid the destruction of expensive SCSI hardware). Then it covers how to prepare hard drive media for use during your investigation. The final section introduces the principles and organization of data storage. HARD DRIVES AND INTERFACES There are few situations more frustrating than preparing to run a few quick searches on your forensic duplicate, but running into technical difficulties at every step of the way. Understanding the hardware and the set of standards to which the system was built will significantly cut down the number of branches in your troubleshooting matrix. In this section, we are going to quickly cover the basics of hard drive interface for- mats. The term interface is a bit of a misnomer here. We are compressing the concepts of interfaces, standards, and protocols into one section in an effort to simplify the discus- sion. (For more details on hard drives and other computer hardware, refer to a book on that subject, such as Scott Meuller’s Upgrading and Repairing PCs, published by Que.) IDE/ATA (Integrated Drive Electronics/AT Attachment) and SCSI (Small Computer System Interface) are the two interface standards that most computer forensic analysts will encounter. IDE drives are cheap, simple to acquire, and have a respectable transfer rate. SCSI drives move data faster than IDE/ATA drives, but at a much higher cost. The Swiftly Moving ATA Standard The ATA interface started out as a fairly simple standard. ATA-1 was designed with a single data channel that could support two hard drives, one jumpered as master and the other as slave. This standard supported programmed I/O (PIO) modes 0 through 2, yielding a maxi- mum transfer rate of 8.3MB/second. The next big improvement came with the adoption of direct memory access (DMA) usage. Using the DMA method allowed the computer to transfer data without spending precious CPU cycles. A short amount of time went by, and the speed increases (up to 16MB/second) became insufficient. The standard evolved into a higher-speed version known as Ultra-DMA. P:\010Comp\Hacking\696-x\ch10.vp Friday, June 20, 2003 3:52:07 PM Color profile: Generic CMYK printer profileHacking / Incident Response & Computer Forensics / Prosise & Mandia / 222696-x / Chapter 10 Composite Default screen Chapter 10: Computer System Storage Fundamentals 219 The current iteration is Ultra-DMA mode 5, which boasts a maximum transfer rate of 100MB/second. The previous three modes transferred data at MB/second rates of 66, 44, and 33, giving us the explanation behind the labels printed on hard drive packages: ATA/33, ATA/44, ATA/66, or ATA/100. (ATA/44 caught on for only a short time; we have yet to encounter these drives, but they allegedly exist.) An important fact for foren- sic analysts in the field is that the IDE/ATA modes are backward-compatible. Drive Size Boundaries Along with the rate of data transfer, the growing size of drive media is also a concern for the T13 committee (the group that releases ATA standards). At the time of this writing, Western Digital sells 200GB hard drives. Unfortunately, the ATA controllers on the mar- ket are not able to handle anything over 137GB. Drive manufacturers are packaging ATA interface cards that are built upon draft specifications (UDMA Mode 6). When the T13 committee ratifies the updated standard, these ATA interfaces will replace the current versions built onto motherboards and PCI cards. This works fine in an office or labora- tory environment, but you may be out of luck when acquiring images on systems that are not under your control. The current ATA interface standard uses 28-bit addressing, which tops out at approximately 137.4GB. Furthermore, operating system utilities such as Microsoft’s Scandisk and Disk Defragmenter do not currently operate properly on drives over 137GB, even if the ATA controller card is updated. Previous drive media size boundaries have been at 32GB, 8.4GB, and 2.1GB. Time will sort these problems out, but it serves as a warning to labs that attempt to purchase cutting- edge hardware. Drive Cabling How do the ATA standards apply to forensic duplication? One of the goals of efficient duplication is to get the maximum amount of data safely transferred in the least amount of time. Proper cabling plays an important role in achieving these goals. The following sections discuss a few key points regarding the cabling for your evidence media. Cable Requirements Up until the ATA/33 standard, a 40-conductor/40-pin cable was sufficient. Figure 10-1 shows a 40-conductor/40-pin ribbon cable. Anything faster than ATA/33 requires an 80-conductor/40-pin cable, such as the one shown in Figure 10-2. This newer cable has several attributes that correct problems with the old version. First, the presence of 40 more conductors minimizes the amount of inter- ference and crosstalk between the 40 active wires. The extra 40 conductors are tied to the ground pin on the connector to act as a drain for any excessive current. Second, the con- nectors are