{"id":1148,"date":"2016-07-12T10:48:50","date_gmt":"2016-07-12T10:48:50","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=1148"},"modified":"2024-12-11T19:14:41","modified_gmt":"2024-12-11T19:14:41","slug":"software-write-blockers-overview","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/","title":{"rendered":"Software Write Blockers: DOS, Linux, and Windows Tools"},"content":{"rendered":"<p>In this article we\u2019re going to talk about different types of software write blockers and how they are used in <a href=\"https:\/\/www.digitalforensics.com\/digital-forensics\/computer-forensics\">computer forensics<\/a>.<br \/>\n<!--more--><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Linux_write_blockers\"><\/span>Linux write blockers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Unfortunatelly, we can tell you nothing about this type of write blockers. A lot of examiners think that they are useless, because one of default Linux features is mounting drives in &#8220;read only&#8221; mode. But some researchers found bugs in Linux kernel code, due to which attached drives could be available for writing operations (despite the fact they are connected in &#8220;read only&#8221; mode) [1]. So, because of such bugs, some Linux-based forensic Live-CDs mount attached drives in writable mode.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"DOS_write_blockers\"><\/span>DOS write blockers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Microsoft DOS operating system turns to drives via\u00a0Interrupt 13, Interrupt 21 and similar. To block writing operations, an examiner must block these interrupts.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"PDBLOCK\"><\/span>PDBLOCK<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>PDBLOCK (Physical Drive BLOCKer, by Digital Intelligence Corporate) &#8211; the most interesting thing about this write blocker: you can still buy it for 34.95$ [2]. According to its developers, this piece of software can block writing operations in different DOS versions (DOS 6.22, DOS 7.1) and old Windows versions (Windows 3.1 and Windows 95).<\/p>\n<h4><span class=\"ez-toc-section\" id=\"RCMP_HDL\"><\/span>RCMP HDL<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>You could see RCMP HDL software write blocker in\u00a0National Institute of Standards and Technology (NIST) testing reports. Unfortunatelly, we couldn&#8217;t buy it or got it as LE officers. We have the same situation with Safeback 2. In a number of computer forensics books (for example, Incident Response &amp; Computer Forensics by Jason T. Luttgens, Matthew Pepe, Kevin Mandia) Safeback 2 is described as the most common utility for drives imaging. But we could neither buy it nor get it by any other means.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"NTFS_File_System_Driver_for_DOSWindows_V30R\"><\/span>NTFS File System Driver for DOS\/Windows V3.0R+<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>In 1999\u00a0Mark Russinovich and Bryce Cogswell released system driver\u00a0NTFS File System Driver for DOS\/Windows V3.0R+. This driver allowed to mount NTFS file systems in read only mode in\u00a0DOS, Windows 3.1 and Windows 95. It should be noted that this driver works only for newer versions of NTFS.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Software_Write_Blockers_for_Windows\"><\/span>Software Write Blockers for Windows<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h4><span class=\"ez-toc-section\" id=\"DIBLOCK\"><\/span>DIBLOCK<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>DIBLOCK (Computer Forensics Ltd.) is an utility included in DIBS Analyzer (DIBS USA Inc.) and is the first software write blocker developed special for Windows\u00a0(Windows 3.11, Windows 95, Windows 98 and Windows 2000).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1149\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/07\/1.png\" alt=\"1\" width=\"362\" height=\"353\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/1.png 362w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/1-300x293.png 300w\" sizes=\"auto, (max-width: 362px) 100vw, 362px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1. DIBLOCK<\/em><\/p>\n<h4 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Write_Protect_USB_Devices_in_Windows_XP\"><\/span>Write Protect USB Devices in Windows XP<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>With Service Pack 2 for Windows XP Microsoft allowed to block writing operations via USB by changing registry values [4]. This feature is also available in newer versions of Windows OS. This feature became very popular among computer forensics community. AccessData even released a document describing it [5]. Also, a lot of software write blockers based on this feature were released (most of them are available now).\u00a0National Center for Forensic Science (NCFS) also released such utulity &#8211;\u00a0NCFS Software Write-block XP.