I couldn't get the Deft 5.1 ISO to boot from CD, let alone USB. I download 5.x and that worked fine.
Grant
I'm not in the team and therefore not directly involved in the pre-release testings.
i played my tests and validated the tool before using it of course, and it never happened to me that any drive was altered after having booted the system with deft.
NTFS devices shouldn't be an issue couse the NTFS-3g driver runs in user space afaik, about the linux FS it didn't happen to me, i've hashed the drive before and after having used deft and the hashes was matching.
if you have any experience of such issues i think the best thing to do would be to report it directly to the devs
Is anyone aware of this information about Deft being NOT forensically sound
DEFT developers fixed Ext recovery issues long time ago. Currently, DEFT only runs a code from connected HDDs under very rare conditions )
Currently, DEFT only runs a code from connected HDDs under very rare conditions )
That wouldn't be
CAINE will be fixing this in version 2.0. I don't know about DEFT (which was also identified as vulnerable).
Paul )
A number of debian based systems that use casper scripts are vulnerable.
grml silently included the fix in the recent version ( http//
DEFT developers received a preliminary patch in January 2010, but didn't include it in the release for some reason. CAINE team already developed a patch for CD version only. And no updates from developers of other distros )
Yes, it's not news for those who test these CDs. Someone who was putting out their new CD put a marketing blitz (what I call it) out about it and folks who weren't testing were caught unaware. Interestingly some Slackware-based CDs did not exhibit this behavior. 😉
Cheers!
farmerdude
Caine 2.0 is patched!
http//
Update removed - pointless posting oops
Paul