Apps on a Stick

Total Page:16

File Type:pdf, Size:1020Kb

Apps on a Stick Apps on a stick All the necessary programs that are on your PC can, these days, be compressed into that little memory stick of yours. With memory sticks having increasing amounts of storage, they’re becoming ever more useful for storing all of your important programs. From your work, graphics and Internet programs to operating systems; you can have all on your memory stick. By Gareth Van Zyl Published November 17, 2009 As a starting point, you can visit www.portableapps.com. This is a useful resource that has numerous popular programs that have been turned into portable applications available for download. You can download the packages available online, or you can download programs individually one by one. It's merely a matter of downloading the packages to your portable drive and then running the programs. There are numerous advantages to running applications from your memory stick or portable drive. The first being ultra-portability, and the second being that if you use it on a another computer, you don't leave a trace behind of your activities. It also doesn't leave a registry behind, except for those automatically generated by Windows. The reason for this is that the relevant application does not write to the Windows registry and, instead, stores settings in one or more configuration files, such as an INI file located in its directory. Portable applications can be run from USB drives, CDs, flash drives or even floppy disks. Below is a list of some of what we think are the most useful programs for certain purposes. Work OpenOffice Portable This popular open source alternative to the Microsoft Office Suite offers programs that give you the same functionality as the latter. By downloading it off Portableapps.com, you can use a number of the OpenOffice applications. From Base, Calc, Draw, Writer, Math and Impress; the suite is fairly comprehensive. It is slightly more basic version of the Open Office Suite for the PC, but it is sufficient enough for your need to be on the go. Mozilla ThunderBird Portable and Mozilla Sunbird Portable To complement your OpenOffice portable suite, the Mozilla ThunderBird and Mozilla Sunbird programs offer you email and calendar clients to keep you in touch and organised. With Mozilla Thunderbird you can take your contacts and email connectivity with you wherever you go. The portable version leaves no information behind on the machine that you use it on. Mozilla Sunbird offers you a calendar and a To Do list feature. Sumatra PDF Portable This is a PDF reader that, like Adobe Acrobat Reader, gives you the ability to view your all important PDF documents. It's also a slimmer version of the full version of the open source Sumatra PDF, and its simplistic approach means that the focus is on merely viewing PDFs as opposed to anything else. • Sumatra PDF Portable. GNUCash Portable GnuCash Portable is the open source financial management software packaged as a portable app to help you take your financial data with you. It has all the same great features as most commercial money management programs and more. The program includes features such as Double-Entry Accounting, Expense Accounts, Mutual Fund Accounts, Small-Business Accounting, Transaction Matching, reports and graphs, and financial calculations. • GNUCash Portable. Graphics GIMP Portable GIMP is the open source graphics equivalent of the likes of Adobe Photoshop. The portable version seemingly has all the functionality that the full version has. The program allows you to do the basics when it comes to image manipulation, such as photo retouching, mass production image renderer and an image format converter. • GIMP Portable Internet Firefox Portable Depending upon which version you download, you could be left with the portable versions of Firefox 3.0 or Firefox 3.5. The result is that you can take your bookmarks, extensions and passwords with you wherever you go without leaving trace behind. FileZilla Portable FileZilla is an FTP client that can help you connect to your remote servers to transplant of your relevant files and folders. You can take your server list and settings with you and it supports both downloads and uploads, timeout detection, firewall support, SOCKS4/5 and HTTP1.1 support, SSL, SFTP and more, all with an intuitive drag and drop interface. FileZilla Portable. Anti-virus XAMPP XAMPP comes configured with the Apache server, PHP, MySQL and Perl for all your web- designing and web-development needs. XAMPP is a complete web, database and FTP server package for Windows that's ready to go in minutes and completely portable. The full XAMPP package includes: Apache, MySQL, PHP + PEAR, MiniPerl, OpenSSL, phpMyAdmin, XAMPP Control Panel, Webalizer, Mercury Mail Transport System, FileZilla FTP Server, SQLite, ADODB, Zend Optimizer and XAMPP Security. XAMPP ClamWin Portable This software allows you to scan files on the go. The free anti-virus program for Windows features high detection rates for viruses