Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 24_038624 bindex.qxp 4/4/06 10:57 PM Page 363 Index A anti-static bags, 21, 23 Access Data’s Forensic Toolkit, 9 AOL Instant Messenger (AIM), active partition, 62 306–307 ActivePERL (ActiveState), 189 application logs, 110, 146, 250–251 adapters as keystroke recorders, 155 ARP (Address Resolution Protocol) Ad-aware Antispyware, 114 spoofing, 158, 159 Address Book Recovery tool, arp -a command, 179 319–320 at command, 186 address books, 319–320, 323, ATA hard disks, 52, 55 333–334 Autocomplete feature (IE), 132, 284 Address Resolution Protocol (ARP) autoexec.bat file, 108, 115 spoofing, 158, 159 Autoruns (SysInternals), 131, 136 ADSs (alternate data streams), 76–78, 194 B AIM (AOL Instant Messenger), backup tapes. See tapes 306–307 Bearshare clients, 297–299 AIM password decoder (Digital best evidence rules, 26, 29 Detectives),COPYRIGHTED 309 bitwise MATERIAL duplication. See forensic AIM password recovery tool duplication (ElcomSoft), 309 bitwise searching AirMagnet sniffer, 160–161 index-based searching versus, alternate data streams (ADSs), 211–212, 219–220 76–78, 194 overview, 217–219 AnaDisk recovery software (NTI), 58 regular expressions for, 212–214 AnaDisk software (NTI), 41 search methodology and, 219–220 Analog Web analyzer, 263, 270 bookmarks (Firefox), 285–288 363 24_038624 bindex.qxp 4/4/06 10:57 PM Page 364 364 Index Bookmarks.htm file (IE), 276 commercially pressed, 46 Boot and Nuke utility (Darik), 67, 96 common file types, 124 boot partition, 62 direct duplication for, 203 boot process, 60–61. See also startup for hard disk duplication storage, boot sector 205–206 FAT32 file system, 68–69, 349–351 lifespan issues for CD-Rs, 195 NTFS file system, 78–81, 353–354 rewritable, 46–47 bootable CDs scratched, repairing, 47–48 for hard disk duplication, 198, 199 volatility of data, 141–142 Helix forensics environment, write-once, 46 85, 96, 190, 199, 210 CERT (Computer Emergency Internet resources, 210 Response Team), 7, 9 with NTFS support, 85, 198 certification, 6, 8 BOOT.INI file, 99, 108 chain of custody, 25–26, 339–340 browsers. See Firefox; Internet ChaosReader tool, 162–163, 189 Explorer cipher command, 92 BVG’s Outlook Email Recovery CIRT (computer incident response tool, 338 team), 3, 6–7 bypassing NTFS permissions, 84–85 clipboard, 168, 186 ClipSrv service, 186 C clusters, 41, 66, 70–71 .cab compression, 87 CMC (Computer Management cables console), 139, 145–150 for hard disk duplication, 197 cmd.exe versus command.com, 169 as keystroke recorders, 155 collection kit for evidence, 20–21 labeling before disconnecting, 23 command line overt analysis power, removing at the PC, 23 command.com versus cmd.exe, 169 sniffer, 157, 164–165, 191 GUI-based analysis versus, cache files (Web), 281–282, 289–290 166–167 California personal information local, 169–170 disclosure law, 28, 29 redirecting output to a file, 170 cameras, covert, 144, 154–155 remote, 170–173 Camouflage steganography command.com versus cmd.exe, 169 software, 235 command-line scheduler, 186 Cantenna construction, 161, 189 compact command-line tool, 86–88 Casey, Eoghan (Digital Evidence and compression Computer Crime), 8 .cab, 87 CDFS (CD File System), 47 finding compressed files, 243–244 CDs. See