Bearly Bytes January, 2011

Total Page:16

File Type:pdf, Size:1020Kb

Bearly Bytes January, 2011 Big Bear Computer Club Bearly Bytes January, 2011 Volume 20 Big Bear Computer Club Bearly Bytes Big Bear, California Award Winning Bearly Bytes Newsletter Next Meeting JAN 11, 2011 - 5:30 @ The BIG BEAR CHAMBER of COMMERCE MEETING PLACE FOR JANUARY 11TH SNOW SUMMIT SKI SLOPES AT NIGHT MOVED TO THE BIG BEAR CHAMBER BIG BEAR LAKE, CA OF COMMERCE BUILDING 5:30-8:00 AS THE DISCOVERY CENTER HAS BUILDING PROBLEMS. WHO VIEWS OUR BEARLY BYTES NEWSLETTER? The Big Bear Computer Club’s newsletter gets widespread visibility. Not only does it get posted on our website www.bigbearcc.org, it is emailed to our 100+ membership - both active and inac- tive. It is estimated that our newsletter is seen by approximately 600 viewers. Table of Contents Table of Contents Bearly Bytes goes out to various other Com- Viewership of Bearly Bytes Newsletter . .1 puter User Group Clubs in the Southern Califor- HelpMeeting Line change& Key Leaders. of venue . for. .January . .. .. .. .2 . .1 nia area. The newsletter is also sent out to our President’sHelpline & MessageKey Leaders . .. .. .. .. .. .. .. .. .. .. 3. 2 advertisers - both local internet advertisers and President’s Message . 3 Club Calendar & Cash Flow. 6 out of State advertisers. Election of Officers & Key Leaders. 3 Word/Excel/WindowMore Portable Utilities Tips. for . Your. Flash. Drive. .. .11 . 4 & 5 Copies of our newsletter also go out to Peach- Calendar, Cash Flow, Computer Links. 6 pit, Pearson, and O’Reilly book vendors who are Door Prize Winners. .12 great supporters of our Computer Club by do- Facebook me! A Book Review . 7 nating monthly free books for review. New Fixing Member That Wireless Application. Connection, . ………………….. .13 . 8 We are always looking for more advertiser sup- Shopping Safely Online . 9 & 10 porters. If you, or someone you know would like Word / Excel / Windows Tips . .11 to advertise, please contact Yomar Cleary at Clean It Up!. .11 [email protected] Barbara Moore Doing Well After Surgery. 12 BBV Youth Soccer League . ..12 New Member Application . ..13 1 Big Bear Computer Club Bearly Bytes January, 2011 Helpline Officers and Key Leaders The following members have generously offered President......................................Rosemary Lloyd to help you with your PC problems by Phone or 909.584.9358 [email protected] by email: Vice President……………………….Yomar Cleary 909.878.5622 [email protected] Windows Beginners Yomar Cleary 878-5622 [email protected] Treasurer........................................Barbara Moore 909.585.7981 [email protected] Windows XP, Vista, 7 Rosemary Lloyd Secretary………………….…..……...Tina Nazarian 584 9358 [email protected] 909.633.4516 [email protected] Director at Large ….…..…..................John Bryan MS Outlook Rosemary Lloyd 714.722.7514 [email protected] 584 9358 [email protected] Director at Large…………...Tracy Fulgoni-Marker 909.584.4466 [email protected] . MS Excel Yomar Cleary 878 5622 [email protected] Webmaster........................................Bill Flanagan 909.866.9379 [email protected] MS Publisher Yomar Cleary Newsletter Editor..............................Eileen Bryan 878 5622 [email protected] 714.580.4784 [email protected] Reviews Editor………………..………...Ron Fross Digital Photos Barbara Moore 951.769.1225 [email protected] 585 7981 [email protected] Publicity...........................................Yomar Cleary 909.878.5622 [email protected] CD Burning Rosemary Lloyd Equipment Chair...........................Don Odekirk 584 9358 [email protected] 909.585.6728 [email protected] Technical Advisor.................................Jim Lloyd Adobe Photoshop Rick Edwards 909.584.9358 [email protected] Photoshop Lightroom 547-0109 [email protected] Refreshments Chair...…………… Sharon Teeter 909.585.2026 [email protected] The Computer Club provides training at Membership Chair……………....Tina Nazarian the monthly meetings when there is no 909.633.4516 [email protected] presenter. SIG groups are also available. Parliamentarian............................David Philipson Beginners are welcome to attend the 909.585. 9389 [email protected] meetings on the 2nd Tuesday of the Historian..............................................Nancy Hinz month at the Discovery Center, 5:30 pm. 909.585.8095 [email protected] Bring a friend. First 2 visits are free! Sunshine Chair……….........................Grace Fross Membership is $25 and spouse $5. 951.769.1225 [email protected] All recurring membership dues are due in January. Name Tags—50/50…………………...Dorothy Sirk 909.585.3449 [email protected] 2 Big Bear Computer Club Bearly Bytes January, 2011 President’s Message General Meeting Minutes Rosemary Lloyd Tina Nazarian I read a cool article on news.cnet.com. It November 9, 2010 General Mtg. was about a space probe that NASA (No meeting in December) launched on Sept. 5, 1977. That probe, the Voyager 1 has travelled more than 10.8 bil- lion miles (as of Dec. 20, 2010). Its mission Elections of 2011 Officers at the November is to locate and study the boundaries of our Meeting is as follows: solar system. Voyager 1 has photographed fantastic images of our solar system’s plan- Officers ets and moons, even of Earth itself. Fasci- President…….