and spyware. The software had regular virus database updates and a standalone virus scanner. ClamWin Portable Pidgin Portable Pidgin helps you organise many of your instant messaging platforms such as AOL, Yahoo, ICQ, Jabber and Gmail Chat into one medium. Pidgin Portable. Multimedia CoolPlayer + Portable This portable program allows you to listen to your music on the go. It includes a number of features such as support for standard, equalizer and shade mode (that fits into a Windows titlebar), an advanced playlist editor, Internet streaming, ID3 Multitagger, a file renamer, fast mp3 to wav converter, MAD mpeg engine, OGG Vorbis support, FLAC support, Winamp input plugins support, continuous play and 8 band convolution equalizer. CoolPlayer + Portable. Photos Cornice Portable Cornice Portable is an image viewer app that includes features such as Detail and thumbnail view for images, image preview, automatic recognition of images, bookmarks, full-screen view, zooming and rotation, slideshow, good keyboard navigation, image loading from zip archives and EXIF data support. Cornice Portable. Virtual Dub Portable VirtualDub Portable is a video capture/processing utility. It lacks the editing power of a general-purpose editor such as Adobe Premiere, but is streamlined for fast linear operations over video. It has batch-processing capabilities for processing large numbers of files and can be extended with third- party video filters. VirtualDub is mainly geared toward processing AVI files, although it can read (not write) MPEG-1 and also handle sets of BMP images. There is a note about this program according to the Portable Apps website: "Codecs Note: VirtualDub uses a combination of plugins for codecs (see the VirtualDub Portable Plugins Pack linked at the top of this page) and codecs on the local machine, so if you wish to use a non-standard codec like DivX ."or XVID, you'll need it installed. Programming Notepad ++ Notepad ++ has features like: syntax highlighting and syntax folding (C, C++, HTML, ASP, Java, Pascal, CSS and more), user defined syntax highlighting, auto-completion, multi-document, regular expression, search/replace supported, full drag ‘n' drop supported, zoom in and zoom out, multi- language environment supported, brace and indent guideline highlighting and macro recording and playback. Utilities 7-Zip 7-Zip is a file archiver (compression) utility for Windows with a great array of features including: High compression ratio in new 7z format with LZMA compression, the ability to pack / unpack: 7z, ZIP, GZIP, BZIP2 and TAR, unpack only: RAR, CAB, ISO, ARJ, LZH, CHM, Z, CPIO, RPM, DEB & NSIS, for ZIP and GZIP formats 7-Zip it provides compression ratio that is 2-10 % better than ratio provided by PKZip and WinZip, self-extracting capability for 7z format, powerful file manager and localisations for 63 languages. 7-Zip. Ubuntu Lite Operating System Apart from having all the portable versions of your programs installed on your computer, you can also get portable versions of operating systems on your flash drive. Portableapps.com offers a fairly archaic version of a Mac OS, but there are other places you can visit to get hold of portable versions of the Ubuntu OS. One of those resources being the Ubuntu Lite version, which we took a look at. You can get a slightly more fuller version, but it is bigger in size and repeats many of the programs that have already been mentioned above, such as Firefox, GIMP and Pidgin. Many might question what the point is of using an OS on your portable drive, but it merely acts as an interface upon which you can manage your drive. Ubuntu Lite Operating System. Getting the portable OS going on your drive is as simple as downloading the zipped file, extracting it to a folder on your computer and activating it. When testing it, it did load up quite slow from our drive. But if this works, it could be a useful organiser of all your information. =================================================== WinContig – Portable Defrag Tool WinContig is a Free simple defragmentation tool that can be used to quickly defragment files without defragmenting the entire disk. You can also group files into profiles. WinContig is a standalone executable that doesn't require installation and doesn't create any Registry entries on your computer. Advanced users will like that it accepts a number of optional command line switches that can be used to manipulate how the portable defragmenter operates. WinContig Defrag Screenshot: Authors Website: wincontig.mdtzone.it/en/index.htm License: Freeware Download: Grab this Portable Tool HERE ============================= Power Defragmenter – Portable Defragmenter Power Defragmenter is a graphical defragmenting tool that works in conjunction with Contig by Sysinternals. Contig is a powerful command line portable defragmentation application developed for Windows NT/2000/XP operating systems. Power Defragmenter compliments Contig by providing a GUI " Graphical User Interface" wrapper for simplicity and ease of use.
