This menu function provides a method to add additional software capabilities to unit with purchased software options.
Located on the front panel of the ImageMASSter units. The four Arrow buttons are used to highlight the display’s menu items.
Provides a hard copy containing detailed information about the operation performed. The Audit Trail feature is available for Forensic applications.
The Auto Run function instructs the operation to run continuously. The operation will repeat until the operation is manually stopped. This function can be used for quality assurance purposes.
The "Bad Sector" menu function allows the user to select the method in which the operation handles bad sectors when they are detected on drives.
Refers to a quantity of sectors which are transferred at one time. Typically a block will consist of 256 sectors.
This Operation Mode provides the user with the ability to select up to 10 ranges of sectors to be copied from the source drive to the target drive(s). The function is implemented by using a sector-by-sector copy method.
Compact Disc Read Only Memory is a compact disc format used to hold text, graphics and hi-fidelity stereo sound.
A cluster is considered a quantity of sectors. The quantity of sectors that make up a cluster is assigned by the File System in use. Files are allocated to clusters in the File Allocation Table.
The investigation of a computer system believed to be involved in a crime.
The three control buttons, located on the front panel and to the right of the duplicator’s display, provides the controls to select from the unit’s various menu items.
A person who breaks into a computer system without authorization with the purpose of damaging it or stealing information from it.
Cyclical Redundancy Checking is an error checking technique used to ensure the accuracy of transmitting digital data. It is used to create a 32-bit signature for stored data.
Crime committed on the information superhighway, typically having to do with online fraud.
The Database function provides the ability to store a record of the operations performed. The record includes information such as drive model, results of operation, and unit information.
The "Destination Drive" refers to the drive that is used to receive data from the Source drive. Data is transferred to the Destination drive.
DCO allows systems to modify the apparent features provided by a hard disk drive device. It provides a set of commands that allow a utility program to modify some of the commands, modes, and feature sets supported by the drive.
Refers to the transfer of data using two lines (wires) between the driver and receiver.
Distributors - Tech Notes (for distr. only)
Dynamic Random Access Memory refers to the physical storage media used to hold software code.
The Drive Info menu function provides a method to view important drive information such as Model, Capacity, and Serial Number.
Digital VideoDisc or Digital Versatile Disc is an optical digital disc used to hold movies and data.
Method of detecting and then correcting errors. Typically used to correct Soft Errors when reading from hard drives or CD media.
The "Evidence Drive" refers to the destination drive. Data is transferred to the Evidence drive.
The File Allocation Table is used by the Operating System to allocate clusters
File system refers to the method in which the Operating System allocates clusters. Common File Systems include FAT16, FAT32, NTFS, and HPFS.
The IEEE 1394 standard for the High Performance Serial Bus, also called FireWire, is a serial data transfer protocol and interconnection system.
A small module that contains flash memory such as a PC Card, CompactFlash or SmartMedia.
It provides a variety of tools for investigating a Suspect’s PC. It may include the abilities to copy the Suspect’s drive or to analyze the drive’s data.
Format defines the logical structures on the drive’s partition(s) and places at the start of the disk any necessary operating system files
Refers to a billion of bytes or a thousand Megabytes (2^30).
Often refers to writing a small program or adding code to an existing program to solve a problem in a hurry. Hacking has also become synonymous with writing code to damage a computer via viruses, or stealing credit card information etc.
The main storage medium in computers and other systems such MP3 players. Hard Disk Drives are composed of one or more spinning platters which can be written to or read from.
Hashing is a process that calculates a "unique signature" value for the contents of an entire drive.
This menu item allows disabling or enabling of the drive’s Cache. Today’s drives are designed with high speed memory or Cache. When disabled, the drive’s Cache is not used during data transfer. Disabling HD Cache will result in slower transfer rates.
This menu item provides both an automatic and manual method of determining a number of drive geometry related parameters to be used to configure the target drives.
This menu item provides the user with the flexibility of selecting various hard disk drive duplication settings.
A Hidden FAT32 partition can be created using 3rd party utilities. In effect these utilities change the standard known signature of the partition to a value unknown by the operating system, thereby "hiding" the partition.
A Hidden NTFS partition can be created using 3rd party utilities. In effect these utilities change the standard known signature of the partition to a value unknown by the operating system, thereby "hiding" the partition.
HPA is defined as a reserved area for data storage. This area is hidden from the operating system and file system, and is normally used for specialized applications
This menu setting when enabled instructs IQCOPY to transfer an image of the source drive’s partition and boot sector information to the target drive without the need of updating this information once transferred.
Image Copy performs a sector by sector copy operation. This mode can be adjusted to copy between 1% and 100% of the source drive.
Located in the Options submenu, Installed Options list all options currently installed in the ImageMASSter.
IQCOPY is an intelligent copy method which copies only allocated clusters. By ignoring unallocated clusters, the time it takes to copy a drive can be greatly reduced.
Jitter refers to the slight movement of a signal in time or phase that can induce errors and loss of synchronization in high-speed synchronous data transfer.
A word used in a text search. For example while analyzing data during a forensic search.
Refers to a thousand of bytes.
LinuxDD format is a method of capturing a Suspect’s drive’s data where the entire image of the Suspect’s drive is segmented and saved in one or more separate files inside a FAT32 partition on the Evidence drive.
Provides the user with the function to password protect the unit’s currently stored settings.
