Solved

Encase 4.2 read

Posted on 2014-02-26
2
498 Views
Last Modified: 2014-02-27
How long Encase 4.2 will spend to read 500Gb HD ?
0
Comment
Question by:Jose Bredariol
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 305 total points
ID: 39891859
Pretty to tough to estimate just as it is, but the below has benchmark information which may want to further infer and extrapolate the performance. There are factor on configuration and the machine running encase appl itself

"EnCase Processor Hardware and Configuration Recommendations"
> Device size is not the primary factor that affects the time it takes to process an evidence file; the main factor is the number and type of entries. Running the modules in their default configurations did not have a large impact on the overall processing time. However, modifying these settings can have a large effect on performance.


(see pg 6) on the performance table summarised based on the configuration set
http://www.dataexpert.nl/files/downloads/EnCase%20Processor%20Hardware%20and%20Configuration%20Recommendations.pdf

"Quantifying Hardware Selection in an EnCase v7 Environment"
> Based on analysing disk images (created with Tableau Imager) consisted of approximately 240 GB of uncompressed (DD) data and 60GB of compressed (E01) data.
> Using Windows Perfmon, an analysis of the disk activity indicated that both the O/S and NSRL KFF Database channels, as well as the Evidence and Case channels, could be combined with negligible performance impact.

(check out pg 16 onwrds on the stats)
http://www.digitalintelligence.com/files/EnCase7_Recommendations.pdf
0
 

Author Closing Comment

by:Jose Bredariol
ID: 39892709
Thanks
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question