All Categories

  • All Categories
  • Investigation Kits
  • ICS Solutions
  • Media MASSter
  • NVMe M.2
  • SOLO 4
  • SOLO 5
  • 4000 Pro
  • 4000 Pro X2
  • Rapid Image
  • Road Master
  • Data Encryption
  • Forensic Acquisition
  • Data Sanitization
  • Forensic Analysis Tools
  • Drive Bays
  • Hardware Options
  • IT Data Duplication
  • Portable Investigation Stations
  • Software Options
  • Accessories
  • Adapters
  • Cables
  • Controller Cards
  • Power Supplies
  • Replacement Parts
  • Warranties

Glossary

Glossary

Add Option

This menu function provides a method to add additional software capabilities to unit with purchased software options.

Arrow buttons

Located on the front panel of the ImageMASSter units. The four Arrow buttons are used to highlight the display’s menu items.

Audit Trail

Provides a hard copy containing detailed information about the operation performed. The Audit Trail feature is available for Forensic applications.

Auto Run

The Auto Run function instructs the operation to run continuously. The operation will repeat until the operation is manually stopped. This function can be used for quality assurance purposes.

Bad Sector

The "Bad Sector" menu function allows the user to select the method in which the operation handles bad sectors when they are detected on drives.

Block

Refers to a quantity of sectors which are transferred at one time. Typically a block will consist of 256 sectors.

Block Map

This Operation Mode provides the user with the ability to select up to 10 ranges of sectors to be copied from the source drive to the target drive(s). The function is implemented by using a sector-by-sector copy method.

CD-ROM

Compact Disc Read Only Memory is a compact disc format used to hold text, graphics and hi-fidelity stereo sound.

Cluster

A cluster is considered a quantity of sectors. The quantity of sectors that make up a cluster is assigned by the File System in use. Files are allocated to clusters in the File Allocation Table.

Computer Forensic

The investigation of a computer system believed to be involved in a crime.

Control Buttons

The three control buttons, located on the front panel and to the right of the duplicator’s display, provides the controls to select from the unit’s various menu items.

Cracker

A person who breaks into a computer system without authorization with the purpose of damaging it or stealing information from it.

CRC32

Cyclical Redundancy Checking is an error checking technique used to ensure the accuracy of transmitting digital data. It is used to create a 32-bit signature for stored data.

Cyber crime

Crime committed on the information superhighway, typically having to do with online fraud.

Database

The Database function provides the ability to store a record of the operations performed. The record includes information such as drive model, results of operation, and unit information.

Destination Drive

The "Destination Drive" refers to the drive that is used to receive data from the Source drive. Data is transferred to the Destination drive.

Device Configuration Overlay (DCO)

DCO allows systems to modify the apparent features provided by a hard disk drive device. It provides a set of commands that allow a utility program to modify some of the commands, modes, and feature sets supported by the drive.

Differential Data Transfer

Refers to the transfer of data using two lines (wires) between the driver and receiver.

Distributors - Tech Notes (for distr. only)

Distributors - Tech Notes (for distr. only)

DRAM

Dynamic Random Access Memory refers to the physical storage media used to hold software code.

Drive Information

The Drive Info menu function provides a method to view important drive information such as Model, Capacity, and Serial Number.

DVD

Digital VideoDisc or Digital Versatile Disc is an optical digital disc used to hold movies and data.

Error Correction Code (ECC)

Method of detecting and then correcting errors. Typically used to correct Soft Errors when reading from hard drives or CD media.

Evidence Drive

The "Evidence Drive" refers to the destination drive. Data is transferred to the Evidence drive.

FAT

The File Allocation Table is used by the Operating System to allocate clusters

File System

File system refers to the method in which the Operating System allocates clusters. Common File Systems include FAT16, FAT32, NTFS, and HPFS.

Firewire IEEE 1394B

The IEEE 1394 standard for the High Performance Serial Bus, also called FireWire, is a serial data transfer protocol and interconnection system.

Flash Card

A small module that contains flash memory such as a PC Card, CompactFlash or SmartMedia.

Forensic software

It provides a variety of tools for investigating a Suspect’s PC. It may include the abilities to copy the Suspect’s drive or to analyze the drive’s data.

Format

Format defines the logical structures on the drive’s partition(s) and places at the start of the disk any necessary operating system files

Giga bytes

Refers to a billion of bytes or a thousand Megabytes (2^30).