Logging provides the user with the capability of displaying and storing event log information.
This function provides the user with the capability of saving multiple user defined settings.
Message Digest 5 is a popular hashing algorithm used to create digital signatures. It is used to create a 128-bit signature for stored data.
Contains a record of the events performed for a given operation.
The MultiMASSter Creator (MMC) function allows adding loads to a drive to be used as a MultiMASSter drive.
The MultiMASSter Option provides MultiMASSter Creator capabilities which allow storage of multiple software loads on a single source drive. The Option also allows selecting individual loads to copy from the MultiMASSter drive to a destination drive.
This indicates support for copying the "suspend partition" structure, also known as the "Phoenix" partition.
A notebook drive adapter enables the ImageMASSter to support a variety of notebook models via direct connection of the proprietary notebook drive interface to the ImageMASSter interface.
NT File System is a file system for Windows NT, 2000 and XP operating systems. It has an improved performance over FAT32 and is required in order to implement numerous security and administrative features in the OS.
It is a program that supplies the interface between the user and the computer.
Options are considered software functions which are not available with the standard ImageMASSter software. Options require purchasing and can be added to an ImageMASSter unit to add additional capabilities and features.
Parallel port is an interface that lets a computer transmit data to another device using parallel transmission; that is, several bits sent simultaneously over separate wires.
This menu item provides to ability to select among a choice of partition scaling options.
Personal Computer Memory Card International Association (PCMCIA) is an organization that defines standards for connecting peripherals to small computers such as notebooks and laptops. The PCMCIA bus (also known as PC Card and Cardbus) is a widely accepted standard.
The PCMCIA-ATA adapter allows duplication of PCMCIA-ATA Flash devices using the ICS ImageMASSter product line.
The PCMCIA-SCSI adapter allows duplication of SCSI drives using the ICS ImageMASSter Hand-Held line of duplication products.
The % of Disk copy method copies both allocated and unallocated clusters of a drive. This copy mode implements a sector-by-sector copy method.
When referring to a database or search, it is a field or option used to locate information within a database or other location
Fast and efficient loading of an Operating System and application software simultaneously to multiple drives or computers
Read-Back-Verification is the process of reading back written data and comparing it to the originally read data.
This menu item when enabled provides a quick method to check a target drive’s remaining area for surface defects after completing an IQCOPY operation.
This port is used to upgrade the ImageMASSter duplicators with current software as well as for connecting a serial printer.
Sanitize refers to the process of clearing a drive of all previously stored data. The WipeOut function can be used to sanitize a drive.
The smallest storage area of a formatted hard disk drive.
A serial port is an interface by which a computer can transmit data to another device using serial transmission; that is one bit at a time.
A serial printer is a printer that connects to a computer's serial port.
This menu item provides the user with functions to view and manage settings.
Secure Hash Algorithm-1 is a popular hashing algorithm used to create digital signatures. It is used to create a 160-bit signature for stored data.
Single Capture is an ImageMASSter Forensic copy mode that performs a sector-by-sector copy operation.
The option to ignore and skip bad sectors encountered during the duplication process.
The option to ignore and skip a block of bad sectors encountered during the duplication process.
A data error that can be corrected with Error Correction Code (ECC).
Loadable code that creates an application.
The Source Drive refers to the drive containing data which needs to be duplicated using the ICS ImageMASSter product line of duplicators.
The Speed menu item provides the user with the flexibility of selecting the speed at which the operation will run under.
Located on the ImageMASSter control panel, the Status LEDs provide an indication that an operation is in process or has been completed.. A blinking Status LED indicates that an operation is still in process.
Usually refers to the hard disk drive in a computer system.
A small autonomous piece of software code within the main source code that is called to perform a specific function.
The "Suspect Drive" refers to the source drive which may have data that requires being seized using the ICS Forensic product line of duplicators.. Data is transferred from the Suspect’s drive.
Companies which manufacture computers.
Refers to the storage media used in an ImageMASSter or PC to hold software code. Usually implemented by DRAM.
The "Target Drive" refers to the drive that is used to receive data from the Source drive. Data is transferred to the Target drive.
A terabyte is equal to 1,099,511,627,776 bytes (2^40).
Two lines (wires) twisted around each other that are used for high speed differential data transfer.
The Universal Serial Bus interface defines an expansion bus which makes adding peripherals to a PC easy. USB supports plug’n’plug with dynamically loadable and unloadable drivers.
Provides the user with the function to clear the unit’s Settings password. Once the password is cleared the settings can be modified.
This menu item allows the user to upgrade the unit’s software version using the PCMCIA Flash Card.
Enabling Verify instructs the copy process to verify all data transferred from the source to the target drive(s) using the Read-Back-Verification function.
When selected, this function will provide the user with a list of currently saved settings
The WipeOut Department of Defense operation is designed to completely erase data from hard disk drives while meeting the U.S. Department of Defense specification DoD 5220-22M
The value written to each byte of each sector of a drive during a sanitizing operation.
Mode that prevents erasing or editing drive data.
This acronym refers to the Microsoft Windows XP Operation System. XP is short for "eXPerience"
Abbreviated as Y2k, the Year 2000 was a reported issue for IBM compatible computers using the 2-digit date stamp
An important feature of disaster recovery systems.
Term used to describe a computer system that runs at its maximum speed without waiting for slower components.
All prices are in USD.