Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Encase 4.2 read

Posted on 2014-02-26
2
Medium Priority
?
520 Views
Last Modified: 2014-02-27
How long Encase 4.2 will spend to read 500Gb HD ?
0
Comment
Question by:Jose Bredariol
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 915 total points
ID: 39891859
Pretty to tough to estimate just as it is, but the below has benchmark information which may want to further infer and extrapolate the performance. There are factor on configuration and the machine running encase appl itself

"EnCase Processor Hardware and Configuration Recommendations"
> Device size is not the primary factor that affects the time it takes to process an evidence file; the main factor is the number and type of entries. Running the modules in their default configurations did not have a large impact on the overall processing time. However, modifying these settings can have a large effect on performance.


(see pg 6) on the performance table summarised based on the configuration set
http://www.dataexpert.nl/files/downloads/EnCase%20Processor%20Hardware%20and%20Configuration%20Recommendations.pdf

"Quantifying Hardware Selection in an EnCase v7 Environment"
> Based on analysing disk images (created with Tableau Imager) consisted of approximately 240 GB of uncompressed (DD) data and 60GB of compressed (E01) data.
> Using Windows Perfmon, an analysis of the disk activity indicated that both the O/S and NSRL KFF Database channels, as well as the Evidence and Case channels, could be combined with negligible performance impact.

(check out pg 16 onwrds on the stats)
http://www.digitalintelligence.com/files/EnCase7_Recommendations.pdf
0
 

Author Closing Comment

by:Jose Bredariol
ID: 39892709
Thanks
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
Integration Management Part 2
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question