IMAGING
Logicube Falcon
®
-Neo User’s Manual 44
Error Granularity) then read backwards, potentially capturing data that
may not necessarily be read when skipping the entire block.
4.3.4 Hash/Verification Method
The Hash/Verification method is available in all modes. Hash is selectable only in the
following modes: Drive to File, File to File, Partition to File, and Drive to Drive.
Verification is available in all modes. This setting allows the user to set a hash and/or a
verification method.
Hash – Will hash the Source drive with the selected method. There are two, three, or four
hash algorithm options available, depending on which Imaging mode is selected:
None – No hash of the Source will be performed. This is available only when
using the following mode:
o Drive to Drive
SHA-1 – Uses the SHA-1 algorithm to hash the Source. This is available in the
following modes:
o Drive to Drive
o Drive to File
o File to File
o Partition to File
o Net Traffic to File
SHA-256 – Uses the SHA-256 algorithm to hash the Source. This is available in
the following modes:
o Drive to Drive
o When using DD or DMG methods in Drive to File
o Partition to File
o Net Traffic to File
MD5 – Uses the MD5 algorithm to hash the Source. This is available in the
following modes:
o Drive to Drive
o Drive to File
o File to File
o Partition to File
o Net Traffic to File
SHA-1+MD5 – Dual Hash. Uses both SHA-1 and MD5 algorithms to hash the
Source. This is available when using the following modes:
o Drive to File