For all test cases run, the device always blocked any commands that would have changed user or operating system data stored on a protected drive. The device also always allowed commands to read the protected drive in all test cases run. Further, the device always returned access-significant information from the protected drive without modification for all test cases. Finally, the device always returned error codes from the protected drive without modification for all test cases. Thus, the testing showed that the WiebeTech Forensic ComboDock (FireWire Interface) write blocker complied with the tool requirements of the Hardware Write Blocker Assertions and Test Plan Version 1.0 for all test cases. In addition to test results, this report provides information on test case selection and the testing environment. The latter addresses the configurations of the two test computers, the protocol analyzer, hard disk drives, and support software. Test data are provided.
Downloads
Similar Publications
- Shoe-Print Extraction from Latent Images Using CRF
- Application of the scientific method to skeletal biology
- Changing Course: Preventing Gang Membership, Chapter 11. Program Evaluation: How Do We Know If We Are Preventing Gang Membership? (From Changing Course: Preventing Gang Membership, P 151-161, 2013, Thomas R. Simon, Nancy M. Ritter, and Reshma R. Mahendra,