Backup Teknologi Cheat Sheet by Hbak Via Cheatography.Com/67474/Cs/17315

Total Page:16

File Type:pdf, Size:1020Kb

Backup Teknologi Cheat Sheet by Hbak Via Cheatography.Com/67474/Cs/17315 Backup Teknologi Cheat Sheet by Hbak via cheatography.com/67474/cs/17315/ MBR vs GPT Disk Volumes (cont) MBR (Master Boot Record) GPT (GUID Partition Table) Spann​ Mulitple volumes on multiple disk is viewed as one. When the volume on one disk is full, the remaining data is allocated to the Max. 4 primary partions, or 3 Nearly unlimited number of ed next disk. primary partitions and 1 extended partitions. Not fault tolerant. partition Limited to 128 partitions in Windows. Strip​ ed​ Multiple disks (min. two) of equal size, is viewed as one. Data is distrib​ uted evenly across all disks to increase Max. 2TB disk with 512B sector. Up to 18EB on both 512B and 4KB /RAID performance. Up to 16TB with 4KB sector sectors 0 Not fault tolerant. Not able to check if partition has Able to check if primary partitions Mirro​ re​ Data is copied across multiple disks of equal size. been corrupted. table is corrupted. d/RAID Only 50% of the total volume is available. Not able to restore corrupted Able to restore corrupted partition. 1 Fault tolerant. partition. RAID 5 Multiple disks (min. three) of equal size is viewed as one. Not able to restore corrupted Able to restore corrupted partition. Data is distrib​ uted evenly across all disks. partition. A parity is created on each disk, in order to restore data if one Supports all OS. Read & Write is only supported on disk malefunctions. Windows 64-bit OS and . Fault tolerant. Boot is only supported on Windows RAID Combines the features of RAID 0 and RAID 1 to provide high 64-bit OS (except XP x64) with 10 perform​ ance with fault tolerance. UEFI. Linux & Mac OS X10.6+ only (1+0) support these feature if UEFI is available. Types of Backup Full Backup Make a copy of all the data, to another media. Basic & Dynamic Disks Takes a long time to create, but reduces the time to Basic Disk Dynamic Disk recover. Full backup must be performed. Used to create & delete partitions on Able to create volumes that ​ ​ one disk span multiple disks. Differential Only works together with full backup. Backup Creates a backup of all the changes since the last full Used to create & delete logical drives Able to create fault tolerant backup. within extended partitions volumes. Less time to create, than full backup, but more time to Works with both MBR and GPT Works with both MBR and recover. GPT. Disk Volumes Simple A single block of space from a single disk. Not fault tolerant. Exten​ ded Multiple volumes on the same disk is viewed as one. Not fault toelrant. By Hbak Not published yet. Sponsored by Readability-Score.com cheatography.com/hbak/ Last updated 5th October, 2018. Measure your website readability! Page 1 of 3. https://readability-score.com Backup Teknologi Cheat Sheet by Hbak via cheatography.com/67474/cs/17315/ Types of Backup (cont) File Systems (cont) Incre​ me Unlike differe​ ntial backup, increme​ ntal backup, only backup the NTFS (NT File NTFS supports file permissions. ntal data which has been changed since last full backup or last Systems) Change journal that can quickly recover errors if the Backup increme​ ntal backup. computer crashes. Fastest backup to create, but slowest backup to recover. Shadow copies for backups. Encrypt​ ion, disk quota limits, hard links. File Systems Supports almost unlimited file size. Only fully compatible with Windows. FAT (File FAT provides an operating system with a map over ReFS (Resilient Microso​ ft's newest file system. Allocation Table) the clusters, on which a file is stored. Designed to support extremly large amount of data. FAT increases the life of a hard disc, since it File System) Reliable corruption detection. reduces the amount of time psysical seeking is Automat​ ically repair corruption on mirror and parity required. volumes without downtime. All FAT-sys​ tems has a max file size of 4GB. Removes corrupted data from namespace if no FAT32 Supports drives up to 2TB in size, where its copy of data exists. ​ predecessor only supported 2GB. Detects possible corruption and initiates proactivly FAT32 is compatible with every Windows, Mac and repairs it. Linux system. Used mostly in USB-dri​ ves. Disk Quota exFAT (Extended Supports files above 4GB. Can only be used on NTFS volumes. File Allocation