SlideShare a Scribd company logo
■Evidence Preservation Tool MASAMUNE Clone Forensic Edition Features
●Linux based software running from CD
・Physical reproduction of data on external HDD without removing internal HDD* from PC.
・Can support all interfaces and create physical copies of
various electronic recording media.
*HDD: hard disk drive.
●Depending on combination of hardware and cables being used,
high speed of 42 GB/min (actual measured value) can be achieved.
●Proprietary Algorithm (patent pending) reduces the number of read errors
・Can create highly accurate clone disks by storing addresses of skipped bad sectors
and unreadable regions and repeating read operations on them.
●Can generate electronic signature using content of the log which is encrypted
using proprietary algorithm and detects unauthorized log alteration.
●Identity verification using hash value
・Can verify identity of data using hash value calculated by hash function.
●Source and Target confirmation
・Can protect from misoperations and accidental original overwriting by confirming the
connected device (electronic recording media).
Clone Forensic Edition
■MASAMUNE Clone Forensic Edition Algorithm
・Avoids retry operation on sector where read error occurs using proprietary algorithm.
1)Skip Operation (Normal Copy Mode).
 Avoids read error by skipping sectors in the order of their occurrence.
2)Detailed repeated reading of the skipped sectors (Final Copy Mode).
 Reliable physical reproducing of the skipped sectors.
Reliable software duplicator quickly supporting
your work through preservation of evidence for
digital forensic investigation.
This is the MASAMUNE Clone Forensic Edition!
■What functions are required in an evidence preservation tool?
●Complete (physical) reproduction
・Processing of bad sectors (do not skip / terminate with errors).
・Avoidance / reduction of read errors.
●Identity verification
・Data identity verification using hash value calculated by hash function and binary comparison of bit strings from
copy source and target.
(According to the 3rd edition of the IDF evidence preservation guidelines)
●Working log generation
・Detailed information about damaged and recovered data.
・Work results including work content, addresses of unreadable sectors, etc.
・Detect unauthorized log alteration.
             【Application examples】
MASAMUNE Clone Forensic Edition can be used in the following cases.
1) Copying contents of the disks of a notebook PC which is hard to dismantle.
Physical reproduction of data on external HDD without removing internal HDD/SDD from a slim notebook PC.  
2) Copying contents of the disks of a server PC.
Image copies of disks from Unix certified servers and RAID arrays can be created.
3) Copying contents of an unstable HDD.
4) Field works with minimal equipment.
Because software is running from CD, it does not require a special system; a common PC on-hand can be used for
disk copying.
*Please read the user manual before using MASAMUNE Clone software.
*Depending on media condition creation of Clone may be impossible.
*Specifications and design of MASAMUNE products may be modified for improvement without prior notice.
■Recommended System
 
 
   *USB port is necessary for USB dongle based license key.
(Even if the below conditions are met software may not work due to specific hardware configurations)
Even if OS working from such HDD terminates with errors or usual disk copy operation is difficult, it is possible to
create highly accurate physical copy of such HDD by adding command line parameters and adjusting settings.
   PC DOS/V compatible or Intel Mac (Macintosh with Intel CPU on board) PC capable of running software from CD-ROM
   CPU
   Memory  
   Graphic card
   Other
Intel Pentium / Celeron, AMD Athlon / Duron or compatible CPU with clock frequency from 1 GHz.
From 512MB
XGA (1024x768) or better
USB port, CD-ROM or DVD drive, keyboard

More Related Content

What's hot

Computer Hardware Basics
Computer Hardware BasicsComputer Hardware Basics
Computer Hardware Basics
Mark Rotondella
 
Computer hardware presentation
Computer hardware presentationComputer hardware presentation
Computer hardware presentation
Jisu Dasgupta
 
Lkk01 Computer Hardware and Networking ppt
Lkk01 Computer Hardware and Networking pptLkk01 Computer Hardware and Networking ppt
Lkk01 Computer Hardware and Networking ppt
Latikkumar Kothwar
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
DuaShaban
 
Partes internas y externas del pc
Partes internas y externas del pcPartes internas y externas del pc
Partes internas y externas del pc
jsebastianamezquita
 
