Voom Technologies, Inc. © 2004-2018 Proprietary
3 Preface
3.1 Product Contents
1 Voom Shadow 3 System
1 DC power cable (Shadow to suspect hard drive)
1 0.5m SATA Cable (Used for all configurations)
1 Auto-ranging AC Power Supply
1 Standard serial interface cable
1 User Guide
SATA Laptop Adapter Kit:
1 SATA Extension Cable
IDE Adapter Kit:
1 IDE to SATA Adapter
1 SATA to IDE Adapter
3.2 System Requirements
The Voom Shadow 3 product is designed to operate on computers that boot from
a SATA hard drive. Shadow 3 supports drives of sizes up to 2 TB. For
computers with multiple hard drives, a separate Shadow 3 unit is required for
each hard drive. Via a IDE to SATA adapter Shadow 3 may support PATA/IDE
hard drives. A separate IDE bus is required for each IDE drive to be shadowed.
3.3 Overview
The investigation of a computer hard drive is often a very time consuming
process. Because it is absolutely essential that the evidence on a suspect hard
drive not be altered in any way, investigation and analysis of the data on the hard
drive is often times done in a lab environment.
Imagine if you could boot and use the suspect computer all the while preventing
any alteration of the suspect hard drive. Voom Shadow 3 is an investigative tool
that is designed to enable
investigation of the hard drive in place
inside the
suspect computer, while preventing any alteration of the hard drive during the
investigation.
Here’s how it works. After connecting a Shadow 3 system to each hard drive on
the suspect computer, the investigator will use the suspect computer to search
the contents of the hard drive(s) using any software tool already on the computer,
including Word, Excel, File Browsers, Internet and Email browsers, picture
viewers etc... as well as view internet history, last files accessed, last files altered
– all by simply using the tools on the suspect computer.
Investigators may also
3