Article ID Journal Published Year Pages File Type
10342485 Digital Investigation 2005 8 Pages PDF
Abstract
This paper explains some of the issues that prevent the easy detection of Host Protected Areas on IDE drives and discusses a variety of methods which may enable examiners to reveal what may be overlooked evidence. We consider some exploitation methods and include a brief examination of EnCase 5.01 image capture as an example.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,