Hardware and Software, What is difference between Hardware and Software
Hardware and Software, What is difference between Hardware and SoftwareHardware and Software, What is difference between Hardware and Software
Hardware and Software, What is difference between Hardware and Software
QuinnWolver
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
Deepankar Gupta
 
Inside the CPU
Inside the CPUInside the CPU
Inside the CPU
themassmaker
 
introduction to computer Hardware
introduction to computer Hardwareintroduction to computer Hardware
introduction to computer Hardware
Azizur Rahman
 
introduction to computer hardware
 introduction to computer hardware introduction to computer hardware
introduction to computer hardwareBikramjeet Sidhu
 
Presentation on introduction of computer hardware
Presentation on introduction of computer hardwarePresentation on introduction of computer hardware
Presentation on introduction of computer hardware
Kashif Kashif
 
Day1
Day1Day1
COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING
Nikhil Sasikumar
 
Basics of Computer hardware and Software
Basics of Computer hardware and SoftwareBasics of Computer hardware and Software
Basics of Computer hardware and Software
vaibhav jindal
 
Introduction to Computer Hardware Assembling
Introduction to Computer Hardware AssemblingIntroduction to Computer Hardware Assembling
Introduction to Computer Hardware Assembling
Ranjith Siji
 

What's hot (19)

Computer Hardware Basics
Computer Hardware BasicsComputer Hardware Basics
Computer Hardware Basics
 
Computer hardware presentation
Computer hardware presentationComputer hardware presentation
Computer hardware presentation
 
P1 unit 2
P1 unit 2P1 unit 2
P1 unit 2
 
Lkk01 Computer Hardware and Networking ppt
Lkk01 Computer Hardware and Networking pptLkk01 Computer Hardware and Networking ppt
Lkk01 Computer Hardware and Networking ppt
 
P1 Computer systems
P1 Computer systemsP1 Computer systems
P1 Computer systems
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Partes internas y externas del pc
Partes internas y externas del pcPartes internas y externas del pc
Partes internas y externas del pc
 
Hardware and Software, What is difference between Hardware and Software
Hardware and Software, What is difference between Hardware and SoftwareHardware and Software, What is difference between Hardware and Software
Hardware and Software, What is difference between Hardware and Software
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Hardware
HardwareHardware
Hardware
 
Inside the CPU
Inside the CPUInside the CPU
Inside the CPU
 
introduction to computer Hardware
introduction to computer Hardwareintroduction to computer Hardware
introduction to computer Hardware
 
introduction to computer hardware
 introduction to computer hardware introduction to computer hardware
introduction to computer hardware
 
Presentation on introduction of computer hardware
Presentation on introduction of computer hardwarePresentation on introduction of computer hardware
Presentation on introduction of computer hardware
 
Day1
Day1Day1
Day1
 
COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING COMPUTER HARDWARE ASSEMBLING
COMPUTER HARDWARE ASSEMBLING
 
Basics of Computer hardware and Software
Basics of Computer hardware and SoftwareBasics of Computer hardware and Software
Basics of Computer hardware and Software
 
Input
InputInput
Input
 
Introduction to Computer Hardware Assembling
Introduction to Computer Hardware AssemblingIntroduction to Computer Hardware Assembling
Introduction to Computer Hardware Assembling
 

Similar to MASAMUNE Clone Forensic Edition

MASAMUNE Clone Enterprise Edition
MASAMUNE Clone Enterprise EditionMASAMUNE Clone Enterprise Edition
MASAMUNE Clone Enterprise Edition
Hayato Abe
 
Chapter 2 Hardware and Software
Chapter 2 Hardware and SoftwareChapter 2 Hardware and Software
Chapter 2 Hardware and Software
Anjan Mahanta
 
Presentation on Computer Peripheral by Atharva Jawalkar
Presentation on Computer Peripheral by Atharva JawalkarPresentation on Computer Peripheral by Atharva Jawalkar
Presentation on Computer Peripheral by Atharva Jawalkar
Atharva Jawalkar
 
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheapUWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
edlangley
 
5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
KunalGola6
 
Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2Davor Guttierrez
 
A Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & PeripheralsA Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & Peripherals
john juvvanapudi
 
Towards Isolated Execution at the Machine Level
Towards Isolated Execution at the Machine LevelTowards Isolated Execution at the Machine Level
Towards Isolated Execution at the Machine Level
Shinagawa Laboratory, The University of Tokyo
 