also bootable CDs for forensic duplication storage, burning (case study), 125 195, 200–201 CD File System (CDFS) for, 47 GNU gzip for, 200–201 24_038624 bindex.qxp 4/4/06 10:57 PM Page 365 Index 365 lossy algorithms for, 86 cross-site scripting attacks, NTFS, 85–88 264–265, 270 Computer Emergency Response CRT (Console Registry Tool), 118 Team (CERT), 7, 9 CryptCat tool, 170, 190 computer forensic analysts, 2–3, 6, Cygwin environment, 4, 9, 67 8, 12 Computer Forensics (Kruse & D Heiser), 8 Darik’s Boot and Nuke utility, 67, 96 computer incident response team DAT files (FastTrack clients), 301 (CIRT), 3, 6–7 data recovery agents (DRAs), Computer Management console 88–89, 90 (CMC), 139, 145–150 data wiping, secure, 67, 205 computer screens, 19–20, 167 dates and times config.sys file, 108, 115 FAT format for, 73 Console Registry Tool (CRT), 118 forensic analysis and, 72 Cookie Editor (ProXoft), 309 mass deletions and, 231 cookies, 283–285, 291–292 recording for overt analysis, 174 CookieView (Digital Detectives), 309 regular expressions for, 212–213 copying. See also forensic duplication DBB files (FastTrack), 301–302 ADSs and, 78, 194 dd program best evidence rules and, 26 in barebones starter kit, 7 compression and, 87 as court tested, 26 dumping memory contents, for data wiping, 67 187–189 for dumping memory, 187–189 failings of, 193–194 for searching non-file content, 216 files from tapes, 44 for splitting drive image files, 200 forensic duplication versus, 193 website for Windows version, 210 full-screen captures, 167 Decode tool, 72 log files, 208–209 defragmentation, 71 volatile data quickly, 18 degradation The Coroners Toolkit (TCT), 8 of CDs and DVDs, 195 covert live system analysis. See also of floppy disks, 41 system state analysis of tapes, 45 defined, 139, 144 deletions. See also file recovery Internet resources, 189–191 actions taken by, 225–226 major activities, 139 data wiping, 67, 205 monitoring user activities, 154–165 mass, within short period, 231 non-digital means, 144 meta-entries and, 231 risk of detection, 140, 144 reconstructing MBR entry for system state analysis, 144–154 partitions, 64–65 CPU, volatility of data and, 141, 142 Device Manager, 147, 148 24_038624 bindex.qxp 4/4/06 10:57 PM Page 366 366 Index differential backup method, 45 drives required for analysts, 7 Digital Detectives, 309 for hard disk duplication storage, Digital Evidence and Computer Crime 205–206 (Casey), 8 lifespan issues for DVD-R Digital Intelligence write blockers media, 195 FireFly, 196, 210 rewritable, 46–47 Ultrablock, 39, 58, 196, 210 scratched, repairing, 47–48 directional antenna, wireless, UDF and UDF-Bridge file 161, 189 systems, 47 disk cache, volatility of data in, 143 volatility of data, 141–142 DiskExplorer (Runtime Software), 83 write-once, 46 diskpart command, 63 Dynamic Link Libraries (DLLs), 167 displaying. See viewing or dynamic memory-based devices, 18 displaying DLLs (Dynamic Link Libraries), 167 E DNS, 178, 294 eDonkey2000 clients, 302 documentation for equipment, 20 EEPROM, 48–49 documenting the crime scene EFS (Encrypting File System), chain of custody, 25–26, 339–340 34, 88–92 defined, 12 ElcomSoft’s AIM password recovery forensic photography for, 19 tool, 309 importance of, 18 email investigations. See