Last year when I was in my NDSR at Georgetown, one of the workflows I came up with a was for digital forensics. Until very recently, I shared this with only a few people outside the confines of that institution. After someone asked me for a copy, I thought others might be interested. So in the spirit of sharing, here is my Fred_guide [PDF], a long document on how to hook various devices up to a FRED, image your media (hard drives, floppy disks, zip disks, etc.), run reports, and take actions.
In addition to detailed description of my own interpretation on how to use FRED and standard tools found in the BitCurator suite, there are also instructions for some less documented tools from an archivist perspective like the SuperCard Pro, FC5025, HxCFloppy emulator software, and the BitCurator Access redaction tool. (All of which you don’t need a FRED for).
While some of it is duplicative of other efforts, I hope it will still be of some use to other archivists/librarians/curators! Feel free to take and remix, as it’s licensed under CC-BY.
Here’s a suggested attribution:
Carrano, Joe. FRED Guide. Georgetown University Library, 2017.
Note: there are a couple sections that are blank because I never got there (like access, but I think that’s something we’re all struggling with).