Compatible with Windows and newer versions of Table) MAC (software is needed to run on Linux). Can track and restrict the amount of space a user can use. Is set on volumes, not files or folders. Each individual user can be given different size available space. The default adminis​ trator account cannot be given a quota. FSRM (File Server Resource Manager) Is enabled on volumes and folders, but not files. There are two types of quotas: Hard: Set a limit on the amount of space that the content can use in a volume or folder. Soft: Tracks the disk space used, but doesn't limit it. By Hbak Not published yet. Sponsored by Readability-Score.com cheatography.com/hbak/ Last updated 5th October, 2018. Measure your website readability! Page 2 of 3. https://readability-score.com Backup Teknologi Cheat Sheet by Hbak via cheatography.com/67474/cs/17315/ FSRM (File Server Resource Manager) (cont) Windows Backup (cont) Both types can notify when a percentage of the limit is reached. Non-C​ rit​ ical Volumes: Files, applica​ tions and data. Quotas can be created customly in each volume and folder, or a template Can save backups on the following storage types: can be used. Local Disk: Templates can be used to define space limit, notific​ ation thresholds and Allows backup of all volume types and individual datafiles actions. Has a max. of 512 copies on one disk. Templates can be enforced on subfold​ ers, both current and future. Disk used for backup is not visible and can't be used for saving data. A quota can be created from a template, to deviate from it. The modified External Disk: quota doesn't modify the template. Allows backup of all types of volumes and individual datafiles Disk is not visible FSRM can create file screen. Can use multiple disks. File screens prevents specific types of files to be saved on a volume or Shared Folder: folder. Allows backup of all types of volumes and individual datafiles, Backups File screens are enabled on volumes and folders, but not to specific users. are not saved consecu​ tively unless stored in individual subfold​ ers. There are two types of file screens: DVD: Active: Only allows backup of volumes. Prevents the chosen file type from being saved. Critical volumes can be used for system restore. Volume is compressed on the DVD Passive: Can span multiple disks. Monitors file types, but doesn't prevent them from being saved. The followiing types of backups can be made: Like quotas, file screens can also send notific​ ati​ ons, and use predefined templates. Autom​ atic Backup: Runs by default once every day, use wbadmin disable backup to VSS (Volume Shadow copy Service) disable this. To change the automatic backup run the Task Schedul​ er and type Able to backup a volume while it is still being written on. wbadmin start backup. Supported on Windows XP/Windows Server 2003 and later. Need to determine where to place the backup. It is enabled on a volume, not on files and folders. Can only be used on local or external disks. Up to 64 copies can be stored on the system, and by default they are Manuel Backup: saved on the same volume. When the limit is reached, the oldest copies Can create backups on all mentioned storage types. are deleted first. Can recover individual files and folders from backups on local and shared folders. By default, 10% of a volume is used for storing shadow copies. Local disk is automat​ ically chosen if not changed. Two snapshots are taken by the data on a volume each day. Use as supplement for scheduled backups. System State Backup from Command Line: Windows Backup Created with the command wbadmin start systemstatebackup. Uses VSS and block-l​ evel backup. Can only be stored on local or external disk. Doesn't need to run every increme​ ntal backup, just select the date you Only used to recover system state and system application. want the backup from. Can only be scheduled with a script. Can recover the data on the same or a new machine. Automat​ ically reuse the space of old backups, when it creates a new. Backup volumes, not files or directo​ ries. Following volumes can be backed up (must be on a local disk and NTFS- fo​ rma​ tted): Full Server: Includes all volumes. Best practice. Critical Volumes: The operating system. By Hbak Not published yet. Sponsored by Readability-Score.com cheatography.com/hbak/ Last updated 5th October, 2018. Measure your website readability! Page 3 of 3. https://readability-score.com.
