Glossary

Add Option
This menu function provides a method to add additional software capabilities to unit with purchased software options.
Arrow buttons
Located on the front panel of the ImageMASSter units. The four Arrow buttons are used to highlight the display’s menu items.
Audit Trail
Provides a hard copy containing detailed information about the operation performed. The Audit Trail feature is available for Forensic applications.
Auto Run
The Auto Run function instructs the operation to run continuously. The operation will repeat until the operation is manually stopped. This function can be used for quality assurance purposes.
Bad Sector
The "Bad Sector" menu function allows the user to select the method in which the operation handles bad sectors when they are detected on drives.
Block
Refers to a quantity of sectors which are transferred at one time. Typically a block will consist of 256 sectors.
Block Map
This Operation Mode provides the user with the ability to select up to 10 ranges of sectors to be copied from the source drive to the target drive(s). The function is implemented by using a sector-by-sector copy method.
CD-ROM
Compact Disc Read Only Memory is a compact disc format used to hold text, graphics and hi-fidelity stereo sound.
Cluster
A cluster is considered a quantity of sectors. The quantity of sectors that make up a cluster is assigned by the File System in use. Files are allocated to clusters in the File Allocation Table.
Computer Forensic
The investigation of a computer system believed to be involved in a crime.
Control Buttons
The three control buttons, located on the front panel and to the right of the duplicator’s display, provides the controls to select from the unit’s various menu items.
Cracker
A person who breaks into a computer system without authorization with the purpose of damaging it or stealing information from it.
CRC32
Cyclical Redundancy Checking is an error checking technique used to ensure the accuracy of transmitting digital data. It is used to create a 32-bit signature for stored data.
Cyber crime
Crime committed on the information superhighway, typically having to do with online fraud.
Database
The Database function provides the ability to store a record of the operations performed. The record includes information such as drive model, results of operation, and unit information.
Destination Drive
The "Destination Drive" refers to the drive that is used to receive data from the Source drive. Data is transferred to the Destination drive.
Device Configuration Overlay (DCO)
DCO allows systems to modify the apparent features provided by a hard disk drive device. It provides a set of commands that allow a utility program to modify some of the commands, modes, and feature sets supported by the drive.
Differential Data Transfer
Refers to the transfer of data using two lines (wires) between the driver and receiver.
Distributors - Tech Notes (for distr. only)
Distributors - Tech Notes (for distr. only)
DRAM
Dynamic Random Access Memory refers to the physical storage media used to hold software code.
Drive Information
The Drive Info menu function provides a method to view important drive information such as Model, Capacity, and Serial Number.
DVD
Digital VideoDisc or Digital Versatile Disc is an optical digital disc used to hold movies and data.
Error Correction Code (ECC)
Method of detecting and then correcting errors. Typically used to correct Soft Errors when reading from hard drives or CD media.
Evidence Drive
The "Evidence Drive" refers to the destination drive. Data is transferred to the Evidence drive.
FAT
The File Allocation Table is used by the Operating System to allocate clusters
File System
File system refers to the method in which the Operating System allocates clusters. Common File Systems include FAT16, FAT32, NTFS, and HPFS.
Firewire IEEE 1394B
The IEEE 1394 standard for the High Performance Serial Bus, also called FireWire, is a serial data transfer protocol and interconnection system.
Flash Card
A small module that contains flash memory such as a PC Card, CompactFlash or SmartMedia.
Forensic software
It provides a variety of tools for investigating a Suspect’s PC. It may include the abilities to copy the Suspect’s drive or to analyze the drive’s data.
Format
Format defines the logical structures on the drive’s partition(s) and places at the start of the disk any necessary operating system files
Giga bytes
Refers to a billion of bytes or a thousand Megabytes (2^30).
Hack
Often refers to writing a small program or adding code to an existing program to solve a problem in a hurry. Hacking has also become synonymous with writing code to damage a computer via viruses, or stealing credit card information etc.
Hard Disk Drive
The main storage medium in computers and other systems such MP3 players. Hard Disk Drives are composed of one or more spinning platters which can be written to or read from.
HASHING
Hashing is a process that calculates a "unique signature" value for the contents of an entire drive.