color-coded as blue, gray, and black. Each one has a specific role: ▼ The blue connector attaches to the host controller on the motherboard or PCI card. ■ The gray connector is in the middle of the cable and connects to the slave device, if present. ▲ The black connector must be attached to the master drive. If you have only one drive on the chain, it goes on the black connector. P:\010Comp\Hacking\696-x\ch10.vp Friday, June 20, 2003 3:52:07 PM Color profile: Generic CMYK printer profileHacking / Incident Response & Computer Forensics / Prosise & Mandia / 222696-x / Chapter 10 Composite Default screen 220 Incident Response & Computer Forensics Figure 10-1. A 40-conductor/40-pin cable, sufficient only for ATA/33 and slower Grey Black Blue Figure 10-2. An 80-conductor/40-pin cable, required for ATA/44 and faster P:\010Comp\Hacking\696-x\ch10.vp Friday, June 20, 2003 3:52:08 PM Color profile: Generic CMYK printer profileHacking / Incident Response & Computer Forensics / Prosise & Mandia / 222696-x / Chapter 10 Composite Default screen Chapter 10: Computer System Storage Fundamentals 221 If you ignore these color codes, you may have problems with the BIOS not recogniz- ing a hard drive, or worse, data corruption. Placing a single drive on the middle connec- tor leaves a pigtail of unterminated wire that will result in reflected signals and degradation in signal quality. Mixed Hard Drive Types You can place drives with different ratings on the same cable. If you are using an ATA/100 host controller and have ATA/33 and ATA/100 hard drives connected via an 80-conductor cable, each drive will perform at its rated speed. And if you have an ATA/33 host controller with ATA/33 and ATA/100 hard drives, the fastest transfer speed you could attain would be approximately 33MB/second. Mixed Cable Types Mixing cable types is a proven way to cause problems. If you must daisy-chain IDE cables (not exceeding the 18-inch limit), ensure that both cables are of the identical type. The ATA host controller will detect the type of cable connected to each bus by checking the PDIAG-CBLID signal on pin 34. (The PDIAG-CBLID pin is the Passed Diagnostics-Cable Assembly Type Identifier, just so you know if it ever comes up in a future Jeopardy show.) If pin 34 is tied to ground, the controller knows that an 80-conductor cable is attached. Incidentally, this is also why it is important to make sure that the blue connector is mated with the host controller, because this is where the pin is grounded. You may be wondering when the problem of mixed cable types may arise. Until re- cently, companies that assemble computer systems for forensic use have had a hard time finding a source for an 80-conductor version of the short “extension cable” that allowed them to place a male IDE connector on the back of the computer system. We observed several situations where an 80-conductor cable was mated to the backplane, causing the host controller to go into ATA/100 mode. Because of the lack of shielding on the 40-con- ductor cable inside the computer, the BIOS had intermittent problems identifying exter- nal drives. Figure 10-3 illustrates this condition. Cable Select Mode If you are a fan of the cable select mode capability, you finally have something to cheer about.
Recommended publications
  • Vpc6 Install Guides.Fm
    Installing Your Own Guest OS in Virtual PC 6 This document provides installation guides for the following OSes. Contents Installing Windows XP Professional - page 2 Installing Windows XP Home - page 7 Installing Windows 2000 Professional - page 12 Installing Windows 98 - page 15 Installing Red Hat Linux 8.0 - page 18 The following procedures require a full version of Windows XP, 2000, or Windows 98. The versions of Windows included with Virtual PC cannot be installed using the methods described here. Please see your Virtual PC User’s Guide for information on installing the Windows included with Virtual PC. Connectix provides limited support for Linux. Currently, there are no Additions for Linux which limits the functionality and performance of any version of Linux under Virtual PC. If you need additional support for Linux beyond installation, please contact the publisher for technical support. Virtual PC 6 User Reference 1 Installing Your Own Guest OS in Virtual PC 6 Installing Windows XP Professional Installation Notes: Virtual PC Toolbar: Located in the lower left corner of the guest’s window, the VPC Toolbar items provide information about the status of your guest PC, from left to right: Hard Drive, CD/DVD-ROM, Floppy Disk, Shared Folders, Network, USB, Printing Info, and Additions Installer/PC Info. The tool bar also provides a number of convenient features that are accessed by contextual menus (click the icon) or by dragging items onto the tool bar icons. A CD-ROM ISO image or floppy disk image can easily be mounted in the guest by dragging the disk image and dropping it on the respective VPC tool bar icon.See the Virtual PC help for more information.