Recommended publications
  • Filesystem Maintenance
    Filesystem Maintenance René Serral-Gracià Xavier Martorell-Bofill1 1Universitat Politècnica de Catalunya (UPC) May 26, 2014 Introduction Filesystems Disk verification LVM Backups Lectures 1 System administration introduction 2 Operating System installation 3 User management 4 Application management 5 System monitoring 6 Filesystem Maintenance 7 Local services 8 Network services 9 Security and Protection 10 Virtualization R. Serral-Gracià, et. al Filesystem 2 Introduction Filesystems Disk verification LVM Backups Outline 1 Introduction Goals 2 Filesystems 3 Disk verification 4 Logical Volume Manager (LVM) 5 Backups R. Serral-Gracià, et. al Filesystem 3 Introduction Filesystems Disk verification LVM Backups Goals Knowledge Filesystems Backup tools Backup media Abilities Filesystem ampliation Filesystem verification Perform and restore backups R. Serral-Gracià, et. al Filesystem 4 Introduction Filesystems Disk verification LVM Backups Outline 1 Introduction 2 Filesystems 3 Disk verification 4 Logical Volume Manager (LVM) 5 Backups R. Serral-Gracià, et. al Filesystem 5 Introduction Filesystems Disk verification LVM Backups Filesystems (I) FAT (FAT16) –> DOS Small disks (< 4GB) File names 8+3 FAT32 (VFAT) –> Win95 Larger disks Long filenames Partial definition of soft-links No owner or file access privileges exFAT FAT32 Extension Theoretical maximum capacity of 64ZiB (512TiB real) NTFS –> WinNT, XP, Vista, Windows 7 Integrates ownership and privileges (create, modify, access...) Maps to Windows NT security model R. Serral-Gracià, et. al Filesystem 6 Introduction Filesystems Disk verification LVM Backups Filesystems (II) ext2 UNIX Filesystem Soft/hard links Access privileges Long filenames ext3 Adds journaling (eases error recovery) reiserfs Files and directories organized similarly to a database Features journaling Very efficient in small files No internal block fragmentation R.
    [Show full text]
  • Journey Through the Impact of the Recovery Artifacts in Windows 8 WENDELL Kenneth JOHNSON Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2013 Journey through the impact of the recovery artifacts in Windows 8 WENDELL Kenneth JOHNSON Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Databases and Information Systems Commons Recommended Citation JOHNSON, WENDELL Kenneth, "Journey through the impact of the recovery artifacts in Windows 8" (2013). Graduate Theses and Dissertations. 13414. https://lib.dr.iastate.edu/etd/13414 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Journey through the impact of the recovery artifacts in Windows 8 by Wendell Kenneth Johnson A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Co-majors: Computer Engineering; Information Assurance Program of Study Committee: Yong Guan, Major Professor Doug Jacobson Jennifer L. Davidson Iowa State University Ames, Iowa 2013 Copyright © Wendell Kenneth Johnson, 2013. All rights reserved. ii DEDICATION This Thesis is dedicated to my family Jessica, Savannah and Brady. Without your unrelenting support and sacrifices I would not have been able to follow my educational and career dreams. To Lee Adams, while you will never see the finished work, your guiding light and compassion shown to me helped create the person I am today. My drive to succeed and to share my success comes from watching you give so much of your compassion to others.
