4n6Hub
Share This
Scroll Down
//Computer Forensics

CYBER FORENSICS

Cyber Forensics Computer Forensics deals with the preservation, identification, extraction, and documentation of computer evidence. The field is relatively new to the private sector but it has been the mainstay of technology−related investigations and intelligence gathering in law enforcement and military agencies since the mid−1980s. Computer forensics is a branch of digital forensic science that deals with investigation and analysis techniques to gather and preserve evi..

Read more
  • 0 Comment

Storage media Imaging (Disk Imaging)

Storage media Imaging (Imaging) is a storage medium, in the form of the creation of all the physical data file. When you perform the imaging storage media storage media first sector of all data up to the last sector of the file is stored in the form. In other words, in addition to the files and directory structure can be determined as a Navigator in the slack spaceand save all unassigned zone. Why Imaging storage media storage media to the original status intact. In..

Read more
  • 0 Comment

Live Forensics

Often when you go to the scene of the incident. At this point, the scene takes place in the initial activity is very important. Use the traditional forensic police line bloodstains, fingerprints, footprints, etc. in the field case, analog evidence is not compromised by outside influences.Loca-de-exchange law (Locard's exchange principle) depending on how well preserved the scene, according to the resolution of the case could determine whether. The same goes for d..

Read more
  • 0 Comment

RECOVERING DATA FROM DAMAGED USB

 What happens when you receive or take custody of evidence that ends up being non-functional? Without the right tools and training, the answer might be nothing. Perhaps the owner purposely tried to damage the device or it is due to some internal malfunction. Either way, data on these devices can be of great evidentiary value that proves or disproves previously held conclusions. And while there are an ever-growing number of data recovery shops, their services can be costly a..

Read more
  • 0 Comment

CYBER FORENSICS

CYBER FORENSICS   After reading this blog, you will be able to Define Cyber Forensics and its Importance Understand the Computer Forensic Life Cycle Knowledge about best practices to be followed Issues in Computer Forensics 1.1 Cyber Forensics In the very first unit of Cyber Forensics we will be learning about the goal of cyber forensics, and the ways of finding the digital evidences along with the legal procedures to be followed. Cyber forensics follows the inves..

Read more
  • 0 Comment

LIVE FORENSICS

  After reading this blog, you will be able to Understand about the Live Acquisition of the Evidence Best practices for live forensics Knowledge about Imaging process Understanding the importance of the Documentation process   1. LIVE ACQUISITION The Acquisition techniques are of two types, one in which the image of the device is taken at the forensic workstation and not directly on site while as the live acquisition is taking of image on-site while the system is ..

Read more
  • 0 Comment
Get In Touch
Close
error: Content is protected !!