Monday, May 13, 2019
Computer Fraud Tools Essay Example | Topics and Well Written Essays - 750 words
Computer Fraud Tools - Essay ExampleThis softw are kit and boodle best in machines that contain 64MB or more of system memory, with a processor of Pentium II cd MHz core or a more advanced processor than this, and lastly it can pass in Vista, Windows 7, and XP, 98, 2000, 2002, and 2003 (Sammons, 2012). This computer program has the following features deleted files recovery, missing folders and files recovery, live updates are available for the program, full support for retentive string variables and names, and it fully supports SCSI, EIDE, IDE, and PAN, SATA, ZIP drives (Mary-Jo Kranacher, Richard Riley, Joseph T. Wells ,2010). It is utilize to recover files deleted from NTFS and FAT based operating systems. This program cost about $29, and can be accessed online with a full license or bought from different outlets worldwide. dish aerial doctors undelete (Mary-Jo Kranacher, Richard Riley, Joseph T. Wells, 2010) This program can recover deleted files on SATA, IDE, ATA, SCSI hard disk drives, memory sticks, SD cards, USB hard drives, and outside Zip drives. It supports recovery in the FAT32, FAT, FAT16, NTFS5 and the normal NTFS file systems in the following operating systems XP, 2003 and 2000, Windows VISTA (Sammons, 2012). It recovers files that are accidentally deleted on a window running operating system. This software costs $49.00 USD. Tools that can be used to collect digital evidence from a carrel phone are softwares, which use forensic abilities, to recover data that is not currently in the phone. These programs include Cell phone and data digging (Androulidakis, 2012) This tool involves evidence from cellular devices playing a critical role in the component of data mining. This ability is often overlooked in the use of digital evidence (Androulidakis, 2012). This tool involves the export of education from various digital devices like the cell phones. For cell phones, you export the call logs, stored files from the phone and possibly the cabba ge visited sites if it is web enabled. After exporting, then the data is imported into an analytical software package, whereby the experts and investigators using the data mining techniques can visualize and diagram a timeline of events or a pitiful enterprise. To understand the complex relationships of the timeline of events and criminal enterprise, the graphical re unveiling would do a lot better for investigators and the jury in the courtroom presentation on a criminal investigation.an example of the is the AFLOGICAL 1.4 investigation tool (Androulidakis, 2012). This tool tested personal breeding Management data was attempted including access to the multimedia messaging services, and it runs on Mac OS X 10.5.4. It is quite an expensive tool. Camera (Androulidakis, 2012) A cell phone camera can be used as a forensic tool to collect digital evidences (Androulidakis, 2012). A camera takes photos and subsequently stores them in memory in the phone or an external storage device. The se tools are fairly cheap and must be attached to the phone and connected to the phone system. So it must be compatible with the cell device that it is to be installed. Cell phone analysis tools These are tools that are used to read a SIM card. A SIM (subscriber identity module) accommodates text messages, recently dialed
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.