Recommended publications
  • The Rise of Autorun- Based Malware by Vinoo Thomas, Prashanth Ramagopal, and Rahul Mohandas Report the Rise of Autorun-Based Malware
    Report The Rise of AutoRun- Based Malware By Vinoo Thomas, Prashanth Ramagopal, and Rahul Mohandas Report The Rise of AutoRun-Based Malware Table of Contents Abstract 3 The Return of Removable-Disk Malware 3 Distribution of AutoRun-Based Malware 4 AutoRun Woes 6 Incomplete autorun.inf cleaning 7 Traditional detection methods 8 Smart removal of autorun.inf 8 Leveraging In-the-Cloud Computing Technology 10 The Road Ahead 11 About the authors 12 Report The Rise of AutoRun-Based Malware Abstract Most people associate today’s computer viruses and other prevalent malware with the Internet. But that’s not where they started. Lest we forget, the earliest computer threats came from the era of floppy disks and removable media. With the arrival of the Internet, email and network-based attacks became the preferred infection vector for hackers to spread malicious code—while security concerns about removable media took a back seat. Now, however, our attention is returning to plug-in media. Over the years, floppy disks have been replaced by portable hard drives, flash media cards, memory sticks, and other forms of data storage. Today’s removable devices can hold 10,000 times more data than yesterday’s floppy disks. Not only can they store more data, today’s devices are “smart”—with the ability to run portable software programs1 or boot operating systems. 2,3 Seeing the popularity of removable storage, virus authors realized the potential of using this media as an infection vector. And they are greatly aided by a convenience feature in operating systems called AutoRun, which launches the content on a removable disk without any user interaction.
    [Show full text]
  • List of Applications Updated in ARL #2530
    List of Applications Updated in ARL #2530 Application Name Publisher .NET Core SDK 2 Microsoft Acrobat Elements Adobe Acrobat Elements 10 Adobe Acrobat Elements 11.0 Adobe Acrobat Elements 15.1 Adobe Acrobat Elements 15.7 Adobe Acrobat Elements 15.9 Adobe Acrobat Elements 6.0 Adobe Acrobat Elements 7.0 Adobe Application Name Acrobat Elements 8 Adobe Acrobat Elements 9 Adobe Acrobat Reader DC Adobe Acrobat.com 1 Adobe Alchemy OpenText Alchemy 9.0 OpenText Amazon Drive 4.0 Amazon Amazon WorkSpaces 1.1 Amazon Amazon WorkSpaces 2.1 Amazon Amazon WorkSpaces 2.2 Amazon Amazon WorkSpaces 2.3 Amazon Ansys Ansys Archive Server 10.1 OpenText AutoIt 2.6 AutoIt Team AutoIt 3.0 AutoIt Team AutoIt 3.2 AutoIt Team Azure Data Studio 1.9 Microsoft Azure Information Protection 1.0 Microsoft Captiva Cloud Toolkit 3.0 OpenText Capture Document Extraction OpenText CloneDVD 2 Elaborate Bytes Cognos Business Intelligence Cube Designer 10.2 IBM Cognos Business Intelligence Cube Designer 11.0 IBM Cognos Business Intelligence Cube Designer for Non-Production environment 10.2 IBM Commons Daemon 1.0 Apache Software Foundation Crystal Reports 11.0 SAP Data Explorer 8.6 Informatica DemoCreator 3.5 Wondershare Software Deployment Wizard 9.3 SAS Institute Deployment Wizard 9.4 SAS Institute Desktop Link 9.7 OpenText Desktop Viewer Unspecified OpenText Document Pipeline DocTools 10.5 OpenText Dropbox 1 Dropbox Dropbox 73.4 Dropbox Dropbox 74.4 Dropbox Dropbox 75.4 Dropbox Dropbox 76.4 Dropbox Dropbox 77.4 Dropbox Dropbox 78.4 Dropbox Dropbox 79.4 Dropbox Dropbox 81.4
    [Show full text]
  • How Is Video Game Development Different from Software Development in Open Source?
