How to Secure the Computer as Evidence?

Photograph and log room, position of computer and status of computer; If the computer is “OFF,” Do Not Turn “ON”; If the computer is “ON,” Do Not Turn “OFF”; Place Evidence tape over each drive slot; Photograph and label back of computer components while they are plugged in; Label all connection ends to allow reassembly if needed; If transporting, treat all components as fragile; Collect all devices such as cables, keyboards and monitors; Collect instruction manuals, documentation, and notes; User notes may contain passwords;…
Read More

Fundamentals of searching for malfunctions

The description above should demonstrate that a HDD is a sophisticated software and hardware device combining electronic and mechanical parts and utilizing the most recent achievements of microelectronics, micromechanics, automatic control theory, magnetic recording theory, and coding theory. HDD repair is impossible without specialized knowledge, special equipment, instruments and tools, and without a specifically equipped location (clean room).…
Read More

Logical structure of disk space

Considerable part of disk space in modern drives is hidden from users; it contains service data and an area reserved for substitution instead of defective sectors in a HDD. In normal operation mode it is accessible by drive microcontroller only. Users may access the working area frequently called logical disk space and it is exactly the same capacity as the value indicated in the characteristics of a certain model.…
Read More