Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEFCON 16: Solid State Drives Destroy Forensic & Data Recovery Jobs: Animated!

Автор: Christiaan008

Загружено: 2011-01-20

Просмотров: 53087

Описание:

Speaker: Scott Moulton, President of Forensic Strategy Services, LLC

This speech is all ANIMATION in 3D! Data on a Solid State Device is virtualized and the Physical Sector that you are asking for is not actually the sector it was 5 minutes ago. The data moves around using wear leveling schemes controlled by the drive using propriety methods. When you ask for Sector 125, its physical address block is converted to an LBA block and every 5 write cycles the data is moved to a new and empty previously erased block. This destroys metadata used in forensics & data recovery. File Slack Space disappears, you can no longer be sure that the exact physical sector you are recovering was in the same location or has not been moved or find out what it used to be!

I will explain how Flash and Solid State Drives are different and compare them to hard drives in their ability to read and write data. What happens when they are damaged and a recovery needs to be done? In this process you will see how the data gets shuffled around and how some of the data is destroyed in the process making it impossible in many cases to recover some files and metadata that on a hard drive has been a simple task by comparison. You will also get an idea about how propriety methods that each vendor is using will isolate you from knowing what is happening to your data or even where it is on the drive. And at the very least the animation is the quality of the History Channel and you will enjoy what you are learning!

For more information visit: http://bit.ly/defcon16_information
To download the video visit: http://bit.ly/defcon16_videos

DEFCON 16: Solid State Drives Destroy Forensic & Data Recovery Jobs: Animated!

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Руководство для гиков по цифровой криминалистике

Руководство для гиков по цифровой криминалистике

DEFCON 16: Free Anonymous Internet Using Modified Cable Modems

DEFCON 16: Free Anonymous Internet Using Modified Cable Modems

DEF CON 22 - Михаэль Оссманн - Игровой набор АНБ: радиочастотные ретрорефлекторы

DEF CON 22 - Михаэль Оссманн - Игровой набор АНБ: радиочастотные ретрорефлекторы

Криминалистическое получение данных в Windows — FTK Imager

Криминалистическое получение данных в Windows — FTK Imager

You did WHAT with the dead SSD? And the data?

You did WHAT with the dead SSD? And the data?

Кибер-криминалистические исследования, инструменты и методы

Кибер-криминалистические исследования, инструменты и методы

Forensic Data Acquisition - Hardware Write Blockers

Forensic Data Acquisition - Hardware Write Blockers

Professional Data Recovery with $300 Data Recovery - Part 1

Professional Data Recovery with $300 Data Recovery - Part 1

DEF CON 24 - Jmaxxz - Backdooring the Frontdoor

DEF CON 24 - Jmaxxz - Backdooring the Frontdoor

DEFCON 16: Nmap: Scanning the Internet

DEFCON 16: Nmap: Scanning the Internet

Introduction to DIGITAL FORENSICS! (& data recovery)

Introduction to DIGITAL FORENSICS! (& data recovery)

How the Best Hackers Learn Their Craft

How the Best Hackers Learn Their Craft

How to recover data from a hard drive (stuck heads: buzzing, clicking, etc)

How to recover data from a hard drive (stuck heads: buzzing, clicking, etc)

Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

"Digital Forensics Innovation: Searching A Terabyte of Data in 10 minutes" (CRCS Lunch Seminar)

Defcon 21 - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

Defcon 21 - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

NTFS file system explained: understanding resident and non-resident files - Computer forensics

NTFS file system explained: understanding resident and non-resident files - Computer forensics

Cyber Forensics

Cyber Forensics

Defcon 21 - A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It

Defcon 21 - A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It

Defcon 21 - The Secret Life of SIM Cards

Defcon 21 - The Secret Life of SIM Cards

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]