Image Method
The imaging method will come from the drop-down where the imaging methods have been entered in the maintenance system process.
Operating System
The operating system for the acquisition box will come from the drop-down where the imaging methods have been entered in the maintenance system process.
Blocker Used
Enter the details of the write blocker used.
Acquisition Hash
The acquisition hash for the exhibit.
Verify Hash
The verification hash for the exhibit.
Image 2
This is where the details of the second image of the evidence is recorded if second ...
Get Digital Forensics Processing and Procedures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.