    [Show full text]
  • Laptop Service Guide
    Windows Operating System 3 Turn off visual effects 3 Turn off Windows Search Indexing Feature 4 Defragging Hard Drive 5 Step 1: Locating the Defragment Wizard 5 Step 2: Using Defragment Wizard 6 Checking your hard drive 8 Checking your memory 8 Ensure Windows Defender is enabled 9 Perform Disk cleanup to remove clutter 12 Disable Programs that you do not use frequently from starting when system boots 14 14 Perform regular Windows Defender scans on system 15 Uninstall programs that you do not use anymore 17 Regularly turn off your system when not in use 18 How to shut down your windows machine 19 Perform check disk on hard drive regularly 21 Turn Off Windows Tips and Tricks 23 Turn Off Search Indexing 24 Regularly perform backups as well as create restore points 27 Use Powershell to fix corrupt files: 32 Enable fast start-up: 34 Effect of ram on the system 35 2 Windows Operating System Turn off visual effects I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. a. Type “Advanced System Settings” and click on it when it appears in the Menu. b. Navigate to the “Advanced” tab at the top. c. Click on “Settings” in the “Performance” block d. Select “Adjust for best performance”. e. Click “Ok” to finish the setup. 3 Turn off Windows Search Indexing Feature I. Open the start menu by pressing the Windows key on your keyboard or by clicking on the icon shown below. II. Search for “Index” and choose “Indexing Options” when it appears.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • The Control Panel and Settings in Windows 10 Most Programs and Apps Have Settings Specific to That Program
    GGCS Introduction to Windows 10 Part 3: The Control Panel and Settings in Windows 10 Most programs and apps have settings specific to that program. For example, in a word processor such as Microsoft Word there are settings for margins, fonts, tabs, etc. If you have another word processor, it can have different settings for margins, fonts, etc. These specific settings only affect one program. The settings in the Control Panel and in Settings are more general and affect the whole computer and peripherals such as the mouse, keyboard, monitor and printers. For example, if you switch the right and left buttons on the mouse in the Control Panel or in Settings, they are switched for everything you click on. If you change the resolution of the monitor, it is changed for the desktop, menus, Word, Internet Explorer and Edge, etc. How to display the Control Panel 1. Right-click the Windows Start button or press the Windows key on the keyboard + X. 2. Click “Control Panel” on the popup menu as shown in the first screen capture. In Windows 10, many of the settings that once were in the Control Panel have moved to Settings. However, there are often links in Settings that take you back to the Control Panel and many other settings that still only exist in the Control Panel. Settings versus Control Panel is an evolving part of Windows design that started with Windows 8. It is not clear at this time whether the Control Panel will eventually go away or whether it will simply be used less frequently by most users.
    [Show full text]
  • Oracle® Linux 7 Managing File Systems
    Oracle® Linux 7 Managing File Systems F32760-07 August 2021 Oracle Legal Notices Copyright © 2020, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Veritas™ System Recovery 18 Service Pack 1 User's Guide
    Veritas™ System Recovery 18 Service Pack 1 User's Guide Windows Edition Documentation version: 18 Service Pack 1 Legal Notice Copyright © 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third party software for which Veritas is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Keeping Your PC Healthy
    South Seattle College Keep Your Computer Healthy In this class, you will learn about hardware and software maintenance. We will start with hardware and then we will move to software. Software has many different utilities that can be used and applied for different reasons. We will look at the following: System Restore Reset this PC Defragmenter Laptops BitLocker (Encryption) Microsoft Safety Scanner (remove viruses, spyware, and other malicious software) Uninstall unwanted software Hardware maintenance The first thing to do with your computer is to keep it running cool. Dust can cause your PC components to hold heat. This can cause parts to fail over time. The first thing you need to do is assemble your gear. Before working on your PC make sure you unplug. 1 11/2/2017 South Seattle College Dust, dirt, hair, and other debris can build up on fans and heatsinks. Before After Components can come loose or become unseated. If any component is loose or seems loose remove, clean and reseat the component. Have a Dustbuster or similar small vacuum on hand. In addition, some paper towels and a bit of all-purpose spray cleaner (like Fantastik or Simple Green) are useful, as are a microfiber cloth and some isopropyl alcohol. The canned air and brush are useful for dislodging hair, dust and other debris from all your PC’s surfaces—especially heatsinks and printed circuit boards (PCBs), which have countless tiny nooks and crannies. The vacuum sucks up the various detritus. The paper towels, spray cleaner, and microfiber cloth are for wiping down hard, nonelectrical surfaces.