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1150\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/07\/2.png\" alt=\"2\" width=\"490\" height=\"353\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/2.png 490w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/2-300x216.png 300w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. NCFS Software Write-block XP<\/em><\/p>\n<p>National Center for Forensic Science even wrote a short instruction on how to validate this programm:<\/p>\n<p><em>Step Validation by National Center for Forensic Science<\/em><\/p>\n<p><em>Step #1<\/em><\/p>\n<p><em>a) Insert USB media into PC<\/em><\/p>\n<p><em>b) Wipe USB Media (with Validation) using Encase<\/em><\/p>\n<p><em>c) Format USB Media using Windows XP<\/em><\/p>\n<p><em>d) Copy data and Deleted some data from USB media<\/em><\/p>\n<p><em>e) Create 3 folders for imaging onto Desktop (Step-1, Step-2, Step-5)<\/em><\/p>\n<p><em>f) Image the USB media and create MD5 Hash value with Access Data Imager<\/em><\/p>\n<p><em>Step #2<\/em><\/p>\n<p><em>a) Remove and Reinsert USB media from PC<\/em><\/p>\n<p><em>b) Copy data and Deleted some data from the USB media<\/em><\/p>\n<p><em>c) Image media and create a MD5 Hash value of the USB media<\/em><\/p>\n<p><em>d) Validate Image2 MD5 Hash is DIFFERENT hash value of Image #1<\/em><\/p>\n<p><em>Step #3<\/em><\/p>\n<p><em>a) Remove USB media from PC<\/em><\/p>\n<p><em>b) Start NCFS Write-Block<\/em><\/p>\n<p><em>c) Select Lock, Select Ok, Auto-Reboot<\/em><\/p>\n<p><em>Step #4<\/em><\/p>\n<p><em>a) Insert USB media into PC<\/em><\/p>\n<p><em>b) Attempt to copy files onto USB media<\/em><\/p>\n<p><em>c) Attempt to delete files from USB media<\/em><\/p>\n<p><em>d) Attempt to Format USB media<\/em><\/p>\n<p><em>Step #5<\/em><\/p>\n<p><em>a) Image USB media and create MD5 Hash value of the USB media<\/em><\/p>\n<p><em>b) Validate Image3 MD5 Hash is the SAME MD5 hash value of Image2<\/em><\/p>\n<p>Unfortunatelly, this feature blocks writing operations only by software which uses Windows drivers. That&#8217;s why after a number of incidents with data writing on examined drives in digital forensics labs this piece of software was deleted from\u00a0National Center for Forensic Science website, and AccessData started to recommend it only for training.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"WriteBlocker\"><\/span>WriteBlocker<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>ACES released a number of software write blockers under joint name &#8211; WriteBlocker. Each version of WriteBlocker supported one version of Windows OS. For example, WriteBlocker XP supported write-blocking for all devices including CD and DVD, USB and hard drives (excluding system drive) in Microsoft Windows XP.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1151\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/07\/3.png\" alt=\"3\" width=\"639\" height=\"447\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/3.png 639w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/3-300x210.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/3-512x358.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/3-280x196.png 280w\" sizes=\"auto, (max-width: 639px) 100vw, 639px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. WriteBlocker XP<\/em><\/p>\n<h4 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"SAFE_Block\"><\/span>SAFE Block<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Like ACES,\u00a0ForensicSoft, Inc. released a few software write blockers under joint name SAFE Block [6], which blocked writing on all devices excluding system drive. Their write blockers support different versions of Windows OS &#8211; from XP to 10, both 32 and 64 bit.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1152\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/07\/4.png\" alt=\"4\" width=\"461\" height=\"373\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/4.png 461w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/4-300x243.png 300w\" sizes=\"auto, (max-width: 461px) 100vw, 461px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4. SAFE Block for Windows 7<\/em><\/p>\n<h4><span class=\"ez-toc-section\" id=\"FastBloc_SE\"><\/span>FastBloc SE<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Guidance Software released software write blocker as a standalone module for EnCase.\u00a0The FastBloc\u00ae SE (Software Edition) module is a collection of tools designed to control reads and writes to a drive attached to a computer through USB, FireWire, and SCSI connections. It enables the safe acquisition of subject media in Windows to an EnCase evidence file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1153\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/07\/5.png\" alt=\"5\" width=\"576\" height=\"523\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/5.png 576w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/5-300x272.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/07\/5-512x465.png 512w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5. FastBlock SE<\/em><\/p>\n<h2 style=\"text-align: left;\"><span class=\"ez-toc-section\" id=\"Discussion\"><\/span>Discussion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Why are software write blockers not widely used? It&#8217;s a difficult question. Probably, it&#8217;s due to their prices (you can buy a hardware write blocker for the same money), or users just psychologically trust more on hardware write blockers. Maybe incidents with\u00a0Write Protect USB Devices in Windows XP played its role (we wrote about it in the main part of the article). Anyway, we would be happy to hear about your experience with software write blockers.