skip navigation

Justinfo Subscribe to Stay Informed

Add your conference to our Justice Events calendar


NCJRS Abstract


Subscribe to Stay Informed
Want to be in the know? JUSTINFO is a biweekly e-newsletter containing information about new publications, events, training, funding opportunities, and Web-based resources available from the NCJRS Federal sponsors. Sign up to get JUSTINFO in your inbox.

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
NCJ Number: NCJ 209831     Find in a Library
Title: Test Results for Software Write Block Tools: PDBLOCK Version 1.02 (PDB_LITE)
  Document URL: PDF 
Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
Date Published: 06/2005
Page Count: 37
  Annotation: This report presents results from testing the software write block tool PDBLOCK Version 1.02 (PDB_LITE) against Software Write Block Tool Specification and Test Plan Version 3.0.
Abstract: Software Write Block Tool Specification and Test Plan Version 3.0 requires that a top-level software write block tool not allow a protected computer drive to be changed, not prevent obtaining any information from or about any drive, and not prevent any operations to a drive that is not protected. For all test cases run on PDB_LITE, which is a product of Digital Intelligence, Inc., the tool always blocked all write commands sent to a protected drive; however, the tool did not block some commands from the configuration and miscellaneous categories that were either undefined (invalid) or outmoded and not routinely used by current software. These commands in current BIOS implementations do not write to a hard drive, but in the future they could be defined so that they would change the contents or accessibility of a protected drive; therefore, in the test specification, these commands are included in categories that should be blocked. For all test cases run, the tool always allowed commands to obtain information from protected drives. Finally, the tool always allowed any command to access any unprotected drives for all test cases run. Extensive tabular data
Main Term(s): Computer related crime
Index Term(s): Computer privacy and security ; Computer software ; Computer evidence ; NIJ grant-related documents
Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
Grant Number: 2003-IJ-R-029
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America
Type: Test/Measurement
Country: United States of America
Language: English
Note: NIJ Special Report; downloaded November 8, 2005.
  To cite this abstract, use the following link:

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.