Welcome How Remlox Works Tech Specs Success Stories Contact Us Ricoh Legal
Remlox runs directly from the encrypted external hard drive, and requires no software installation whatsoever or unpacking of files. – To receive more detailed technical specifications, complete the contact form on the contact page.

System requirements (minimum recommended)

Windows 9x, NT, XP, Vista, Win7
External USB V2.0 port (V1.1 supported) or eSATA
SVGA graphics controller

Encrypted hard drive

Real Time 256-bit Military Grade AES hardware encryption
Interface – USB 2.0 and eSATA
Transfer rate up to 90MB/sec
Power – 100% Bus Powered
Buffersize: 8MB
RPM - 5400
Average seek time – 12ms
Shock – operating 300G 2ms – Non operating 1000G 1ms
Dimensions & weight – 19mm x 84.5mm x 120mm – Weight 6.2oz
Approvals FCC & CE

Image output

DD image format (E01 when using compression)
Chunked to 2GB files
MD5 verification

System audit files created

Make, model and serial no. of system
Make, model and serial no. of hard drive
Size and available capacity of all hard drives connected
Operating system install date and time
User log on statistics
Attached devices

Much more .. click here for a sample audit file in PDF format

  Custodian Forensic Self Collection
Deployed by encrypted USB drive, Remlox creates a full and complete forensic image of a custodian's hard drive using DD technology.

Fast Deployment
Ricoh Forensics' computer forensic lab can deploy over 400 Remlox units a week, throughout the United States and beyond.

Simple Interface for Custodian
Custodian simply connects encrypted hard drive, completes on-screen form (name and email address only) and the forensic image of the hard drive is created. Upon completion, the encrypted drive is returned to the pre-addressed shipping box, sealed and placed in a drop box.

System Audits Performed
At the completion of the forensic imaging process, a system audit is performed, providing extensive and verifiable system information. View a sample audit report here.