skip navigation

Add your conference to our Justice Events calendar


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection. To conduct further searches of the collection, visit the NCJRS Abstracts Database. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

  NCJ Number: NCJ 209833   Add to Shopping cart   Find in a Library
  Title: Test Results for Software Write Block Tools: PDBLOCK Version 2.10
  Document URL: PDF 
  Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
  Date Published: 06/2005
  Page Count: 93
  Annotation: This report presents findings from testing the software write block tool PDBLOCK Version 2.10 against Software Write Block Tool Specification and Test Plan Version 3.0.
  Abstract: The Software Write Block Tool Specification and Test Plan Version 3.0 requires that a top-level software write block tool not allow a protected drive to be changed, not prevent obtaining any information from or about any drive, and not prevent any operations to a drive that is not protected. For all test cases run, the PD Block Version 2.10, a product of Digital Intelligence, Inc., blocked all commands from the write category sent to a protected drive; however, the tool did not block some commands from the miscellaneous category that were either undefined (invalid) or outmoded and not routinely used by current software. The tool only blocked three commands in the miscellaneous category: command code 0x1A, 0x22, and 0xED. The unblocked commands in current BIOS implementations do not write to a hard drive, but in the future they could be defined so they would change the contents or accessibility of a protected drive; therefore, in the test specification, these commands are included in categories that should be blocked. For all test cases run, the tool always allowed commands to obtain information from any protected drive. The tool always allowed any command to access any unprotected drives for all test cases run; however, for some test cases run with five drives, the fifth drive was protected even though it was not so designated. Extensive data tables
  Main Term(s): Computer software
  Index Term(s): Computer aided operations ; Computer privacy and security ; Computer related crime ; Computer aided investigations ; NIJ grant-related documents
  Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
  Grant Number: 2003-IJ-R-029
  Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America
  Type: Test/Measurement
  Country: United States of America
  Language: English
  Note: NIJ Special Report; downloaded November 8, 2005.
  To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.