also specific labeling cables, 23 clients live system analysis and, 140 email headers, 334–338 written records, 18–19 gamut of violations, 311–312 Documents and Settings directory, inappropriate usage, 312–314 98, 99–102 Internet resources, 338 DOSKEY command, 173–174 Lotus Notes, 326–334 DRAs (data recovery agents), Outlook, 314, 321–324 88–89, 90 Outlook Express, 314–320 drive mapping, 150–151 overview, 138 DSL lines, 15 store-and-forward protocol for, 311 DSniff, 158, 190 tracking an email’s source, 334–338 dtSearch Desktop search tool, Usenet and NNTP, 325–326 215–217, 225, 244 Web-based mail clients, 312 dumping memory contents, 187–189 EMC VMWare, 4, 9, 133, 135 duplication. See copying; forensic EnCase (Guidance Software) duplication for bitwise searching, 217 DVDs for bypassing NTFS commercially pressed, 46 permissions, 85 direct duplication for, 203 as court tested, 26 24_038624 bindex.qxp 4/4/06 10:57 PM Page 367 Index 367 covert monitoring and, 140 sorting, 248 described, 8 system logs, 252–253 disk wiping utility, 67 for system state analysis, 146 for negative hash analysis, 225 Event Viewer, 146, 247–248, 250 for non-Windows file systems, 63 evidence, digital for positive hash analysis, 223 chain of custody, 25–26, 339–340 regular expressions supported collection kit for, 20–21 by, 214 Federal Rules of Evidence, 26, 29 for remote acquisition and forensics and, 1–2 analysis, 202–203 locations for, 11, 13 for remote triage (case study), 16 processing the crime scene for, slack space analysis tool, 52 12, 22–23, 25 social engineering for safeguarding for court, 3 installing, 201 storage for, 27 website, 9 from tapes, 44 Encrypting File System (EFS), write blocking media for, 39, 196 34, 88–92 evidence, physical encryption chain of custody, 25–26, 339–340 cleaning up after converting, 92 collection kit for, 20 CryptCat analysis tool for, 170 items of interest, 20 data recovery agents (DRAs), 88–89 locked laptops and, 22 EFS, 34, 88–92 processing the crime scene for, finding encrypted files, 243–244 12, 19–20, 22 identifying encrypted files, 92 EVT files. See event logs public key, 88–89 ExchangeRecovery tool recovering information, 90–91 (Passware), 338 of registry information, 132–133 expand command, 87 steganography versus, 232 exporting event logs, 250 symmetric, 88–89 extended partitions, 62 environment variables overview, 105–106 F %SYSTEMROOT%, 98, 102–104 Fastbloc (Guidance Software), 39, 58 Ethereal sniffer, 161–162, 190 FastTrack clients, 301–302 Ethernet, 158, 197, 199–200 FAT file system. See also FAT32 file event logs. See also log files system application logs, 110, 146, 250–251 boot sector, 68 corrupt, repairing, 249 cluster map, 70–71 Event Viewer for, 146, 247–248, 250 date format, 73 exporting, 250 defragmentation, 70–71 filtering, 248, 250 FAT16, 32, 33 security logs, 110, 253–257 FAT12, 41, 66, 70, 226–228 24_038624 bindex.qxp 4/4/06 10:57 PM Page 368 368 Index FAT file system (continued) overview, 138 file allocation table, 68, 69–70 for paging files, 241–243 fragmentation, 70–71 positive hash analysis, 223–224 historical overview, 66, 68 for print spool files, 236–239 root directory entry, 71–72 regular expressions for searches, value for forensic examiner, 65 212–214 FAT32 file system.