Chapter 1-1 Computers and Software in Networks.pptx
Chapter 1-1  Computers and Software in Networks.pptxChapter 1-1  Computers and Software in Networks.pptx
Chapter 1-1 Computers and Software in Networks.pptx
AfendeyAthurJinir
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
Soumit Ghosh
 
Chapter 1-1 _ Computers and Software in Networks.pdf
Chapter 1-1 _ Computers and Software in Networks.pdfChapter 1-1 _ Computers and Software in Networks.pdf
Chapter 1-1 _ Computers and Software in Networks.pdf
AfendeyAthurJinir
 
Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0
Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0
Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0Igor Stoppa
 
5120224.ppt
5120224.ppt5120224.ppt
5120224.ppt
dedanndege
 
Security issues in FPGA based systems.
Security issues in FPGA based systems.Security issues in FPGA based systems.
Security issues in FPGA based systems.
Rajeev Verma
 
computerhardwarecomponent-ppt-121104135329-phpapp02.pptx
computerhardwarecomponent-ppt-121104135329-phpapp02.pptxcomputerhardwarecomponent-ppt-121104135329-phpapp02.pptx
computerhardwarecomponent-ppt-121104135329-phpapp02.pptx
hillcity1
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
Raj vardhan
 
Windows optimization and customization
Windows optimization and customizationWindows optimization and customization
Windows optimization and customizationHiren Mayani
 
Reliability, Availability and Serviceability on Linux
Reliability, Availability and Serviceability on LinuxReliability, Availability and Serviceability on Linux
Reliability, Availability and Serviceability on Linux
Samsung Open Source Group
 
Hardware hacking
Hardware hackingHardware hacking
Hardware hacking
Tavish Naruka
 
Connecting Hardware Peripheralsnewq.pptx
Connecting Hardware Peripheralsnewq.pptxConnecting Hardware Peripheralsnewq.pptx
Connecting Hardware Peripheralsnewq.pptx
AyeleNugusie
 

Similar to MASAMUNE Clone Forensic Edition (20)

MASAMUNE Clone Enterprise Edition
MASAMUNE Clone Enterprise EditionMASAMUNE Clone Enterprise Edition
MASAMUNE Clone Enterprise Edition
 
Chapter 2 Hardware and Software
Chapter 2 Hardware and SoftwareChapter 2 Hardware and Software
Chapter 2 Hardware and Software
 
Presentation on Computer Peripheral by Atharva Jawalkar
Presentation on Computer Peripheral by Atharva JawalkarPresentation on Computer Peripheral by Atharva Jawalkar
Presentation on Computer Peripheral by Atharva Jawalkar
 
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheapUWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
 
5_6097975312522412493.pptx
5_6097975312522412493.pptx5_6097975312522412493.pptx
5_6097975312522412493.pptx
 
Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2
 
A Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & PeripheralsA Presentation on Computer Devices & Peripherals
A Presentation on Computer Devices & Peripherals
 
Towards Isolated Execution at the Machine Level
Towards Isolated Execution at the Machine LevelTowards Isolated Execution at the Machine Level
Towards Isolated Execution at the Machine Level
 
Chapter 1-1 Computers and Software in Networks.pptx
Chapter 1-1  Computers and Software in Networks.pptxChapter 1-1  Computers and Software in Networks.pptx
Chapter 1-1 Computers and Software in Networks.pptx
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Chapter 1-1 _ Computers and Software in Networks.pdf
Chapter 1-1 _ Computers and Software in Networks.pdfChapter 1-1 _ Computers and Software in Networks.pdf
Chapter 1-1 _ Computers and Software in Networks.pdf
 
Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0
Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0
Open_IoT_Summit-Europe-2016-Building_an_IoT-class_Device_0
 
5120224.ppt
5120224.ppt5120224.ppt
5120224.ppt
 
Security issues in FPGA based systems.
Security issues in FPGA based systems.Security issues in FPGA based systems.
Security issues in FPGA based systems.
 
computerhardwarecomponent-ppt-121104135329-phpapp02.pptx
computerhardwarecomponent-ppt-121104135329-phpapp02.pptxcomputerhardwarecomponent-ppt-121104135329-phpapp02.pptx
computerhardwarecomponent-ppt-121104135329-phpapp02.pptx
 
