Difference between pages "Hard Drive Passwords" and "Slack"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (--- ->—)
 
m
 
Line 1: Line 1:
Some hard drives support passwords. These passwords can be implemented in computer's operating system, its BIOS, or even in the hard drive's firmware.  Passwords implemented in the OS are the easiest to remove, those in the firmware are the hardest.
+
{{Expand}}
  
Sometimes people use the term "password" but the hard drive is really [[Full Disk Encryption|encrypted]], and the password is used to unlock a decryption key. These passwords cannot be removed — the encryption key must be cracked or discovered through another means.
+
== Definition ==
  
=Vendors=
+
In Computer Forensics '''slack''' refers to the bytes after the logical end of a file and the end of the cluster wherein the final byte of the valid file resides.
Disklabs (www.disklabs.com) is able to remove some forms of hard drive passwords.
+
  
Dell will assist law enforcement in removing the passwords from password-protected hard drives. You need to provide Dell with a copy of the search warrant and the computer's service tag #. Reportedly this can be done over the phone, once you have a good relationship with Dell.
+
== Slack Types ==
 +
 
 +
=== RAM Slack ===
 +
 
 +
=== File Slack ===
 +
 
 +
== External Links ==

Revision as of 11:19, 3 March 2008

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Definition

In Computer Forensics slack refers to the bytes after the logical end of a file and the end of the cluster wherein the final byte of the valid file resides.

Slack Types

RAM Slack

File Slack

External Links