Exploring Forensic Implications of the Fusion Drive
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
RECON-IMAGER-Manual.Pdf
RECON IMAGER Manual 1.Introduction Version 4.0.5 RECON IMAGER was developed by SUMURI to provide the digital forensic practitioner with a bootable imaging utility that supports all modern Macintosh computers with Intel processors. This is accomplished via three macOS based boot environments that have been modified to ensure that there are no writes to internal or externally attached media. Additionally, RECON IMAGER helps the practitioner to easily identify Apple File System (APFS) container disks and volumes, FileVault, Fusion and other Core Storage volumes. RECON IMAGER has been designed to get as much data as possible to include the Apple Extended Attributes and Local Time Machine Snapshots (APFS Snapshots). In addition to creating forensic images of physical disks and/or volumes, RECON IMAGER can also image Mac RAM without the need for an administrator password within RECON IMAGER’s boot environment. RECON IMAGER also supports imaging Macs with T2 Security Chipsets via Target Disk Mode or disabling Secure Boot via the Mac’s Recovery Mode. Copyright © 2010-2020 SUMURI LLC. All rights reserved. 1 RECON IMAGER Manual 2. Version Comparisons There are two versions of RECON IMAGER – Standard and PRO. RECON IMAGER (standard) RECON IMAGER (standard) is based on macOS. Since it is based on macOS it natively boots Intel Macs. It also supports Apple proprietary technology such as Apple File System (APFS) container disks and volumes, FileVault, Fusion and other Core Storage volumes. RECON IMAGER includes the option to image logically which allows an examiner to import Apple data into forensic tools that do not natively support proprietary Apple file systems. -
Computer Service Technician- CST Competency Requirements
Computer Service Technician- CST Competency Requirements This Competency listing serves to identify the major knowledge, skills, and training areas which the Computer Service Technician needs in order to perform the job of servicing the hardware and the systems software for personal computers (PCs). The present CST COMPETENCIES only address operating systems for Windows current version, plus three older. Included also are general common Linux and Apple competency information, as proprietary service contracts still keep most details specific to in-house service. The Competency is written so that it can be used as a course syllabus, or the study directed towards the education of individuals, who are expected to have basic computer hardware electronics knowledge and skills. Computer Service Technicians must be knowledgeable in the following technical areas: 1.0 SAFETY PROCEDURES / HANDLING / ENVIRONMENTAL AWARENESS 1.1 Explain the need for physical safety: 1.1.1 Lifting hardware 1.1.2 Electrical shock hazard 1.1.3 Fire hazard 1.1.4 Chemical hazard 1.2 Explain the purpose for Material Safety Data Sheets (MSDS) 1.3 Summarize work area safety and efficiency 1.4 Define first aid procedures 1.5 Describe potential hazards in both in-shop and in-home environments 1.6 Describe proper recycling and disposal procedures 2.0 COMPUTER ASSEMBLY AND DISASSEMBLY 2.1 List the tools required for removal and installation of all computer system components 2.2 Describe the proper removal and installation of a CPU 2.2.1 Describe proper use of Electrostatic Discharge -
Review of Data Storage by Fusion Drive In
Volume 4, No. 3, March 2013 (Special Issue) International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info Review of Data storage by Fusion Drive in MAC Pranav Nerurkar Vinay Gentyala IT SFIT, Mumbai University IT ARMIET, Mumbai University Mumbai, India Mumbai, India [email protected] [email protected] Abstract: In the age of technology and performance big players are working arduously to compete with evolving technology. Apple has always tried to remain ahead when it comes to technology, sophistication, and performance. Apple Inc recently released a product which was often referred to as ‘a game changer’ in the data storage market. A product called ‘fusion drive’ was promoted which is a fast and efficient storage solution as claimed by Apple Inc. It was therefore necessary to investigate these claims made by Apple Inc, to find whether it delivers on all enumerations. In this paper, we performed a study and review of this technology and cite its pro’s and con’s. Also, we have laid out certain experimental results to demonstrate each function of the fusion drive along with metrics for measuring its performance. In this paper, we investigate this new technology along with its various aspects and testify if it is better than the current data storage methods. Also, we present a simple example which displays the working of this technology and the concept behind it. Keywords: Fusion Drives, Caching, Data Storage, Emerging Trends. performing both caching for faster writes and auto tiering I. INTRODUCTION for faster reads. Due to similarity in features of Apples Fusion Drive and As we all know Apple has been involved in inventing new current Hybrid drives which incorporate a large amount of range of technology that has been successful evidently. -
Take Control of Your Digital Storage (2.1)
EBOOK EXTRAS: v2.1 Downloads, Updates, Feedback TAKE CONTROL OF YOUR DIGITAL STORAGE FOR MAC by JEFF CARLSON $14.99 Click here to buy the full 145-page “Take Control of Your Digital Storage” for only $14.99! Table of Contents Read Me First ............................................................... 4 Updates and More ............................................................. 4 What’s New in Version 2.1 .................................................. 5 What Was New in Version 2.0 ............................................. 6 Introduction ................................................................ 7 Your Digital Storage Quick Start .................................. 8 Understand Storage ................................................... 10 Hard Drives .................................................................... 10 Solid-State Drives ........................................................... 15 External Drives ............................................................... 22 How Much Storage Do You Need? ...................................... 30 How to Dispose of a Hard Drive ......................................... 32 RAID ............................................................................. 33 Disk Images ................................................................... 44 Cloud Storage ................................................................. 51 Format and Partition Disks ........................................ 55 Understand File Systems ................................................. -
2020-06-02-RECON IMAGER Manual
M A N U A L 1.Introduction 4 2. Version Comparisons 4 3. Supported Hardware 6 3.1 MODE A - SUPPORTED HARDWARE (Version 4.0.0) 6 3.2 MODE B - BOOT SUPPORTED HARDWARE (Version 5.0.0) 6 3.3 MODE C - SUPPORTED HARDWARE (Version 5.0.2 A1) 7 4. Before You Start 7 4.1 How Will You Process The Image? 7 4.2 What To Image? 8 4.3 What Image Format Should I Use? 8 5. Key Concepts To Understand 9 5.1 Apple File System (APFS) 9 5.2 Apple Extended Attributes 9 5.3 Fusion Drives 10 5.4 Core Storage 10 5.5 FileVault 11 5.6 T2 Security Chipset 11 5.7 Local Time Machine Snapshots (APFS) 12 5.8 Apple Boot Camp 12 6. Booting RECON IMAGER 13 6.1 Instant On - Portable Macs 13 6.2 Firmware Password 13 6.3 Connecting RECON IMAGER 14 6.4 Connecting Your Destination Drive 15 6.5 Starting RECON IMAGER 15 7. Using RECON Imager 17 7.1 Disk Manager 18 7.1.1 Refresh To Detect Changes 19 RECON IMAGER Copyright © 2010-2020 SUMURI LLC 1 of 58 7.1.2 Formatting a Collection Drive 20 7.1.3 Decrypting A FileVault Volume 22 7.1.4 System Date and Time 24 7.2 Disk Imager 24 7.2.1 Source 25 7.2.2 Image Type 25 7.2.3 Compression Options 27 7.2.4 Processing Local Time Machine Snapshots (APFS) 27 7.2.5 Destination 28 7.2.6 Image Name 28 7.2.7 Segment Size 29 7.2.8 Evidence Descriptor Fields 29 7.2.9 Hashing and Verification 30 8.