Appendix 3 - References
Online Manual
Frequently Asked Questions
Data Recovery Basics
 Chapter 1 - Introduction
 Chapter 2 - Evaluation
 Chapter 3 - Installation 
 Chapter 4 - Purchase
 Chapter 5 - Activation
 Chapter 6 - User Interface
 Chapter 7 - Best Power Settings
 Chapter 8 - File Recovery
 Chapter 9 - Drive Recovery
 Chapter 10 - Saving Files
 Chapter 11 - Troubleshooting
 Chapter 12 - Options
 Chapter 13 - Raid Recovery
 Chapter 14 - Disk Imaging
 Chapter 15 - Customizing GUI
 Chapter 16 - Legal
 Appendix 1 - Technical Support
 Appendix 2 - File Carving
 Appendix 3 - References
 Appendix 4 - Definitions
 Appendix 5 - Icon Key
1. Magic number (programming). Wikipedia. [Online] http://en.wikipedia.org/wiki/Magic_number_(programming).
2. Carrier, Brian. File System Forensic Analysis. s.l. : Addison Wesley Professional, 2005.
3. Forensiks Wiki. Forensics Wiki. AFF. [Online] [Cited: Mar 29, 2011.] http://www.forensicswiki.org/wiki/AFF.
4. Bunting, Steve and Wei, William. The Official EnCE EnCase Certified Examiner Study Guide. Indianapolis IN : Wiley Publishing, Inc., 2006.
5. United States Computer Emergency Readiness Team. US-CERT Vulnerability Note VU#836068. US-CERT: United States Computer Emergency Readiness Team. [Online] [Cited: March 5, 2011.] http://www.kb.cert.org/vuls/id/836068.
6. Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu. Collision Search Attacks on SHA1. 2005.
7. Merritt, Rick. Chinese researchers compromise SHA-1 hashing algorithm. EE Times. [Online] 2 16, 2005. [Cited: May 4, 2100.] http://www.eetimes.com/electronics-news/4051745/Chinese-researchers-compromise-SHA-1-hashing-algorithm.
8. Injosoft AB. ASCII Code - The extended ASCII table. http://www.injosoft.se/. [Online] http://www.ascii-code.com/.
9. Microsoft MSDN. http://msdn.microsoft.com/en-us/library. [Online] http://msdn.microsoft.com/en-us/library/cc231989%28PROT.13%29.aspx.
10. Hidden Disk Areas: HPA and DCO. Gupta, Mayank R., Hoeschele, Michael D. and Rogers, Marcus K. Fall 2006, Volume 5, Issue 1, International Journal of Digital Evidence.
11. Automated mapping of large binary objects using primitive fragment type classification. Conti, Gregory, et al., et al. 2010, Digital Investigation, Vol. 7S, pp. S3-S12.
12. Fileprints: Identifying file types by n-gram analysis. W. Li, K. Wang, S. Stolfo and B. Herzog. West Point, NY : s.n., June, 2005. 6th IEEE Information Assurance Workshop.
13. Wikipedia. Regular Expression. [Online] en.wikipedia.org/wiki?Regular_expression.
14. Microsoft. Windows registry information for advanced users. Article ID: 256986 - Revision: 12.3. [Online] February 4, 2008. [Cited: August 19, 2011.] http://support.microsoft.com/kb/256986.
15. Wikipedia. Windows Registry. Wikipedia - List of standard registry value types. [Online] [Cited: December 27, 2011.] http://en.wikipedia.org/wiki/Windows_Registry.
16. The Windows Registry as a forensic resource. Carvey, Harlan. 3, September 2005, Pages 201-205 , Digital Investigation, Vol. 2, pp. 201-205.
17. Access Data Inc. Registry Quick Find Chart. Access Data. [Online] 2005. [Cited: August 19, 2011.] http://accessdata.com/media/en_us/print/papers/wp.Registry_Quick_Find_Chart.en_us.pdf.
18. Time and date issues in forensic computing--a case study. Boyd, Chris and Foster, Pete. 1, February 2004, Digital Investigation, Vol. 1, pp. 18-23.