Recommended publications
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 version 1809 (October 2018 Update) Microsoft Windows Server 2019 (October 2018 Update) Security Target Document Information Version Number 0.05 Updated On June 18, 2019 Microsoft © 2019 Page 1 of 126 Microsoft Common Criteria Security Target Version History Version Date Summary of changes 0.01 June 27, 2018 Initial draft 0.02 December 21, 2018 Updates from security target evaluation 0.03 February 21, 2019 Updates from evaluation 0.04 May 6, 2019 Updates from GPOS PP v4.2.1 0.05 June 18, 2019 Public version Microsoft © 2019 Page 2 of 126 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
    [Show full text]
  • SEFS: Security Module for Extensible File System Architectures
    SEFS: Security Module for Extensible File System Architectures Þ Þ Lu´ıs FerreiraÝ , Andr´eZ´uquete and Paulo Ferreira Ý ISEL/INESC, Þ IST/INESC g fluis.ferreira, andre.zuquete, paulo.ferreira @inesc.pt Abstract ethical access by file server’s administrators; or (iv) unauthorized accesses to users’ files by an attacker Data security is a fundamental issue in modern com- capable of impersonating them. Whence, access con- puter systems. In particular, data storage systems are trol mechanisms, either physical or logical, aren’t bul- frequently subject to attacks and so need protection. letproof, and that may be a major concern for people Typical storage systems rely on access control mecha- dealing with sensitive data. nisms, either physical or logical, to prevent unautho- To make it even worse, current distributed file sys- rized users from accessing stored data. However, such tems exacerbate some of the previous problems and mechanisms are useless against non-ethical attitudes introduce new ones. On distributed file systems peo- taken by privileged users, like system administrators. ple have to trust on: (i) the physical security of remote Thus, the ultimate solution for ensuring the privacy of file servers, (ii) administration teams (that may blur sensitive data is to use cryptographic techniques. individual non-ethical attitudes), (iii) the capability This article describes the design and implemen- of remote authentication mechanisms to prevent per- tation of a security module, for extensible file sys- sonification, and, finally, (iv) they have to trust that tem architectures (SEFS), that enforces file security attackers cannot understand or modify data flows using cryptographic techniques.
    [Show full text]
  • Review NTFS Basics
    Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University, Bardsir, Iran Abstract: The Windows NT file system (NTFS) provides a combination of performance, reliability, and compatibility not found in the FAT file system. It is designed to quickly perform standard file operations such as read, write, and search - and even advanced operations such as file-system recovery - on very large hard disks. Key words: Format, NTFS, Volume, Fat, Partition INTRODUCTION Formatting a volume with the NTFS file system results in the creation of several system files and the Master File Table (MFT), which contains information about all the files and folders on the NTFS volume. The first information on an NTFS volume is the Partition Boot Sector, which starts at sector 0 and can be up to 16 sectors long. The first file on an NTFS volume is the Master File Table (MFT). The following figure illustrates the layout of an NTFS volume when formatting has finished. Fig. 5-1: Formatted NTFS Volume. This chapter covers information about NTFS. Topics covered are listed below: NTFS Partition Boot Sector NTFS Master File Table (MFT) NTFS File Types NTFS File Attributes NTFS System Files NTFS Multiple Data Streams NTFS Compressed Files NTFS & EFS Encrypted Files . Using EFS . EFS Internals . $EFS Attribute . Issues with EFS NTFS Sparse Files NTFS Data Integrity and Recoverability The NTFS file system includes security features required for file servers and high-end personal computers in a corporate environment.
    [Show full text]
  • Building Windows File Systems: a Look at the Openafs Client for Windows
    Building Windows File Systems: A Look at the OpenAFS Client for Windows Peter Scott Kernel Drivers, LLC Jeffrey Altman Your File System, Inc 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. AFS History … on Windows The SMB Interface Used the Loopback Adapter for NetBIOS name registration All requests were processed by the AFS Service in user mode Minimal kernel level caching Lack of support for network browsing within Explorer 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 2 More History … ‘Relatively’ easy to implement but problems … Performance Generic solution to fit all situations Microsoft components, very difficult to get bugs fixed Several critical bugs found in SMB with no fix in sight Ex: Static thread worker pool count leads to dead locks Documentation is minimal, at best Reliant on the Windows redirector for network behavior … good and bad 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 3 A Native Approach … Custom File System Pros … Complete control of name space parsing Reparse Points Mount Points DFS Links Better optimization of IO pathways Minimize Kernel to User transitions Cache invalidation requirements Better system cache integration Support for write-through behavior when needed 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 4 A Native Approach … And the down side … Complex implementation Undocumented interfaces srvsvc, wkssvc, IPC$ Network Provider support Cache and Memory Manager Must deal with 3rd party products File system filters 2010 Storage Developer Conference. Kernel Drivers, LLC. All Rights Reserved. 5 Windows File System Model Windows IFS (Installable File System) Interface IRP Based model IO Request Packets ‘Fast IO’ Interface used for more than just IO Direct-call model, no IRPs … almost Network Provider Interface for Network Redirectors only Support for drive mappings UNC Browsing 2010 Storage Developer Conference.
