EasyManuals Logo

Logicube Forensic Falcon User Manual

Default Icon
168 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #8 background imageLoading...
Page #8 background image
Logicube Forensic Falcon™ User’s Manual IV
6.0.12.2.2 Username/Password ................................................................................................................ 103
6.0.13 Software Update ...................................................................................................... 103
6.0.14 Power Off ................................................................................................................. 104
7: VIEWING EXT4 FORMATTED DESTINATION DRIVES IN WINDOWS........................ 105
7.0 VIEWING EXT4 FORMATTED DESTINATION DRIVES INTRODUCTION .............................................. 105
7.0.1 Step-by-step instructions Using Ext2fsd ................................................................. 105
8: DRIVE ENCRYPTION AND DECRYPTION ................................................................ 108
8.0 DRIVE ENCRYPTION/DECRYPTION - INTRODUCTION ...................................................................... 108
8.1 ENCRYPTING A DESTINATION .................................................................................................... 109
8.1.1 Step-by-step Instructions ........................................................................................... 109
8.1.2 Using previously encrypted Destination drives ......................................................... 110
8.2 DECRYPTING A FALCON ENCRYPTED DESTINATION DRIVE WITH A FALCON ........................................ 110
8.2.1 Step-by-step Instructions ........................................................................................... 110
8.3 DECRYPTING THE DRIVE WITHOUT A FALCON ............................................................................... 112
8.3.1 Which decryption software to use? ........................................................................... 112
8.3.2 Decrypting using VeraCrypt ....................................................................................... 112
8.3.3 Decrypting using TrueCrypt ....................................................................................... 115
8.3.4 Decrypting using FreeOTFE ........................................................................................ 117
9: UPDATING THE FALCON SOFTWARE .................................................................... 121
9.0 LOADING NEW SOFTWARE ....................................................................................................... 121
9.1 SOFTWARE LOADING INSTRUCTIONS .......................................................................................... 121
9.1.1 From Network Via the web ..................................................................................... 121
9.1.2 From USB Drive Via software download ................................................................. 122
9.1.2.1 Extracting the software download on a computer with WinZip (or other third
party zip software) ........................................................................................................... 123
9.2 FIRMWARE LOADING INSTRUCTIONS .......................................................................................... 124
10: REMOTE OPERATION ........................................................................................ 125
10.0 REMOTE OPERATION - INTRODUCTION ..................................................................................... 125
10.1 WEB INTERFACE ................................................................................................................... 125
10.2 COMMAND LINE INTERFACE (CLI) ........................................................................................... 126
10.3 INSTALLING THE TELNET CLIENT IN WINDOWS ........................................................................... 126
10.3.1 Connecting via Telnet .............................................................................................. 126
10.3.2 Connecting via SSH ................................................................................................... 127
10.4 ZERO CONFIGURATION NETWORKING (ZEROCONF) .................................................................... 128
10.5 CONFIGURING THE FALCON WITH A STATIC IP ADDRESS ............................................................... 128
10.5.1 Step-by-step instructions Static IP address ........................................................... 128
10.6 COPYING USER PROFILES/CONFIGURATIONS FROM ONE FALCON TO ANOTHER ............................... 129
10.6.1 Step-by-step Copying User Profiles/Configurations ............................................. 129
11: VIEWING SOURCE AND DESTINATION DRIVES OVER A NETWORK ...................... 131
11.0 VIEWING DRIVES OVER A NETWORK - OVERVIEW ....................................................................... 131
11.1 VIEWING SOURCE OR DESTINATION DRIVES OVER THE NETWORK USING SMB ................................ 131
11.1.1 Step-by-step Viewing Source or Destination drives .............................................. 131
11.2 VIEWING SOURCE DRIVES OVER THE NETWORK USING ISCSI ........................................................ 133

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Logicube Forensic Falcon and is the answer not in the manual?

Logicube Forensic Falcon Specifications

General IconGeneral
BrandLogicube
ModelForensic Falcon
CategoryStorage
LanguageEnglish

Related product manuals