HD Cache
This menu item allows disabling or enabling of the drive’s Cache. Today’s drives are designed with high speed memory or Cache. When disabled, the drive’s Cache is not used during data transfer. Disabling HD Cache will result in slower transfer rates.
HD Geometry
This menu item provides both an automatic and manual method of determining a number of drive geometry related parameters to be used to configure the target drives.
HD Handling
This menu item provides the user with the flexibility of selecting various hard disk drive duplication settings.
Hidden FAT32 Partition
A Hidden FAT32 partition can be created using 3rd party utilities. In effect these utilities change the standard known signature of the partition to a value unknown by the operating system, thereby "hiding" the partition.
Hidden NTFS Partition
A Hidden NTFS partition can be created using 3rd party utilities. In effect these utilities change the standard known signature of the partition to a value unknown by the operating system, thereby "hiding" the partition.
Host Protected Area (HPA)
HPA is defined as a reserved area for data storage. This area is hidden from the operating system and file system, and is normally used for specialized applications
Identical Mode
This menu setting when enabled instructs IQCOPY to transfer an image of the source drive’s partition and boot sector information to the target drive without the need of updating this information once transferred.
Image Copy
Image Copy performs a sector by sector copy operation. This mode can be adjusted to copy between 1% and 100% of the source drive.
Installed options
Located in the Options submenu, Installed Options list all options currently installed in the ImageMASSter.
IQCOPY
IQCOPY is an intelligent copy method which copies only allocated clusters. By ignoring unallocated clusters, the time it takes to copy a drive can be greatly reduced.
Jitter
Jitter refers to the slight movement of a signal in time or phase that can induce errors and loss of synchronization in high-speed synchronous data transfer.
Keyword
A word used in a text search. For example while analyzing data during a forensic search.
Kilobytes
Refers to a thousand of bytes.
LinuxDD
LinuxDD format is a method of capturing a Suspect’s drive’s data where the entire image of the Suspect’s drive is segmented and saved in one or more separate files inside a FAT32 partition on the Evidence drive.
Lock Settings
Provides the user with the function to password protect the unit’s currently stored settings.
Logging
Logging provides the user with the capability of displaying and storing event log information.
Manage Settings
This function provides the user with the capability of saving multiple user defined settings.
MD5
Message Digest 5 is a popular hashing algorithm used to create digital signatures. It is used to create a 128-bit signature for stored data.
Message Log
Contains a record of the events performed for a given operation.
MMC Mode
The MultiMASSter Creator (MMC) function allows adding loads to a drive to be used as a MultiMASSter drive.
MultiMASSter Option
The MultiMASSter Option provides MultiMASSter Creator capabilities which allow storage of multiple software loads on a single source drive. The Option also allows selecting individual loads to copy from the MultiMASSter drive to a destination drive.
Notebook "Sleep Partition" Support
This indicates support for copying the "suspend partition" structure, also known as the "Phoenix" partition.
Notebook Drive Adapter
A notebook drive adapter enables the ImageMASSter to support a variety of notebook models via direct connection of the proprietary notebook drive interface to the ImageMASSter interface.
NTFS
NT File System is a file system for Windows NT, 2000 and XP operating systems. It has an improved performance over FAT32 and is required in order to implement numerous security and administrative features in the OS.
Operating System
It is a program that supplies the interface between the user and the computer.
Options
Options are considered software functions which are not available with the standard ImageMASSter software. Options require purchasing and can be added to an ImageMASSter unit to add additional capabilities and features.
Parallel Port
Parallel port is an interface that lets a computer transmit data to another device using parallel transmission; that is, several bits sent simultaneously over separate wires.
Partition Scaling
This menu item provides to ability to select among a choice of partition scaling options.
PCMCIA
Personal Computer Memory Card International Association (PCMCIA) is an organization that defines standards for connecting peripherals to small computers such as notebooks and laptops. The PCMCIA bus (also known as PC Card and Cardbus) is a widely accepted standard.
PCMCIA-ATA adapter
The PCMCIA-ATA adapter allows duplication of PCMCIA-ATA Flash devices using the ICS-JMR ImageMASSter product line.
PCMCIA-SCSI adapter
The PCMCIA-SCSI adapter allows duplication of SCSI drives using the ICS-JMR ImageMASSter Hand-Held line of duplication products.