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • CF-45 Series OPERATING INSTRUCTIONS
    ® Personal Computer OPERATING INSTRUCTIONS CF-45 Series Contents Getting Started Read Me First .................................................. 6 First-time Operation ......................................... 7 95 Getting Started Operation Starting Up/Shutting Down............................ 11 Handling and Maintenance ........................... 15 Operation Troubleshooting [Additional Manual] List of Error Codes ......................................... 16 Reference Manual Dealing with Problems .................................. 18 This manual can be accessed on your computer. Please Reinstalling Software .................................... 20 refer to page 14 on how to access the Reference Manual. Contents • Key Combinations • Using an External Display • LED Indicators • Using USB Devices Troubleshooting • Suspend/Hibernation • Infrared Data Functions Communications Appendix • Security Measures • Hard Disk Drive • Computing On the Road • Setup Utility LIMITED USE LICENSE AGREEMENT ....... 23 • Battery Power • Technical Information Names and Functions of Parts...................... 26 • Using PC Cards • List of Error Codes • Adding Memory • DMI Viewer Specifications ................................................28 • Port Replicator • Dealing With Problems • Using a Printer Appendix Customer's Record Model Dealer's No.* Name Serial No. or Code Dealer's No. Address Date of Purchase For the Model No., insert the 11 digit number (for example, CF-45DJ48JAM) located on the bottom of the computer. Introduction Thank you for purchasing
    [Show full text]
  • NTFS from Wikipedia, the Free Encyclopedia Jump To: Navigation, Search NTFS Developer Microsoft Introduced July 1993 (Windows
    NTFS From Wikipedia, the free encyclopedia Jump to: navigation, search NTFS Developer Microsoft Introduced July 1993 (Windows NT 3.1) Partition identifier 0x07 (MBR) EBD0A0A2-B9E5-4433-87C0-68B6B72699C7 (GPT) Structures Directory contents B+ tree[1] File allocation Bitmap/Extents Bad blocks $badclus Limits Max file size 264 bytes (16 EiB) minus 1 KiB [2] Max number of files 4,294,967,295 (232-1)[2] Max filename length 255 UTF-16 code units[3] Max volume size 264 ? 1 clusters [2] Allowed characters in filenames In Posix namespace, any UTF-16 code unit (case sensitive) except U+0000 (NUL) and / (slash). In Win32 namespace, any UTF-16 code unit (case insensitive) except U+0000 (NUL) / (slash) \ (backslash) : (colon) * (asterisk) ? (Question mark) " (quote) < (less than) > (greater than) and | (pipe) [3] Features Dates recorded Creation, modification, POSIX change, access Date range 1 January 1601 ʹ 28 May 60056 (File times are 64-bit numbers counting 100- nanosecond intervals (ten million per second) since 1601, which is 58,000+ years) Date resolution 100ns Forks Yes (see Alternate data streams below) Attributes Read-only, hidden, system, archive, not content indexed, off-line, temporary File system permissions ACLs Transparent compression Per-file, LZ77 (Windows NT 3.51 onward) Transparent encryption Per-file, DESX (Windows 2000 onward), Triple DES (Windows XP onward), AES (Windows XP Service Pack 1, Windows Server 2003 onward) Single Instance Storage Yes Supported operating systems Windows NT family (Windows NT 3.1 to Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008) NTFS is the standard file system of Windows NT, including its later versions Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, and Windows Vista.[4] NTFS supersedes the FAT file system as the preferred file system for Microsoft͛s ͞Windows͟-branded operating systems.
    [Show full text]
  • File Allocation Table - Wikipedia, the Free Encyclopedia Page 1 of 22
    File Allocation Table - Wikipedia, the free encyclopedia Page 1 of 22 File Allocation Table From Wikipedia, the free encyclopedia File Allocation Table (FAT) is a file system developed by Microsoft for MS-DOS and is the primary file system for consumer versions of Microsoft Windows up to and including Windows Me. FAT as it applies to flexible/floppy and optical disc cartridges (FAT12 and FAT16 without long filename support) has been standardized as ECMA-107 and ISO/IEC 9293. The file system is partially patented. The FAT file system is relatively uncomplicated, and is supported by virtually all existing operating systems for personal computers. This ubiquity makes it an ideal format for floppy disks and solid-state memory cards, and a convenient way of sharing data between disparate operating systems installed on the same computer (a dual boot environment). The most common implementations have a serious drawback in that when files are deleted and new files written to the media, directory fragments tend to become scattered over the entire disk, making reading and writing a slow process. Defragmentation is one solution to this, but is often a lengthy process in itself and has to be performed regularly to keep the FAT file system clean. Defragmentation should not be performed on solid-state memory cards since they wear down eventually. Contents 1 History 1.1 FAT12 1.2 Directories 1.3 Initial FAT16 1.4 Extended partition and logical drives 1.5 Final FAT16 1.6 Long File Names (VFAT, LFNs) 1.7 FAT32 1.8 Fragmentation 1.9 Third party
    [Show full text]
  • U 9 1 2 (Faili, Nosaukuma Standarti, Darbības Ar Failiem, Command Prompt (Terminal), Power Shell, Komandu Lietošana U.Tml.)