Hack

Often refers to writing a small program or adding code to an existing program to solve a problem in a hurry. Hacking has also become synonymous with writing code to damage a computer via viruses, or stealing credit card information etc.

Hard Disk Drive

The main storage medium in computers and other systems such MP3 players. Hard Disk Drives are composed of one or more spinning platters which can be written to or read from.

HASHING

Hashing is a process that calculates a "unique signature" value for the contents of an entire drive.

HD Cache

This menu item allows disabling or enabling of the drive’s Cache. Today’s drives are designed with high speed memory or Cache. When disabled, the drive’s Cache is not used during data transfer. Disabling HD Cache will result in slower transfer rates.

HD Geometry

This menu item provides both an automatic and manual method of determining a number of drive geometry related parameters to be used to configure the target drives.

HD Handling

This menu item provides the user with the flexibility of selecting various hard disk drive duplication settings.

Hidden FAT32 Partition

A Hidden FAT32 partition can be created using 3rd party utilities. In effect these utilities change the standard known signature of the partition to a value unknown by the operating system, thereby "hiding" the partition.

Hidden NTFS Partition

A Hidden NTFS partition can be created using 3rd party utilities. In effect these utilities change the standard known signature of the partition to a value unknown by the operating system, thereby "hiding" the partition.

Host Protected Area (HPA)

HPA is defined as a reserved area for data storage. This area is hidden from the operating system and file system, and is normally used for specialized applications

Identical Mode

This menu setting when enabled instructs IQCOPY to transfer an image of the source drive’s partition and boot sector information to the target drive without the need of updating this information once transferred.

Image Copy

Image Copy performs a sector by sector copy operation. This mode can be adjusted to copy between 1% and 100% of the source drive.

Installed options

Located in the Options submenu, Installed Options list all options currently installed in the ImageMASSter.

IQCOPY

IQCOPY is an intelligent copy method which copies only allocated clusters. By ignoring unallocated clusters, the time it takes to copy a drive can be greatly reduced.

Jitter

Jitter refers to the slight movement of a signal in time or phase that can induce errors and loss of synchronization in high-speed synchronous data transfer.

Keyword

A word used in a text search. For example while analyzing data during a forensic search.

Kilobytes

Refers to a thousand of bytes.

LinuxDD

LinuxDD format is a method of capturing a Suspect’s drive’s data where the entire image of the Suspect’s drive is segmented and saved in one or more separate files inside a FAT32 partition on the Evidence drive.

Lock Settings

Provides the user with the function to password protect the unit’s currently stored settings.

Logging

Logging provides the user with the capability of displaying and storing event log information.

Manage Settings

This function provides the user with the capability of saving multiple user defined settings.

MD5

Message Digest 5 is a popular hashing algorithm used to create digital signatures. It is used to create a 128-bit signature for stored data.

   Message Log

Contains a record of the events performed for a given operation.

MMC Mode

The MultiMASSter Creator (MMC) function allows adding loads to a drive to be used as a MultiMASSter drive.

MultiMASSter Option

The MultiMASSter Option provides MultiMASSter Creator capabilities which allow storage of multiple software loads on a single source drive. The Option also allows selecting individual loads to copy from the MultiMASSter drive to a destination drive.

Notebook "Sleep Partition" Support

This indicates support for copying the "suspend partition" structure, also known as the "Phoenix" partition.

Notebook Drive Adapter

A notebook drive adapter enables the ImageMASSter to support a variety of notebook models via direct connection of the proprietary notebook drive interface to the ImageMASSter interface.

NTFS

NT File System is a file system for Windows NT, 2000 and XP operating systems. It has an improved performance over FAT32 and is required in order to implement numerous security and administrative features in the OS.

Operating System

It is a program that supplies the interface between the user and the computer.

   Options

Options are considered software functions which are not available with the standard ImageMASSter software. Options require purchasing and can be added to an ImageMASSter unit to add additional capabilities and features.

Parallel Port

Parallel port is an interface that lets a computer transmit data to another device using parallel transmission; that is, several bits sent simultaneously over separate wires.

Partition Scaling

This menu item provides to ability to select among a choice of partition scaling options.

PCMCIA

Personal Computer Memory Card International Association (PCMCIA) is an organization that defines standards for connecting peripherals to small computers such as notebooks and laptops. The PCMCIA bus (also known as PC Card and Cardbus) is a widely accepted standard.

PCMCIA-ATA adapter

The PCMCIA-ATA adapter allows duplication of PCMCIA-ATA Flash devices using the ICS-JMR ImageMASSter product line.