    [Show full text]
  • Microsoft NTFS for Linux by Paragon Software 9.7.5
    Paragon Technologie GmbH Leo-Wohleb-Straße 8 ∙ 79098 Freiburg, Germany Tel. +49-761-59018-201 ∙ Fax +49-761-59018-130 Website: www.paragon-software.com E-mail: [email protected] Microsoft NTFS for Linux by Paragon Software 9.7.5 User manual Copyright© 1994-2021 Paragon Technologie GmbH. All rights reserved. Abstract This document covers implementation of NTFS & HFS+ file system support in Linux operating sys- tems using Paragon NTFS & HFS+ file system driver. Basic installation procedures are described. Detailed mount options description is given.File system creation (formatting) and checking utilities are described.List of supported NTFS & HFS+ features is given with limitations imposed by Linux. There is also advanced troubleshooting section. Information Copyright© 2021 Paragon Technologie GmbH All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and re- trieval systems - without the written permission of the publisher. Products that are referred to in this document may be trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assumes no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may ac- company it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document.
    [Show full text]
  • Microsoft Windows Common Criteria Evaluation Security Target
    Microsoft Common Criteria Security Target Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 (Creators Update) Security Target Document Information Version Number 0.06 Updated On June 14, 2018 Microsoft © 2017 Page 1 of 102 Microsoft Common Criteria Security Target This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious.
    [Show full text]
  • Microsoft Windows "Chicago"
    Microsoft Windows ‘‘Chicago’’ Reviewer’s Guide Beta-1 The information discussed in this guide is based on features and functionality present either in the Beta-1 release of Chicago, or planned for a future release. The discussion of Chicago herein, does not represent a commitment on the part of Microsoft for providing or shipping the features and functionality discussed in the final retail product offerings of Chicago. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Table of Contents INTRODUCTION ....................................................1 Welcome ..................................................................................1 Chicago Mission......................................................................1 Where We’ve Been.................................................................................................1 Where We Are Today.............................................................................................1 Where We’re Headed .............................................................................................2 How We Get There.................................................................................................3 A Quick Preview of Chicago’s Top Features ........................4 Even Easier.............................................................................................................4 Faster and More Powerful ......................................................................................5
    [Show full text]
  • Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS)
    Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS) José M. Rodríguez Justiniano Computer Science Jeffrey L. Duffany, Ph.D. Computer Science Department Polytechnic University of Puerto Rico Abstract This tutorial is intended as in-class Oracle Virtual Box: is a general-purpose full laboratory exercise for computer forensics classes virtualizer for x86 hardware, targeted at server, at the Polytechnic University of Puerto Rico. It’s desktop and embedded use. Refer to Figure 1. specifically designed to provide basic understanding on the functionalities and capabilities of the tree most used file systems FAT16, FAT32, and NTFS. This document provides an inside or raw view of the files systems structure and how it handles data. It first covers the creation of a lab environment using openly available applications and the use of Hexadecimal Editors or Disk Editors to view and modify data. Key Terms Electronic Data, Forensics, File Figure 1 Systems, Hex Editor, Storage Device, Tutorial. Oracle Virtual Box INTRODUCTION HxD: is a carefully designed and fast hex editor which, additionally to raw disk editing As defined a File System is a means to and modifying of main memory (RAM), organize data expected to be retained after a handles files of any size. Refer to Figure 2. program terminates by providing procedures to store, retrieve and update data, as well as manage the available space on the device which contains it. File systems are used on data storage devices such as hard disk drives, floppy disks, optical discs, or flash memory storage devices to maintain the physical location of the computer files.