Unit 3 storage fundamentals
Unit 3 storage fundamentalsUnit 3 storage fundamentals
Unit 3 storage fundamentals
 
Windows optimization and customization
Windows optimization and customizationWindows optimization and customization
Windows optimization and customization
 
Reliability, Availability and Serviceability on Linux
Reliability, Availability and Serviceability on LinuxReliability, Availability and Serviceability on Linux
Reliability, Availability and Serviceability on Linux
 
Hardware hacking
Hardware hackingHardware hacking
Hardware hacking
 
Connecting Hardware Peripheralsnewq.pptx
Connecting Hardware Peripheralsnewq.pptxConnecting Hardware Peripheralsnewq.pptx
Connecting Hardware Peripheralsnewq.pptx
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

MASAMUNE Clone Forensic Edition

  • 1. ■Evidence Preservation Tool MASAMUNE Clone Forensic Edition Features ●Linux based software running from CD ・Physical reproduction of data on external HDD without removing internal HDD* from PC. ・Can support all interfaces and create physical copies of various electronic recording media. *HDD: hard disk drive. ●Depending on combination of hardware and cables being used, high speed of 42 GB/min (actual measured value) can be achieved. ●Proprietary Algorithm (patent pending) reduces the number of read errors ・Can create highly accurate clone disks by storing addresses of skipped bad sectors and unreadable regions and repeating read operations on them. ●Can generate electronic signature using content of the log which is encrypted using proprietary algorithm and detects unauthorized log alteration. ●Identity verification using hash value ・Can verify identity of data using hash value calculated by hash function. ●Source and Target confirmation ・Can protect from misoperations and accidental original overwriting by confirming the connected device (electronic recording media). Clone Forensic Edition ■MASAMUNE Clone Forensic Edition Algorithm ・Avoids retry operation on sector where read error occurs using proprietary algorithm. 1)Skip Operation (Normal Copy Mode).  Avoids read error by skipping sectors in the order of their occurrence. 2)Detailed repeated reading of the skipped sectors (Final Copy Mode).  Reliable physical reproducing of the skipped sectors. Reliable software duplicator quickly supporting your work through preservation of evidence for digital forensic investigation. This is the MASAMUNE Clone Forensic Edition!
  • 2. ■What functions are required in an evidence preservation tool? ●Complete (physical) reproduction ・Processing of bad sectors (do not skip / terminate with errors). ・Avoidance / reduction of read errors. ●Identity verification ・Data identity verification using hash value calculated by hash function and binary comparison of bit strings from copy source and target. (According to the 3rd edition of the IDF evidence preservation guidelines) ●Working log generation ・Detailed information about damaged and recovered data. ・Work results including work content, addresses of unreadable sectors, etc. ・Detect unauthorized log alteration.              【Application examples】 MASAMUNE Clone Forensic Edition can be used in the following cases. 1) Copying contents of the disks of a notebook PC which is hard to dismantle. Physical reproduction of data on external HDD without removing internal HDD/SDD from a slim notebook PC.   2) Copying contents of the disks of a server PC. Image copies of disks from Unix certified servers and RAID arrays can be created. 3) Copying contents of an unstable HDD. 4) Field works with minimal equipment. Because software is running from CD, it does not require a special system; a common PC on-hand can be used for disk copying. *Please read the user manual before using MASAMUNE Clone software. *Depending on media condition creation of Clone may be impossible. *Specifications and design of MASAMUNE products may be modified for improvement without prior notice. ■Recommended System        *USB port is necessary for USB dongle based license key. (Even if the below conditions are met software may not work due to specific hardware configurations) Even if OS working from such HDD terminates with errors or usual disk copy operation is difficult, it is possible to create highly accurate physical copy of such HDD by adding command line parameters and adjusting settings.    PC DOS/V compatible or Intel Mac (Macintosh with Intel CPU on board) PC capable of running software from CD-ROM    CPU    Memory      Graphic card    Other Intel Pentium / Celeron, AMD Athlon / Duron or compatible CPU with clock frequency from 1 GHz. From 512MB XGA (1024x768) or better USB port, CD-ROM or DVD drive, keyboard