PCMCIA-SCSI adapter

The PCMCIA-SCSI adapter allows duplication of SCSI drives using the ICS-JMR ImageMASSter Hand-Held line of duplication products.

Percentage of Disk

The % of Disk copy method copies both allocated and unallocated clusters of a drive. This copy mode implements a sector-by-sector copy method.

Query

When referring to a database or search, it is a field or option used to locate information within a database or other location

Rapid Deployment

Fast and efficient loading of an Operating System and application software simultaneously to multiple drives or computers

Read-Back Verification

Read-Back-Verification is the process of reading back written data and comparing it to the originally read data.

Remainder

This menu item when enabled provides a quick method to check a target drive’s remaining area for surface defects after completing an IQCOPY operation.

RJ-45 connection port

This port is used to upgrade the ImageMASSter duplicators with current software as well as for connecting a serial printer.

Sanitize

Sanitize refers to the process of clearing a drive of all previously stored data. The WipeOut function can be used to sanitize a drive.

Sector

The smallest storage area of a formatted hard disk drive.

Serial Port

A serial port is an interface by which a computer can transmit data to another device using serial transmission; that is one bit at a time.

Serial Printer

A serial printer is a printer that connects to a computer's serial port.

   Set Menu

This menu item provides the user with functions to view and manage settings.

SHA-1

Secure Hash Algorithm-1 is a popular hashing algorithm used to create digital signatures. It is used to create a 160-bit signature for stored data.

Single Capture

Single Capture is an ImageMASSter Forensic copy mode that performs a sector-by-sector copy operation.

Skip Bad Sectors

The option to ignore and skip bad sectors encountered during the duplication process.

Skip Block

The option to ignore and skip a block of bad sectors encountered during the duplication process.

Soft Error

A data error that can be corrected with Error Correction Code (ECC).

Software

Loadable code that creates an application.

Source Drive

The Source Drive refers to the drive containing data which needs to be duplicated using the ICS-JMR ImageMASSter product line of duplicators.

Speed

The Speed menu item provides the user with the flexibility of selecting the speed at which the operation will run under.

Status Light

Located on the ImageMASSter control panel, the Status LEDs provide an indication that an operation is in process or has been completed.. A blinking Status LED indicates that an operation is still in process.

Storage

Usually refers to the hard disk drive in a computer system.

Sub-routine

A small autonomous piece of software code within the main source code that is called to perform a specific function.

Suspect’s Drive

The "Suspect Drive" refers to the source drive which may have data that requires being seized using the ICS-JMR Forensic product line of duplicators.. Data is transferred from the Suspect’s drive.

System Integrators

Companies which manufacture computers.

System Memory

Refers to the storage media used in an ImageMASSter or PC to hold software code. Usually implemented by DRAM.

Target Drive

The "Target Drive" refers to the drive that is used to receive data from the Source drive. Data is transferred to the Target drive.

Terabytes

A terabyte is equal to 1,099,511,627,776 bytes (2^40).

Twisted Pair

Two lines (wires) twisted around each other that are used for high speed differential data transfer.

Universal Serial Bus (USB)

The Universal Serial Bus interface defines an expansion bus which makes adding peripherals to a PC easy. USB supports plug’n’plug with dynamically loadable and unloadable drivers.

Unlock Settings

Provides the user with the function to clear the unit’s Settings password. Once the password is cleared the settings can be modified.

Upgrade Software

This menu item allows the user to upgrade the unit’s software version using the PCMCIA Flash Card.

Verify

Enabling Verify instructs the copy process to verify all data transferred from the source to the target drive(s) using the Read-Back-Verification function.

View Settings

When selected, this function will provide the user with a list of currently saved settings

WipeOut DoD

The WipeOut Department of Defense operation is designed to completely erase data from hard disk drives while meeting the U.S. Department of Defense specification DoD 5220-22M

Wipeout Pattern

The value written to each byte of each sector of a drive during a sanitizing operation.

Write Protect

Mode that prevents erasing or editing drive data.

XP

This acronym refers to the Microsoft Windows XP Operation System. XP is short for "eXPerience"

Y2k

Abbreviated as Y2k, the Year 2000 was a reported issue for IBM compatible computers using the 2-digit date stamp

Zero Down

An important feature of disaster recovery systems.

Zero Wait States

Term used to describe a computer system that runs at its maximum speed without waiting for slower components.