    U_9_1_2 (faili, nosaukuma standarti, darbības ar failiem, command prompt (terminal), power shell, komandu lietošana u.tml.) file formats by file extensions .aif - AIF audio file .cda - CD audio track file .mid or .midi - MIDI audio file. .mp3 - MP3 audio file .mpa - MPEG-2 audio file .ogg - Ogg Vorbis audio file .wav - WAV file .wma - WMA audio file .wpl - Windows Media Player playlist .7z - 7-Zip compressed file .arj - ARJ compressed file .deb - Debian software package file .pkg - Package file .rar - RAR file .rpm - Red Hat Package Manager .tar.gz - Tarball compressed file .z - Z compressed file .zip - Zip compressed file .bin - Binary disc image .dmg - macOS X disk image .iso - ISO disc image .toast - Toast disc image .vcd - Virtual CD .csv - Comma separated value file .dat - Data file .db or .dbf - Database file .log - Log file .mdb - Microsoft Access database file .sav - Save file (e.g., game save file) .sql - SQL database file .tar - Linux / Unix tarball file archive .xml - XML file .apk - Android package file .bat - Batch file .bin - Binary file .cgi or .pl - Perl script file .com - MS-DOS command file .exe - Executable file .gadget - Windows gadget .jar - Java Archive file .py - Python file .wsf - Windows Script File .fnt - Windows font file .fon - Generic font file .otf - Open type font file .ttf - TrueType font file .ai - Adobe Illustrator file .bmp - Bitmap image .gif - GIF image .ico - Icon file .jpeg or .jpg - JPEG image .png - PNG image .ps - PostScript file .psd - PSD image .svg - Scalable Vector Graphics file .tif or .tiff
    [Show full text]
  • PC Basics Guide
    PC Basics Guide The information in this document is subject to change without notice. Hewlett-Packard® Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. HP shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. THE WARRANTY TERMS CONTAINED IN THIS STATEMENT, EXCEPT TO THE EXTENT LAWFULLY PERMITTED, DO NOT EXCLUDE, RESTRICT OR MODIFY AND ARE IN ADDITION TO ANY MANDATORY STATUTORY RIGHTS APPLICABLE TO THE SALE OF THIS PRODUCT OR SERVICE TO YOU. HP assumes no responsibility for the use or reliability of its software on equipment that is not furnished by HP. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of HP. Hewlett-Packard Company P.O. Box 4010 Cupertino, CA 95015-4010 USA © 2000, 2003, 2004 Hewlett-Packard Development Company, L.P. All rights reserved. Hewlett-Packard is a registered trademark of Hewlett-Packard Company in the United States of America and other countries/regions. This product incorporates copyright protection technology that is protected by method claims of certain U.S. patents and other intellectual property rights owned by Macrovision Corporation and other rights owners. Use of this copyright protection technology must be authorized by Macrovision Corporation, and is intended for home and other limited viewing uses only unless otherwise authorized by Macrovision Corporation.
    [Show full text]
  • Easy-Windows-Troubleshooting
    R. A. Penfold Easy Windows troubleshooting Other Computer Titles by Robert Penfold BP450 How to Expand and Upgrade You- PC BP467How to Interface PCs BP470Linux for Windows users BP479How to Build Your Own PC BP484Easy PC troubleshooting Other Windows Titles BP445Windows 95 - Hard Disc and File Management BP455Windows 98 - Hard Disc and File Management BP456 Windows 98 Explained BP458Tune up Windows 98 BP459 Windows 98 Connections BP466Understanding Windows 98 Registy BP469Simple Networking with Windows 98 BP493Windows Me Explained BP496Getting the Most from Windows Me BP502 Windows Me Multimedia Explained Easy Windows troubleshooting Robert Penfold Bernard Babani (publishing) Ltd The Grampians Shepherds Bush Road London W6 7NF England www.babanibooks.corn Please note Although every care has been taken with the production of this book to ensure that any projects, designs, modifications, and/or programs, etc., contained herewith, operate in a correct and safe manner and also that any components specified are normally available in Great Britain, the Publisher and Author do not accept responsibility in any way for the failure (including fault in design) of any projects, design, modification, or program to work correctly or to cause damage to any equipment that it may be connected to or used in conjunction with, or in respect of any other damage or injury that may be caused, nor do the Publishers accept responsibility in any way for the failure to obtain specified components. Notice is also given that if any equipment that is still under warranty is modified in any way or used or connected with home -built equipment then that warranty may be void.