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"References\"><\/span>References:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li>Linux write blocker <a href=\"https:\/\/github.com\/msuhanov\/Linux-write-blocker\/blob\/master\/README.md#background\">https:\/\/github.com\/msuhanov\/Linux-write-blocker\/blob\/master\/README.md#background<\/a><\/li>\n<li>PDBLOCK <a href=\"https:\/\/www.digitalintelligence.com\/software\/disoftware\/pdblock\/\">https:\/\/www.digitalintelligence.com\/software\/disoftware\/pdblock\/<\/a><\/li>\n<li>Software Write Block <a href=\"http:\/\/www.cftt.nist.gov\/software_write_block.htm\">http:\/\/www.cftt.nist.gov\/software_write_block.htm<\/a><\/li>\n<li>How can I prevent users from connecting to a USB storage device? <a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/823732\">https:\/\/support.microsoft.com\/en-us\/kb\/823732<\/a><\/li>\n<li>Write Protect USB Devices in Windows XP <a href=\"https:\/\/www.syntricate.com\/files\/USB%20Write%20Protect.pdf\">https:\/\/www.syntricate.com\/files\/USB%20Write%20Protect.pdf<\/a><\/li>\n<li>Software Write Blockers <a href=\"http:\/\/www.forensicsoft.com\/safeblock.php\">http:\/\/www.forensicsoft.com\/safeblock.php<\/a><\/li>\n<\/ol>\n<p><strong>We would like to thank <a href=\"https:\/\/www.google.ru\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=0ahUKEwjV2Oqk3-3NAhUFNT4KHQGmCBYQFggdMAA&amp;url=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjaclaz&amp;usg=AFQjCNH97YCSfr93RKoJbOjTvDxkCS7qQA&amp;sig2=ynnkblr8jKqvoCUzRa3XFg&amp;bvm=bv.126130881,d.dmo\" target=\"_blank\" rel=\"noopener\">Jacopo Lazari<\/a> for help with this article.<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"In this article we\u2019re going to talk about different types of software write blockers and how they are&hellip;","protected":false},"author":126,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-1148","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Software Write Blockers in Computer Forensics: Expert Overview<\/title>\n<meta name=\"description\" content=\"Explore software write blockers used in computer forensics, including DOS, Windows, and legacy tools. Learn how they prevent write operations and where each type applies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software Write Blockers: DOS, Linux, and Windows Tools\" \/>\n<meta property=\"og:description\" content=\"Explore software write blockers used in computer forensics, including DOS, Windows, and legacy tools. Learn how they prevent write operations and where each type applies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-12T10:48:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T19:14:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Software Write Blockers: DOS, Linux, and Windows Tools\",\"datePublished\":\"2016-07-12T10:48:50+00:00\",\"dateModified\":\"2024-12-11T19:14:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/\"},\"wordCount\":1061,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/\",\"name\":\"Software Write Blockers in Computer Forensics: Expert Overview\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"datePublished\":\"2016-07-12T10:48:50+00:00\",\"dateModified\":\"2024-12-11T19:14:41+00:00\",\"description\":\"Explore software write blockers used in computer forensics, including DOS, Windows, and legacy tools. Learn how they prevent write operations and where each type applies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/software-write-blockers-overview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Software Write Blockers: DOS, Linux, and Windows Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Software Write Blockers in Computer Forensics: Expert Overview","description":"Explore software write blockers used in computer forensics, including DOS, Windows, and legacy tools. Learn how they prevent write operations and where each type applies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/","og_locale":"en_US","og_type":"article","og_title":"Software Write Blockers: DOS, Linux, and Windows Tools","og_description":"Explore software write blockers used in computer forensics, including DOS, Windows, and legacy tools. Learn how they prevent write operations and where each type applies.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-07-12T10:48:50+00:00","article_modified_time":"2024-12-11T19:14:41+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Software Write Blockers: DOS, Linux, and Windows Tools","datePublished":"2016-07-12T10:48:50+00:00","dateModified":"2024-12-11T19:14:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/"},"wordCount":1061,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/","name":"Software Write Blockers in Computer Forensics: Expert Overview","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","datePublished":"2016-07-12T10:48:50+00:00","dateModified":"2024-12-11T19:14:41+00:00","description":"Explore software write blockers used in computer forensics, including DOS, Windows, and legacy tools. Learn how they prevent write operations and where each type applies.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/software-write-blockers-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Software Write Blockers: DOS, Linux, and Windows Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=1148"}],"version-history":[{"count":3,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1148\/revisions"}],"predecessor-version":[{"id":16023,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1148\/revisions\/16023"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=1148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=1148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=1148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}