    Delft University of Technology How Is Video Game Development Different from Software Development in Open Source? Pascarella, Luca; Palomba, Fabio; Di Penta, Massimiliano; Bacchelli, Alberto DOI 10.1145/3196398.3196418 Publication date 2018 Document Version Accepted author manuscript Published in Proceedings of the 15th International Conference on Mining Software Repositories, MSR. ACM, New York, NY Citation (APA) Pascarella, L., Palomba, F., Di Penta, M., & Bacchelli, A. (2018). How Is Video Game Development Different from Software Development in Open Source? In Proceedings of the 15th International Conference on Mining Software Repositories, MSR. ACM, New York, NY (pp. 392-402) https://doi.org/10.1145/3196398.3196418 Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Copyright Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons. Takedown policy Please contact us and provide details if you believe this document breaches copyrights. We will remove access to the work immediately and investigate your claim. This work is downloaded from Delft University of Technology. For technical reasons the number of authors shown on this cover page is limited to a maximum of 10. How Is Video Game Development Different from Software Development in Open Source? Luca Pascarella1,
    [Show full text]
  • Rohos Disk Encryption Tutorial
    Rohos Disk Encryption - creates hidden and password protected partitions on the computer or USB flash drive. With megabytes of sensitive files and private data on your computer or USB drive you can not imagine life without the hidden partition that is created using this wonderful tool. It has a separate portable tool that allows accessing encrypted partition on USB flash drive from any PC where you work as a guest or user with no admin rights. Rohos Disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. The installation requires administrative rights. Encrypt USB drive • After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application. screen shot 1 • Click on “Encrypt USB drive” • The program automatically determines the best Rohos disk options for your system. It will create a partition namely I: with 900 Mb space. You can customize the partition size, disk letter and file system by clicking [ Change …]. screen shot 2 © Tesline-Service S.R.L. All rights reserved. 2010 1 screen shot 3 Remember Rohos Disk Encryption has no encrypted disk size limit. Thus you may change disk size in this window. Notice that Rohos Disk displays your flash drive’s available free space. Also file system may be changed. By default, Rohos Disk Encryption creates disk in NTFS but it may be changed to FAT/FAT32. • After all disk settings are adjusted you may insert a password to Rohos disk, confirm it and click on “ Create disk ”.
    [Show full text]
  • Forensics Evaluation of Privacy of Portable Web Browsers
    International Journal of Computer Applications (0975 – 8887) Volume 147 – No. 8, August 2016 Forensics Evaluation of Privacy of Portable Web Browsers Ahmad Ghafarian Seyed Amin Hosseini Seno Department of Computer Science Department of Computer Engineering and Information Systems Faculty of Engineering University of North Georgia Ferdowsi University of Mashhad Dahlonega, GA 30005, USA Mashhad, Iran ABSTRACT relation to a computer forensic investigation is that the latter is Browsers claim private mode browsing saves no data on the a less tangible source of evidence [3]. host machine. Most popular web browsers also offer portable A study of tools and techniques for memory forensics can be versions of their browsers which can be launched from a found in [4]. The author has evaluated several command line removable device. When the removable device is removed, it and graphical user interface tools and provide the steps is claimed that traces of browsing activities will be deleted needed for memory forensics. Retrieving portable browsing and consequently private portable browsers offer better forensics artifacts left behind from main memory have privacy. This makes the task of computer forensics recently attracted some attention [5, 6]. The authors used investigators who try to reconstruct the past browsing history, limited memory forensics to retrieve forensics artifacts left in case of any computer incidence, more challenging. after a private portable browsing session. They argue that However, whether or not all data is deleted beyond forensic memory forensics is very promising in establishing a link recovery is a moot point. This research examines privacy of between the suspect and the retrieved data.
    [Show full text]
  • (Hardening) De Navegadores Web Más Utilizados
    UNIVERSIDAD DON BOSCO VICERRECTORÍA DE ESTUDIOS DE POSTGRADO TRABAJO DE GRADUACIÓN Endurecimiento (Hardening) de navegadores web más utilizados. Caso práctico: Implementación de navegadores endurecidos (Microsoft Internet Explorer, Mozilla Firefox y Google Chrome) en un paquete integrado para Microsoft Windows. PARA OPTAR AL GRADO DE: MAESTRO EN SEGURIDAD Y GESTION DEL RIESGO INFORMATICO ASESOR: Mg. JOSÉ MAURICIO FLORES AVILÉS PRESENTADO POR: ERICK ALFREDO FLORES AGUILAR Antiguo Cuscatlán, La Libertad, El Salvador, Centroamérica Febrero de 2015 AGRADECIMIENTOS A Dios Todopoderoso, por regalarme vida, salud y determinación para alcanzar un objetivo más en mi vida. A mi amada esposa, que me acompaño durante toda mi carrera, apoyó y comprendió mi dedicación de tiempo y esfuerzo a este proyecto y nunca dudó que lo concluiría con bien. A mis padres y hermana, que siempre han sido mis pilares y me enseñaron que lo mejor que te pueden regalar en la vida es una buena educación. A mis compañeros de trabajo, que mediante su esfuerzo extraordinario me han permitido contar con el tiempo necesario para dedicar mucho más tiempo a la consecución de esta meta. A mis amigos de los que siempre he tenido una palabra de aliento cuando la he necesitado. A mi supervisor y compañeros de la Escuela de Computación de la Universidad de Queens por facilitarme espacio, recursos, tiempo e información valiosa para la elaboración de este trabajo. A mi asesor de tesis, al director del programa de maestría y mis compañeros de la carrera, que durante estos dos años me han ayudado a lograr esta meta tan importante. Erick Alfredo Flores Aguilar INDICE I.