19. Jones, Keith J, Bejtlich, Richard and Rose, Curtis W. Real Digital Forensics Computer Security and Incident Response. s.l. : Addison-Wesley, 2006.
20. Mederios, Jason. NTFS Forensics: A Programmers View of Raw Filesystem Data Extraction. s.l. : Grayscale Research, 2008.
21. Russon, Richard. Linux NTFS Project: NTFS Documentation. Sourceforge.net. [Online] 1996 - 2004. [Cited: March 16, 2011.] http://sourceforge.net/projects/linux-ntfs/files/NTFS%20Documentation/.
22. MBR is damaged - www.NTFS.com. NTFS.com. [Online] http://www.ntfs.com/mbr-damaged.htm.
23. Microsoft. Microsoft Extensible Firmware Initiative FAT32 File System Specification. FAT: General Overview of On-Disk Format. s.l. : Microsoft, 2000.
24. Stoffregen, Paul. Understanding FAT32 Filesystems. PJRC. [Online] Feb 24, 2005. [Cited: March 18, 2011.] http://www.pjrc.com/tech/8051/ide/fat32.html.
25. Microsoft. Detailed Explanation of FAT Boot Sector. support.microsoft.com. [Online] Article ID: 140418 - Last Review: December 6, 2003 - Revision: 3.0, December 6, 2003. http://support.microsoft.com/kb/140418.
26. —. Windows and GPT FAQ. Microsoft Developers Netword (MSDN). [Online] July 2008. http://msdn.microsoft.com/en-us/windows/hardware/gg463525.aspx.
27. —. Basic Storage Versus Dynamic Storage in Windows XP. Microsoft Support. [Online] December 1, 2007. [Cited: March 23, 2011.] http://support.microsoft.com/kb/314343.
28. National Institute of Standards and Technology. CFTT Project Overview. Computer Forensics Tool Testing Program. [Online] [Cited: March 28, 2011.] http://www.cftt.nist.gov/disk_imaging.htm.
29. Wikipedia - Host Protected Area. http://en.wikipedia.org/wiki/Host_protected_area. [Online] [Cited: Mar 29, 3011.] http://en.wikipedia.org/wiki/Host_protected_area.
30. Apple Computer, Inc. Technical Note TN2166 - Secrets of the GPT. developer.apple.com. [Online] 11 6, 2006. [Cited: April 5, 2011.] http://developer.apple.com/library/mac/#technotes/tn2166/_index.html .
31. Apple Inc. Inside Macintosh: Files. Reading, Massachusetts : Addison-Wesley, August 1992.
32. Apple, Inc. HFS Plus Volume Format - Technical Note TN1150. developer.apple.com. [Online] March 5, 2004. [Cited: April 6, 2011.] http://developer.apple.com/library/mac/#technotes/tn/tn1150.html.
33. Wikipedia: Extent (file systems). Extent (file systems). Wikipedia: Extent (file systems). [Online] [Cited: 4 6, 2011.] http://en.wikipedia.org/wiki/Extent_(file_systems).
34. Aomei Technology, Co., Ltd. What is a Dynamic Disk? Dynamic Disk. [Online] 2009. [Cited: April 13, 2011.] http://www.dynamic-disk.com/what-is-dynamic-disk.html.
35. Lewis, Don L. The Hash Algorithm Dilemma–Hash Value Collisions. Forensic Magazine. [Online] 2009. [Cited: May 2011, 4.] http://www.forensicmag.com/article/hash-algorithm-dilemma%E2%80%93hash-value-collisions?page=0,0.
36. An Empirical Analysis of Disk Sector Hashes for Data Carving. Yoginder Singh Dandass, Nathan Joseph Necaise, Sherry Reede Thomas. 2008, Journal of Digital Forensic Practice, Vol. 2, pp. 95-104.
37. Inc., Guidance Software. EnCase Forensic Version 6.10 User Manual. s.l. : Guidance Software, 2008.


