Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10342485 | Digital Investigation | 2005 | 8 Pages |
Abstract
This paper explains some of the issues that prevent the easy detection of Host Protected Areas on IDE drives and discusses a variety of methods which may enable examiners to reveal what may be overlooked evidence. We consider some exploitation methods and include a brief examination of EnCase 5.01 image capture as an example.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Mark Bedford,