Voom Technologies, Inc. © 2004-2018 Proprietary
install any forensic software they choose to assist in the investigation.
With Shadow, all writes that occur during the investigative process are written to
the internal Shadow hard drive. The suspect hard drive is not altered in any way
during the investigative process.
System operating integrity is maintained because the Shadow remembers where
the writes occurred, and reads from the Shadow drive whenever the suspect
computer reads data from a block that the Shadow has written.
4