    [Show full text]
  • Guide How to Protect Your Private Data with Rohos Disk Encryption
    Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options 6. Steganography 7. Other Rohos Disk features 8. Integrated File-Shredder 9. Access your portable partition on a PC without Admin rights - Virtual keyboard 10. How to delete encrypted disk 11. How to delete all Rohos files from you USB flash drive 2 Rohos Disk Encryption - program creates hidden and protected partitions on the computer or USB flash drive. Those who have megabytes of sensitive files and seriously concerned with data security, can not imagine their computer or USB drive without the hidden partition that is created using this wonderful data encryption tool. Rohos Disk uses NIST approved AES encryption algorithm, 256 bit encryption key length. Encryption is automatic and on-the-fly. The installation requires administrative rights. Encrypt USB drive • After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application. screen shot 1 • Click on “Encrypt USB drive” • The program automatically determines the best Rohos disk options for your system. It will create a partition namely G: with 2000 Mb space. You can customize the partition size, disk letter and file system by clicking [ Change …]. 3 screen shot 2 screen shot 3 Remember Rohos Disk Encryption has no encrypted disk size limit. Thus you may change disk size in this window. Notice that Rohos Disk displays your flash drive’s available free space.
    [Show full text]
  • Boxedapp Complete Guide
    APPLICATION VIRTUALIZATION SOLUTIONS BoxedApp Application Virtualization Solutions from Softanics Complete Guide c Softanics, All rights reserved BoxedApp.com APPLICATION VIRTUALIZATION SOLUTIONS THE COMPLETE GUIDE Contents Table of contents 2 Introduction 3 Which Product to Choose 3 System Requirements 3 Virtual File System 4 Introduction................................................4 Creating Virtual Files..........................................4 Custom Virtual Files: IStream-Based Files...............................4 Virtual Registry 5 Processes that Share Virtual Environment5 Attached Processes............................................5 How Attachment Works.........................................6 Virtual Process..............................................6 Shared Memory..............................................6 Typical Use Scenarios for BoxedApp SDK6 Loading DLL from Memory.......................................6 Using COM / ActiveX Object without Registering It in the Registry................7 Starting Application Directly from Memory..............................7 Intercepting Functions..........................................7 BoxedApp SDK 9 BoxedApp SDK Functions........................................9 BoxedAppSDK_Init....................................... 11 BoxedAppSDK_Exit....................................... 11 BoxedAppSDK_EnableDebugLog............................... 11 BoxedAppSDK_SetLogFile................................... 12 BoxedAppSDK_WriteLog.................................... 12 BoxedAppSDK_EnableOption................................
    [Show full text]
  • Guest OS Compatibility Guide
    Guest OS Compatibility Guide Guest OS Compatibility Guide Last Updated: September 29, 2021 For more information go to vmware.com. Introduction VMware provides the widest virtualization support for guest operating systems in the industry to enable your environments and maximize your investments. The VMware Compatibility Guide shows the certification status of operating system releases for use as a Guest OS by the following VMware products: • VMware ESXi/ESX Server 3.0 and later • VMware Workstation 6.0 and later • VMware Fusion 2.0 and later • VMware ACE 2.0 and later • VMware Server 2.0 and later VMware Certification and Support Levels VMware product support for operating system releases can vary depending upon the specific VMware product release or update and can also be subject to: • Installation of specific patches to VMware products • Installation of specific operating system patches • Adherence to guidance and recommendations that are documented in knowledge base articles VMware attempts to provide timely support for new operating system update releases and where possible, certification of new update releases will be added to existing VMware product releases in the VMware Compatibility Guide based upon the results of compatibility testing. Tech Preview Operating system releases that are shown with the Tech Preview level of support are planned for future support by the VMware product but are not certified for use as a Guest OS for one or more of the of the following reasons: • The operating system vendor has not announced the general availability of the OS release. • Not all blocking issues have been resolved by the operating system vendor.
