Identifying and Finding Forensic Evidence From Windows Application

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Finding Digital Forensic Evidence in Graphic Design Applications

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents like identity documents (IDs), driver’s licenses or passports among others. However the use of any graphic design application leaves behind traces of digital information which can be used during a digital forensic investigation. Current digit...

متن کامل

Finding Jane Doe: A Forensic Application of 2D Image Calibration

Thirty years ago, a young girl was found decapitated. Her identity remains unknown, and neither her head nor her killer have been found. Until recently, the location of her grave was lost, preventing any efforts to identify her using modern forensic techniques. This paper presents a case study on the use of burial photos to accurately and precisely determine the location of the lost grave. We h...

متن کامل

Identifying Evidence for Implementing a Cloud Forensic Analysis Framework

Cloud computing provides several benefits to organizations such as increased flexibility, scalability and reduced cost. However, it provides several challenges for digital forensics and criminal investigation. Some of these challenges are the dependence of forensically valuable data on the deployment model, multiple virtual machines running on a single physical machine and multiple tenancies of...

متن کامل

Forensic data recovery from the Windows Search Database

Windows Search maintains a single database of the files, emails, programmes and Internet history of all the users of a personal computer, providing a potentially valuable source of information for a forensic investigator, especially since some information within the database is persistent, even if the underlying data are not available to the system (e.g. removable or encrypted drives). However,...

متن کامل

Identifying Trace Evidence from Target-Specific Data Wiping Application Software

One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Internet Technology and Secured Transaction

سال: 2012

ISSN: 2046-3723

DOI: 10.20533/jitst.2046.3723.2012.0016