520
EnCase Forensic Version 6.11 Userʹs Guide
An options dialog displays. The Verify wiped sectors box is checked by default and the
Wipe character is hex 00. If the box is checked, the Wipe Drive program reads each sector
and verifies that the wipe character is written throughout. You can enter any hex value in
the Wipe character field.
4.
Click Finish.
The Drives dialog opens:
5.
Enter ʺYesʺ in the Continue box and click OK.
Using EnCase Tools
521
The drive is completely erased and overwritten with the specified hex string. Wipe Drive
displays information about the disk and the operation.
You must reformat this drive in order to use it again.
Verifying Evidence Files
Verify Evidence Files checks CRC values of selected files. It is a way to ensure that evidence is
not tampered with. Verified CRC information is written out to a log file. If a CRC verfication
fails, a notification appears and you can log the error to the console, bookmark tab, or log file.
Acquire the evidence files.
1.
Click
Tools > Verify Evidence Files.
The Verify Evidence Files file browser appears.
2.
Select one or more evidence files and click Open.
522
EnCase Forensic Version 6.11 Userʹs Guide
When files are verified, a status report appears.
Creating a LinEn Boot Disc
You have a copy of a Linux distribution.
See Creating a LinEn Boot Disc (on page 47) for more information.
Using EnCase Tools
523
Options
Use the Options dialog to customize the software.
See the chapter The Options Dialog (on page 155) for complete information on this topic.
1.
Click Tools > Options.
The Options dialog opens.
2.
Click on a tab to make changes to settings.
3.
When you are finished making the changes to tabs, click OK.
527
Glossary of Terms
A
ASCII
ASCII ( American Standard Code for
Information
Interchange) is a character
encoding based on the English alphabet.
ASCII codes represent text in computers,
communications equipment, and other
devices that work with text. Most modern
character codes have a historical basis in
ASCII. ASCII was first published as a
standard in 1967 and was last updated in
1986. It currently defines codes for 33 non‐
printing, mostly obsolete control characters
that affect how text is processed, plus 95
printable characters.
B
Bookmark
Bookmarks let you annotate evidence and
analytical artifacts. Files, folders, address
ranges within files, collections of files or
data, and even bookmarks themselves can
be book marked.
Burn
The process of recording data to an optical
disc, such as a CD or DVD.
C
Case File
A text file containing information specific to
one case. The file includes pointers to one or
more evidence files, devices, bookmarks,
search results, sorts, hash analysis results,
and signature analysis.
Checksum
A form of redundancy check for protecting
the integrity of data by detecting errors. It
works by adding the basic components of a
message (typically the asserted bits) and
storing the resulting value. Later, anyone
can perform the same operation on the data,
compare the result to the authentic
checksum, and, if the sums match, conclude
that the data was not corrupted. A major
drawback to checksum is that 1234
generates the same check as 4321.
Cluster
A cluster is the smallest amount of disk
space that can be allocated to hold a file.
Code Page
A code page interprets a series of bits as a
character.
Compound File
A file containing other file types within it.
For example, a Microsoft Word file can
contain text, graphics, and spreadsheet files.
Computer Forensics
The application of scientific method to
digital media to establish factual
information for judicial review. This process
often involves investigating computer
systems to determine whether they were
used for illegal or unauthorized activities.
Connection
The communications between the servlet
and the client occur across a connection.
This connection may involve
communicating through the SAFE.