    [Show full text]
  • Virtualization and Containerization of Application Infrastructure: a Comparison Mathijs Jeroen Scheepers University of Twente P.O
    Virtualization and Containerization of Application Infrastructure: A Comparison Mathijs Jeroen Scheepers University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT Modern cloud infrastructure uses virtualization to isolate applications, optimize the utilization of hardware resources and provide operational flexibility. However, conventional virtualization comes at the cost of resource overhead. Container-based virtualization could be an alternative as it potentially reduces overhead and thus improves the uti- lization of datacenters. This paper presents the results of a marco-benchmark performance comparison between the two implementations of these technologies, namely Xen Figure 1. A schematic overview of virtual ma- and LXC, as well as a discussion on their operational flex- chines in a datacenter. ibility. Keywords et al. [7], expects hypervisors to provide isolation and portability. The Xen [4] hypervisor is a popular technol- Hypervisor, Virtualization, Cloud computing, Application ogy and widely used at the moment. infrastructure, LXC, Xen, Container-based virtualization With recent developments around Docker [2] and LXC [3] there now seems to be a viable alternative to the hyper- 1. INTRODUCTION visor and traditional virtualization for application infras- According to Zhang et al. [20] virtualization technology tructures. Linux Containers (LXC) is a kernel technol- is an essential part of modern cloud infrastructure, such ogy that is able to run a multitude of processes, each in as Amazon's Elastic Compute Cloud (EC2) and Google's their own isolated environment. This technique is called App Engine. These days, most cloud computing datacen- container-based virtualization. Docker is a tool that makes ters run hypervisors on top of their physical machines.
    [Show full text]
  • The Impact of U3 Devices on Forensic Analysis
    Edith Cowan University Research Online Australian Digital Forensics Conference Conferences, Symposia and Campus Events 3-12-2008 The Impact of U3 Devices on Forensic Analysis R. Tank Edith Cowan University Patricia A.H. Williams Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/adf DOI: 10.4225/75/57b27e1f40cc6 6th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 3rd 2008. This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/adf/57 The Impact of U3 Devices on Forensic Analysis R. Tank and P.A.H Williams School of Computer and Information Science Edith Cowan University Perth, Western Australia Abstract Flash and USB portable drives are now in common place use in computing environments. The U3 smart drive is one emerging type of enhanced flash drive. It is believed that U3 smart drive devices do not leave any record or evidence on a host PC after use. Therefore, it is conceivable that it could be used in a digital crime or attack on a computer or networked system. In circumstances where a portable device such as a U3 has been used, it is more complex for a forensic analyst to find evidence of its use. This paper discusses the impact of U3 smart drive devices on a forensic investigation. Further, it describes the forensic investigation undertaken of a computer in which U3 was used. Keywords: U3, U3 smart technology, computer forensics, forensic investigation, forensic tools. INTRODUCTION Computer forensics broadly consists of identification, acquisition, analysis and reporting (Williams, 2008). It focuses on gathering digital evidence from devices such as computers and networks.
    [Show full text]
  • Rstudio and .Rnw-Files
    Rstudio and .Rnw-files. The compilation of .Rnw-files requires that both LATEX and R are installed on the computer,1 and furthermore, the R-package knitr must be installed in order for the compilation to work. The example file Rnw_Example.Rnw (that you hopefully got a copy of together with this file), will in addition require that the R-package xtable is installed. There are several editors available for R and LATEX,2 but few of these can deal properly with .Rnw-files. Among editors that can deal with the .Rnw-files, the optimal editor is Emacs, http://www.gnu.org/software/emacs/ (with the packages Auctex, http://www.gnu.org/software/auctex/ and Emacs Speaks Statistics, http:// /ess.r-project.org), but this editor requires some time to get used to (the time invested in learning emacs will pay of quickly, so it’s worthwhile to learn how to use it). For newbies it might be easier to try Rstudio, http://www.rstudio.com, which have a very simple solution for dealing with .Rnw-files, i.e. it’s “push a button”. But it’s important to be aware of some adjustments that must be made in the default settings before attempting to compile any .Rnw-file. Please consult the following support-page (and the links found there) https://support.rstudio.com/hc/ en-us/articles/200552056-Using-Sweave-and-knitr, in order to get up-to-date information about the present defaults in Rstudio, since things might have changed after this document was written in January 2016.
    [Show full text]