Saturday, February 23, 2019
Forensic People Essay
Computer forensics is the need of carrying out computer related investigations to find juristic cause to related crimes. In order to carry out these investigations, forensics experts custom computer forensics cats-paw kit outs that help them in their investigations. There are a number of forensics brute kits apply in different forensic activities much(prenominal) as Password domesticatey pricking kit (PRTK) This is a mother fucker apply to recover disordered passwords. It is used to recover passwords of commonly used applications such as Microsoft Office, Lotus 1-2-3 in Windows NT.The file whose password is lost is dragged and dropped onto the open window of the program and Password reco precise tool kit recovers its password (Forensic People, 2009). The Password Recovery Toolkit enables the proper management of passwords it has the capability of analyzing several(prenominal) files at one clock time and acquire all types of passwords regardless of continuance and cha racter type. It is in addition multilingual in nature for it faecal matter withal recover passwords set in different languages. It is too able to recover password from many applications close to 80.It is also secure as it requires a personal security code to be able to use it. later analyzing files and the recovery of their passwords it pop offs an optional report file. This tool is provided by access culture which is a forensics expert company and it provides a variety of forensic tools (Forensic People, 2009). stock Smart Doctor (www. recoverlostpassword. com) Metaviewer Metaviewer is a Forensic tool that is developed by pinpoint labs. It is used by forensic examiners to retrieve the metadata for specialized files. arrest Metaviewer enables the user to extract files system metadata that are contained in Microsoft Office Files. The information which is retrieved can be pasted into any application. It is used to retrieve OLE metadata for specific files by forensic experts (Pinpoint labs, 2009). Source Pinpointlabs. com Web historian It is used to give a history of all the activities a person has been carrying out online. It can give a history of the activity on common sack up browsers such as Mozilla Firefox, internet explorer, Netscape and opera.The tool has the capability of recording the paths for profits activity files for each web browser Cliffs (Jones & Belani, 2005). The tool also has the ability to reproduce the recovered data into HTML and delimitate Text File formats. The information normally gives the history of sites visited, activities on those sites and login time and also information got. This helps investigators to carry out investigations and get the suspicious activities of deal online. This tool is available as a freeware tool and its provided by Red Cliffs (Jones & Belani, 2005).Source http//www. securityfocus. com/incidents/images/webfor4. jpg Wireless-Detective Wireless Sniffer and Interception Tool Wireless-Detective is us ed by investigators for WLAN Lawful Interception. It is a Tool manufactured by Decision Group and assists in sniffing the WLAN so as to carryout investigation on wireless LAN Networks. Wireless-Detective is used to decode WLAN net income profession and reconstruct it in real time. Any online activity that is reliant on internet traffic can be sniffed and accessed.The tool captures the traffic and reconstructs all information in a list according to class and content format. It is able to search details and analysis can also be made on the captures traffic to determine evidence and also crack crimes online. This makes the Wireless LAN Detective the most preferred forensics tool for investigators because of its one fall in ability to carry out investigations (Decision Group, 2010). X-way forensics. X-way forensic is a resourceful forensic tool that serves various needs of forensics investigators.It has diverse functionalities that backing the collection of digital evidence and in vestigative process (X-ways bundle Technology, 2010). This forensics tool offers a functionality of individual case management, the automatic generation of reports from activities and it is capable of recovering data using various techniques. It has time saving capabilities and is not assailable to data hiding techniques such as host protected areas (X-ways Software Technology, 2010). The X-ways forensics tool is supplied by X-ways software technology AG.Conclusion Computer forensics tools are very useful in helping forensic experts in retrieving evidence that is important for law makers to prosecute against crimes. It is a fast growing flying field that is very dynamic as it faces many cyber crime challenges. Thus it is very important for the computer and internet users to be aware of the risks they are face up and how to avoid them. References Decision Group, (2010), Wireless-Detective Wireless Sniffer and Interception Tool. Retrieved From http//www. edecision4u. com/network_ forensics_ sunrise(prenominal)s. htmlForensic People, (2009), Your One stop for Forensic Solutions, Decryption tools. Retrieved From http//www. forensicpeople. com/products. asp? tProductGroupId=1&tProductId=3 Jones, K. J. & Belani, R. (2005), Web web browser Forensics, Part 1 Retrieved From http//www. symantec. com/connect/articles/web-browser-forensics-part-1 Pinpoint labs, (2009), Free Software Utilities. Retrieved From http//www. pinpointlabs. com/new/utilities. html X-ways Software Technology, (2010), X-ways Forensics Integrated Computer Forensics Software. Retrieved From http//www. x-ways. net/forensics/
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.