    [Show full text]
  • Managing Network File Systems in Oracle® Solaris 11.4
    Managing Network File Systems in ® Oracle Solaris 11.4 Part No: E61004 August 2021 Managing Network File Systems in Oracle Solaris 11.4 Part No: E61004 Copyright © 2002, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • MD-272/273 Full Manual
    MD-272/MD-273 TV Media Player Full Manual Introduction Congratulations on your purchase of the Sitecom MD-272/MD-273 TV Media Player. The MD-272/273 TV Media Player supports playback of the most common file formats of digital video, audio and photo media. Attach the media player via standard AV or HDMI cables to a standard or high-definition TV. The compact size of the device allows you to take it with you to anyone you like and share your digital content. Photos • Display slide shows with music • Zoom, pan, move and rotate photos Video • Fast forward, rewind, pause, zoom, and pan • View subtitles Music • Fast forward, rewind, pause, shuffle, and repeat • Playlist support Network • Connect the TV Media Player via cable or wireless to your home network • Play Media from a NAS or computer directly to your TV Online • Connect the TV Media Player via cable or wireless to the internet • View Media from popular applications such as YouTube and MediaFly • Use popular online applications such as Facebook Index 1 Key Features ............................................................................4 2 Package Contents.....................................................................5 3 Cautions ...................................................................................6 3.1 Usage Cautions.......................................................................................... 6 3.2 Power........................................................................................................ 6 3.3 Radio Interference ...................................................................................
    [Show full text]
  • Journey Into Windows 8 Recovery Artifacts
    2013 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings Jun 11th, 2:30 PM Journey into Windows 8 Recovery Artifacts W. K. Johnson KPMG, USA, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Scholarly Commons Citation Johnson, W. K., "Journey into Windows 8 Recovery Artifacts" (2013). Annual ADFSL Conference on Digital Forensics, Security and Law. 3. https://commons.erau.edu/adfsl/2013/tuesday/3 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. ADFSL Conference on Digital Forensics, Security and Law, 2013 JOURNEY INTO WINDOWS 8 RECOVERY ARTIFACTS W. Kenneth Johnson KPMG USA [email protected] ABSTRACT One of the most difficult processes of digital forensics is to understand how new technology interacts with current technology and how digital forensic analysts can utilize current Digital Forensics technologies and processes to recover and find information hidden. Microsoft has released their new operating system Windows 8, with this new release Microsoft has added some features to the operating system that will present some interesting complications to digital forensics. Since the initial release of the Windows 8 Release Candidates there have been some research released that focus primarily on the new user created artifacts and a few artifacts that have been added by the operating system that might contain valuable information.
    [Show full text]
  • Lab - System Restore in Windows 7 and Vista
    Lab - System Restore in Windows 7 and Vista Introduction In this lab, you will create a restore point and then use it to restore your computer. Recommended Equipment • A computer running Windows 7 or Vista Step 1: Create a restore point. a. Click Control Panel > System > System protection. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Lab – System Restore in Windows 7 and Vista b. Click the System Protection tab in the System Properties window and click Create. c. In the Create a restore point description field of the System Protection window, type Application Installed. Click Create. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 10 Lab – System Restore in Windows 7 and Vista d. The System Protection window displays the progress of the creation of the restore point. When the message The restore point was created successfully displays, click Close. e. Click OK to close the System Properties window. Step 2: Work in the System Restore utility. a. Click Start > All Programs > Accessories > System Tools > System Restore. b. When the System Restore Window opens, click Next. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 10 Lab – System Restore in Windows 7 and Vista c. The System Restore window displays a list of restore points. What type of restore point was created in step 1? d. Close all open windows. © 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]