1 / 16

Intelligent Computer Solutions

Intelligent Computer Solutions. LinkMASSter. The Fastest Solution To Seize Evidence Data From an Unopened Notebook or Unopened PC. The LinkMASSter is the best and fastest solution for seizing data from suspect computers in the easiest and safest way possible.

justin
Télécharger la présentation

Intelligent Computer Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intelligent Computer Solutions LinkMASSter

  2. The Fastest Solution To Seize Evidence Data From an Unopened Notebook or Unopened PC. The LinkMASSter is the best and fastest solution for seizing data from suspect computers in the easiest and safest way possible.   Just connect the LinkMASSter, boot from the CD or floppy, press Start and watch the suspect data being captured! 

  3. Hardware Description Standard IDE HDD Connector HDD Power Output Port 2.5 Notebook HDD Connector HDD Power Cable USB 1.1/2.0 Port FireWire Ports 1 and 2 Power Adapter Cord

  4. How Does It Work? Connect the LinkMASSter to the suspect Notebook or PC using FireWire or USB interface.

  5. How Does It Work? Boot the Suspect Notebook/PC from the CD drive using the LinkMASSter CD Software.

  6. How Does It Work? Main Tab The Main Tab allows selecting the operation to be performed and switch drive(s) will be used for the operation. Source and Destination Drives Operation Mode Command Buttons Message Window

  7. How Does It Work? Program Settings Tab The Program Settings Tab provides the user with a user-defied settings that will control how the selected capture operation will function. Hashing Method Wipeout Settings Read-Back Verification

  8. How Does It Work? Case Information Tab The Case Information Tab allows the user to enter case specific information that will be stored and/or printed depending on the program settings. Investigator and Case Details BIOS Date and Time from the Suspect Computer

  9. How Does It Work? Status Tab The Status Tab provides the user with real-time feedback during the course of a capture operation. Speed and Time Information Graphical Progress Bar

  10. Product Features • Transfer rate up to 1.5GB/min. • Compatible with USB 1.1/2.0, FireWire IEEE 1394, i.Link. • Independent of the Suspect operating system. • The LinkMASSter will capture any Suspect drives with IDE interface. (SCSI and serial ATA coming soon). • Portable, compact, and low cost. • Software updates at no additional charge.

  11. Software Features • Hashes the Suspect hard drive data with SHA1, MD5 or CRC32. • Captures data from the Suspect hard drive in Single Capture modeor Multi Capture-Linux DD Mode. • Records case and investigator information. • Prints an audit trail report to a serial printer. • Saves audit trail and case information to diskette or compact flash card. • Wipes Out the external hard drives either to DoD specifications or in single pass (fast) mode.

  12. LinkMASSter Benefits • The bootable LinkMASSter CD or Floppy allows investigators to avoid booting from the internal HDD and avoid modifying the contents of the Suspect data. • The CD is custom tailored to boot on any Intel based or compatible system and load appropriate drivers to recognize most USB and FireWire controllers.  • The LinkMASSter software is designed to copy all sectors from the internal drive to the external drive.  This includes deleted files, unused clusters, unknown partitions, unallocated space, and slack space. • The LinkMASSter software is highly optimized to maximize the performance of the copy process and takes advantage of special features in the ICS hardware to perform High Speed data acquisition.

  13. LinkMASSter Benefits • The LinkMASSter software can calculate a hash value on all sectors, read from the Suspect drive and report the value in the message log and audit trail. • SHA1: Computes a SHA1 160-bit hash. • MD5: Computes a MD5 128-bit hash. • CRC32: Computes a CRC32 32-bit hash. • The LinkMASSter prints audit trail information to the configured printer at the end of the operation. • The LinkMASSter performs read-back verification on sectors written to the Evidence drive for verification of data integrity. • LinkMASSter supports saving or printing Audit Trail information including process results, investigator information, and case details.

  14. LinkMASSter Benefits • LinkMASSter main operation modes are: • Single Capture Mode: The Suspect’s hard drive will be copied sector by sector to the Evidence drive. • Multi Capture Mode: The image of the Suspect’s drive will be written as 640MB files into a FAT32 partition on the Evidence drive. (Forensic Tool Kit, EnCase, Linux-DD Format) • Wipe Out Destination Drive: This mode will clear out all data on the Evidence drive. • Hash Verification: This mode will perform a read-only operation of any detected drive and generate a hash value. • LinkMASSter can wipe out the external hard drives: • Wipeout DoD specifications: Uses USA Department of Defense wipeout specification. • Wipeout remainder of the drive after capturing data: Clears out remainder of evidence drive after the capture operation completes.

  15. LinkMASSter Cases System Includes • LinkMASSter unit. • Power supply adapter. • FireWire 1394 adapter. • HDD power cable. • Bootable LinkMASSter program CD and diskettes. • HDD 3.5" and 2.5" data cable. • FireWire 1394 and USB cables. • Optional SiPix thermal printer. Hard Case Soft Case

  16. Intelligent Computer Solutions

More Related