Bibliography

[AS1] Apple. Safari, ver. 5.0.5 for Windows [software]. Available: http://www.apple.com/safari. [14 May 2011]
[AZ1] A. Ziem. BleachBit, ver. 0.8.7 [software]. Available: http://bleachbit.sourceforge.net. [7 Mar. 2011].
[BF1] B. Fonseca. "Shuttle Columbia's hard drive data recovered from crash site." ComputerWorld, 7 May 2008. Available: http://www.computerworld.com/s/article/9083718/Shuttle_i_Columbia_s_i_hard_drive_data_recovered_from_crash_site_. [19 Apr. 2011]
[BN1] B. Nelson et al. Guide to Computer Forensics and Investigations (4th edition). Boston, MA: Cengage Learning, 2010.
[BW1] B. Wilson. "Alternate Data Streams (ADS): Hiding In Plain Site." Available: http://www.ethicalhacker.net/content/view/115/24. [10 Mar. 2011]
[DB1] D. Bullock. "DriveSlag - Complete Hard Drive Data Destruction" [Blog]. Available: http://eecue.com/c/driveslag/index.php. [21 Apr. 2011]
[DC1] D. Cheung, SEIS 722. Class Lectures, Topic: "Computer Forensics." University of St. Thomas, St. Paul, MN, Spring semester 2011.
[DP1] D. Parker. "Windows NTFS Alternate Data Streams" [PDF document]. Available: http://www.symantec.com/connect/articles/windows-ntfs-alternate-data-streams. [10 Mar. 2011]
[FF1] Mozilla. Firefox, ver. 4.01 for Windows [software]. Available: http://www.mozilla.com. [14 May 2011]
[FH1] F. Heyne Software. LADS, ver. 4.10 [software]. Available: http://www.heysoft.de/en/software/lads.php. [10 Mar. 2011]
[GC1] Google. Chrome, ver. 11.0.696.68 for Windows [software]. Available: http://www.google.com/chrome. [14 May 2011]
[IE1] Microsoft. Internet Explorer, ver. 9 [software]. Available: http://windows.microsoft.com/en-US/internet-explorer/downloads/ie. [14 May 2011]
[JL1] J. Low et al. Eraser, ver. 6.0.8 [software]. Available: http://eraser.heidi.ie. [7 Mar. 2011].
[MB1] M. Brown. "Toshiba announces self-encrypting hard drives." Wired. Available: http://www.wired.co.uk/news/archive/2011-04/14/toshiba-self-encrypting-drive. [14 Apr. 2011].
[MF1] Rapid7 LLC. Metasploit Framework, ver. 3.6.0 [software]. Available: http://www.metasploit.com. [22 Apr. 2011]
[MH1] M. Hörz. HxD, ver. 1.7.7.0 [software]. Available: http://mh-nexus.de. [7 Mar. 2011].
[MR1] M. Russinovich. SDelete, ver. 1.5.1 [software]. Available: http://technet.microsoft.com/en-us/sysinternals/bb897443. [7 Mar. 2011].
[MS1] Microsoft. "Overview of FAT, HPFS, and NTFS File Systems." [web page]. Available: http://support.microsoft.com/kb/100108. [7 Mar. 2011]
[PD1] P. Dick. "The Minority Report" [short story], Fantastic Universe, Jan. 1956, pp. 4-36.
[RK1] R. Kissel et al. "Guidelines for Media Sanitization." Gaithersburg: Computer Security Division, National Institute of Standards and Technology. 2006.
[SB1] S. Berinato. "The Rise of Anti-Forensics." CSO. Available: http://www.csoonline.com/article/221208/the-rise-of-anti-forensics, June 2007.
[SE1] Security Engineered Machinery. "Hard Drive Destroyers" [web page]. Available: http://www.semshred.com/content1532. [26 Apr. 2011]
[TC1] TrueCrypt. "Plausible Deniability" [web page]. Available: http://www.truecrypt.org/docs/?s=plausible-deniability. [20 Apr. 2011]
[TC2] TrueCrypt. "Hidden Volume" [web page]. Available: http://www.truecrypt.org/hiddenvolume. [20 Apr. 2011]
[TO1] Toshiba. "Toshiba announces Wipe technology for self-encrypting disk drives" [PDF document]. Available: cdastaging.tacp.toshiba.com/techdocs/WIPE_Tech_Release.pdf. [14 Apr. 2011]
[TT1] T. Tempelmann. iBored: the Block Oriented Editor, ver. 1.1.5 [software]. Available: http://apps.tempel.org/iBored. [7 Mar. 2011]
[WD1] Western Digital. "Advanced Format Technology White Paper." [PDF document]. Available: http://www.wdc.com/wdproducts/library/?id=216&type=87. [2 Mar. 2011]