    [Show full text]
  • Using Quasigroups for Secure Encoding of File System Abstract 1. Introduction
    Using Quasigroups for Secure Encoding of File System Eliška Ochodková, Václav Snášel [email protected], [email protected] Department of Computer Science Faculty of Electrical Engineering and Computer Science Technical University of Ostrava Ostrava, Czech Republic Abstract In this article we discuss a method for encoding a file system based upon properties of quasigroups. The presented cipher, due to its simplicity, can be easily implemented, giving in consequence a very fast enci- phering and deciphering. Beside that, the method can be very secure and resisting to any attack. Keywords: file system, quasigroups, Latin square, cryptography, stream ciphers. 1. Introduction Cryptography deals with the transformation of ordinary text (plaintext) into coded form (cipher text) by encryption, and transformation of cipher text into plaintext by decryption. Three of the most important services provided by cryptosystems are secrecy, authenticity, and integrity. Secrecy refers to a denial of access to information by unauthorized individuals. Authenticity refers to validating the source of a message. Integrity refers to an assurance that a message was not modified accidentally or deliberately in transit, by replacement, insertion or deletion. An ideal system might solve all of problems concurrently, i.e., using public keys; providing secrecy; and providing authenticity. Unfortunately no single technique has met all three criteria. Conventional systems such as DES [7] require management of secret keys; systems using public key components may provide authenticity but are inefficient for bulk encryption of data due to low bandwidths. The aim of this paper is to focus the reader’s attention to the existence of an algebraic system called qua- sigroups and to show that it can be applied in cryptography for constructing stream ciphers.
    [Show full text]
  • A Study of Application Programming Interfaces for Mobile Operating Systems by Ashok Chakravarthy Mandala
    Platform Leadership through System Interfaces: A Study of Application Programming Interfaces for Mobile Operating Systems by Ashok Chakravarthy Mandala Bachelor of Engineering, Computer Science Birla Institute of Technology and Science, Pilani, India Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management at the Massachusetts Institute of Technology February 2007 © 2007 Ashok Mandala All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Auiithnr - Ashok Mandala System Design and Management Program February 2007 Certified by Michael A. Cusumano Thesis Supervisor Sloan School of Management Certified by Patrick Hale MASSACHUSETTS INSTITUT OF TEO-NOLOGY Director System Design and Management Program MAY 0 6 2008 ARCHGES LIBRARIES Platform Leadership through System Interfaces: A Study of Application Programming Interfaces for Mobile Operating Systems By Ashok C. Mandala Submitted to the System Design and Management Program on January 19, 2007 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management ABSTRACT The Smart Mobile device industry is witnessing rapid growth with the increased convergence of voice-centric mobile phones and data-centric personal digital assistant systems. Improving capabilities in device hardware have allowed development of complex user interfaces, multimedia and communication capabilities on these devices. Modem Mobile Operating Systems manage this complexity in the mobile device by administering hardware resources and providing a platform for development of new consumer and enterprise applications.
    [Show full text]
  • Accessing Linux Data Partitions from Windows
    ACCESSING LINUX DATA PARTITIONS FROM WINDOWS In a dual boot Windows-Linux computer, it is comparatively easier to view the Windows partitions from Linux, than the other way round, i.e., viewing Linux partitions from Windows. In this article, the author presents a way around this challenge. Today, in the world of computers, dual booting or running both Windows and Linux on the same system, is fairly common. In which case, users often want to transfer files/data between the two operating systems. Linux has native support for Windows file systems (NTFS and FAT), which means that you can access Windows partitions from Linux. But, this is not the case with Windows. To access Linux partitions from Windows, you need third-party software, specifically designed for this purpose. Basic differences between Windows and Linux file systems The file systems used in Windows and Linux are completely different in many ways from how the disks and devices are enumerated to the level of data security provided by them. The file systems used in Windows are FAT (FAT12, FAT16 and FAT32) and NTFS this last var systems. Linux supports a greater number of file systems like Ext2, Ext3, Ext4, XFS, JFS, etc. The predominant file system used in Linux is Ext3. On Windows, a disk is divided into partitions and exposed to the user through a drive letter. Even the CD-ROM and removable media get a drive letter. Linux doesn t use drive letters. On Linux, everything is under the root directory (/). Linux treats all the devices as files. All devices like disks and CD-ROMs connected to Linux will be mounted to the root directory or to any other directory under the root like /dev/sda and /dev/cdrom, respectively.
    [Show full text]