Percentage of Disk
The % of Disk copy method copies both allocated and unallocated clusters of a drive. This copy mode implements a sector-by-sector copy method.
Query
When referring to a database or search, it is a field or option used to locate information within a database or other location
Rapid Deployment
Fast and efficient loading of an Operating System and application software simultaneously to multiple drives or computers
Read-Back Verification
Read-Back-Verification is the process of reading back written data and comparing it to the originally read data.
Remainder
This menu item when enabled provides a quick method to check a target drive’s remaining area for surface defects after completing an IQCOPY operation.
RJ-45 connection port
This port is used to upgrade the ImageMASSter duplicators with current software as well as for connecting a serial printer.
Sanitize
Sanitize refers to the process of clearing a drive of all previously stored data. The WipeOut function can be used to sanitize a drive.
Sector
The smallest storage area of a formatted hard disk drive.
Serial Port
A serial port is an interface by which a computer can transmit data to another device using serial transmission; that is one bit at a time.
Serial Printer
A serial printer is a printer that connects to a computer's serial port.
Set Menu
This menu item provides the user with functions to view and manage settings.
SHA-1
Secure Hash Algorithm-1 is a popular hashing algorithm used to create digital signatures. It is used to create a 160-bit signature for stored data.
Single Capture
Single Capture is an ImageMASSter Forensic copy mode that performs a sector-by-sector copy operation.
Skip Bad Sectors
The option to ignore and skip bad sectors encountered during the duplication process.
Skip Block
The option to ignore and skip a block of bad sectors encountered during the duplication process.
Soft Error
A data error that can be corrected with Error Correction Code (ECC).
Software
Loadable code that creates an application.
Source Drive
The Source Drive refers to the drive containing data which needs to be duplicated using the ICS-JMR ImageMASSter product line of duplicators.
Speed
The Speed menu item provides the user with the flexibility of selecting the speed at which the operation will run under.
Status Light
Located on the ImageMASSter control panel, the Status LEDs provide an indication that an operation is in process or has been completed.. A blinking Status LED indicates that an operation is still in process.
Storage
Usually refers to the hard disk drive in a computer system.
Sub-routine
A small autonomous piece of software code within the main source code that is called to perform a specific function.
Suspect’s Drive
The "Suspect Drive" refers to the source drive which may have data that requires being seized using the ICS-JMR Forensic product line of duplicators.. Data is transferred from the Suspect’s drive.
System Integrators
Companies which manufacture computers.
System Memory
Refers to the storage media used in an ImageMASSter or PC to hold software code. Usually implemented by DRAM.
Target Drive
The "Target Drive" refers to the drive that is used to receive data from the Source drive. Data is transferred to the Target drive.
Terabytes
A terabyte is equal to 1,099,511,627,776 bytes (2^40).
Twisted Pair
Two lines (wires) twisted around each other that are used for high speed differential data transfer.
Universal Serial Bus (USB)
The Universal Serial Bus interface defines an expansion bus which makes adding peripherals to a PC easy. USB supports plug’n’plug with dynamically loadable and unloadable drivers.
Unlock Settings
Provides the user with the function to clear the unit’s Settings password. Once the password is cleared the settings can be modified.
Upgrade Software
This menu item allows the user to upgrade the unit’s software version using the PCMCIA Flash Card.
Verify
Enabling Verify instructs the copy process to verify all data transferred from the source to the target drive(s) using the Read-Back-Verification function.
View Settings
When selected, this function will provide the user with a list of currently saved settings
WipeOut DoD
The WipeOut Department of Defense operation is designed to completely erase data from hard disk drives while meeting the U.S. Department of Defense specification DoD 5220-22M
Wipeout Pattern
The value written to each byte of each sector of a drive during a sanitizing operation.
Write Protect
Mode that prevents erasing or editing drive data.
XP
This acronym refers to the Microsoft Windows XP Operation System. XP is short for "eXPerience"
Y2k
Abbreviated as Y2k, the Year 2000 was a reported issue for IBM compatible computers using the 2-digit date stamp
Zero Down
An important feature of disaster recovery systems.
Zero Wait States
Term used to describe a computer system that runs at its maximum speed without waiting for slower components.