    [Show full text]
  • Dell Desktop and Notebooks User's Guide Notes, Cautions, and Warnings
    Dell Desktop and Notebooks User's Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. 2014 - 06 Rev. A00 Contents 1 Introduction...........................................................................................................9 Finding Information...............................................................................................................................9 Using the Dell Support Site............................................................................................................. 9 Finding the Product Using Service Tag...........................................................................................9 Selecting the Product....................................................................................................................10 Choosing the Product...................................................................................................................10 Documents
    [Show full text]
  • What to Do If My Windows Computer Starts Slow
    What to do if my Windows computer starts slow A slow or long Microsoft Windows startup (boot up) can be caused by many different issues. This page contains various suggestions and tips to help improve the overall speed of your desktop or laptop computer's startup or reboot. Disable startup programs Programs that are loaded as the computer starts up remain active in memory. Consequently, they are one of the main causes of a slow boot into Windows. Disabling programs you don't often use from automatically loading up each time the computer powers on can decrease boot time. ScanDisk and Defrag Using Microsoft ScanDisk and Defrag or similar disk utilities help verify your hard drive is running free of errors while organizing stored data in the most efficient manner possible. We suggest running both of these utilities at least once every few months. Insufficient hard drive space For your computer to run optimally, it needs at least 250 MB of available hard drive space. If you have less than this amount, slowness in both general performance and the boot time can occur. Update drivers and Windows Corrupt, incorrect, or out-of-date drivers can cause many different issues. Make sure your computer has the latest drivers and any available Microsoft Windows updates. Registry cleaner Although we do not often recommend registry cleaners, in some rare situations, they help improve the overall performance of Windows, including startup. If you ran through all the recommendations above with minimal startup speed improvement, you may want to clean your system registry. Should the above instructions did not resolve the issue, please don't hesitate to contact us so we can further assist you.
    [Show full text]
  • Disk Maintenance Under Linux (Disk Recovery)
    Disk Maintenance under Linux (Disk Recovery) http://www.linuxjournal.com/node/193/print Disk Maintenance under Linux (Disk Recovery) By David Bandel Created 1997-01-01 02:00 The ins and outs of disk maintenance--what we all should know and DO. Here's a hypothetical situation for you to think about. You're working on your Linux box, calling up an application or data file, and Linux hesitates while reading the hard disk. Then, scrolling up the screen (or console box), you see something like this: Seek error accessing /dev/hdb2 at block 52146, IDE reset (successful). After some time spent chugging away accessing the drive, Linux continues. If you're lucky, everything is still running along fine. If you're not, your program is refusing to start, or your data file contains garbage. Chances are, if you're using a hard disk drive that's a few years old, you will begin to see errors when accessing the disk from time to time. At this point, the best prognosis for your disk is that, given time, it'll get worse. So you need to begin resuscitation efforts as soon as possible. Several disk manufacturers have utilities that find and allocate these bad sectors on your hard disk. Unfortunately, these utilities also destroy the information on your disk, and are normally run from DOS, not Linux. Fortunately, Linux has some system utilities to help you when you are dealing with its (now) native ext2 format. (Utilities are also available for minix. If you need to repair other non-Linux file systems you should use their own native sets of file system utilities.) While not as user-friendly as Norton Disk Doctor or Microsoft ScanDisk, the Linux disk and file system utilities get the job done.
    [Show full text]
  • Digital Surveillance Recorder Installation Guide
    Digital Surveillance Recorder Installation Guide Contents CONTENTS.................................................................................................................................................. 2 HOW TO USE THIS MANUAL................................................................................................................. 4 SECTION 1..DIGITAL SURVEILLANCE RECORDER OEM INSTALLATION GUIDE................ 5 UCL UCC4 QUICK INSTALLATION............................................................................................................ 5 INSTALLATION GUIDE FOR DSR PACKAGE................................................................................................. 6 SOFTWARE INSTALLATION ......................................................................................................................... 9 OPERATION ................................................................................................................................................ 9 SECTION 2 UPGRADING VIDEO DISPLAY BOARD FOR TV OUT FEATURE ......................... 10 UPDATING VIDEO DISPLAY BOARD (FOR TV OUT):................................................................................. 10 REMOVE THE ORIGINAL VIDEO BOARD ..................................................................................................... 10 INSTALL THE NEW VIDEO BOARD .............................................................................................................. 10 ACTIVATE THE TV MONITOR ..................................................................................................................
    [Show full text]