…………….…..Rosemary Lloyd nating and wonderful stuff! Vice President………….……..…Yomar Cleary Anyway, it recently reached the outer limits Secretary………………..………..Tina Nazarian of our solar system. Voyager 1 is now the Treasurer……………….….……Barbara Moore most distant man-made object from Earth. What a deal! Director-at-Large.………..………….John Bryan Director-at-Large…………….……Tracy Marker DUES ARE DUE . Beginning in 2011, all members renewal date Key Leaders will be January 1. These changes will hope- fully make dues tracking a little easier. Webmaster…………………...…...Bill Flanagan Would like to thank those of you who have Reviews Editor……………………….Ron Fross sent in your dues already. Refreshments…………….……..Sharon Teeter Please feel free to contact me if you have Equipment Chair…………………..Don Odekirk any questions or concerns. We appreciate Technical Advisor……………..………Jim Lloyd any feedback from you regarding this Newsletter Editor………...………..Eileen Bryan change. Membership……………………...Tina Nazarian Historian……………………………..Nancy Hinz HAPPY HOLIDAYS AND A HAPPY NEW Sunshine Chair…………...………..Grace Fross YEAR !! Name Tags-50/50……….………...Dorothy Sirk Rosemary Lloyd Parliamentarian………………..David Philipson CONGRATULATIONS ONE AND ALL!! 3 Big Bear Computer Club Bearly Bytes January, 2011 MORE PORTABLE UTILITIES FOR YOUR FLASH DRIVE - by Ira Wilsker I continue to make extensive use of the 8GB flash drive that I carry on my keychain along with my car keys. Just yesterday, I was called to a relative's house to rescue a family computer that had been devastated by malware, such that the computer was nearly useless. Using the utilities on my flash drive, I was able to remove some stubborn malware, clean the hard drive, remove useless items from the startup, defragment the hard drive, and return the computer to good health. My relative had complained that the computer had previ- ously been so sluggish that it took several minutes to boot, then another three minutes just for Internet Ex- plorer to load, and that it took so long for web pages to load that he gave up using it. In less than an hour, us- ing those portable utilities, the computer ran like new; my relative was pleasantly surprised when the com- puter booted up in a few seconds. I asked him to time how long it took for Internet Explorer to load after the fix, and he was shocked to see IE load in about two seconds! Without my flash drive loaded with portable utili- ties, this would have been a much more difficult and time consuming job. Yesterday's desperate call for help from a relative was not an uncommon occurrence; just Wednesday, four days ago, another relative called in a panic saying that she had clicked on an apparent legitimate website, and her computer had been instantly hijacked by a type of malware referred to as a rogue antivirus program "Security Suite 2011". This scumware would not allow her to do anything on her computer until she "activated" the extortion-ware by paying a Russian cyber criminal $40 to clean her computer of the hundreds of (false positive) viruses and trojans that it found. Of course the program was a scam which actively loaded other malware on her computer, and took control of it for nefarious purposes, such as sending out spam emails. This malware took over her computer even though she had a top-selling name brand security pro- gram on her computer. Within an hour, I had sequentially run three antimalware programs from my flash drive, and her computer was cleaned of malware. These two calls for urgent assistance are in-line with the norm, as I get about three such calls in a typical week. It would have been very difficult for me to quickly clean these computers if it had not been for the portable versions of popular free software that I always carry with me on my flash drive. My 8GB flash drive attached to my keychain has been getting a lot of use lately, mostly on other people's computers. I have been steadily adding and updating software to it, enhancing its potential. One of the recent additions to my flash drive, which I used to remove the malware on the two computers discussed above, is the Sunbelt Software "Vipre Rescue" program, a free portable malware scanner and cleaner available for download from live.sunbeltsoftware.com. Vipre Rescue is an 81MB
Recommended publications
  • A New Generation of Hard Disk Recovery Software
    EASEUS Data Recovery Wizard Free Edition – A New Generation of Hard Disk Recovery Software NEW YORK CITY, N.Y., June 29 (SEND2PRESS NEWSWIRE) — EASEUS Data Recovery Wizard Free Edition, the innovative and leading data recovery software, has proven itself to be the first world-wide free hard disk recovery software and a new generation in its category since its release. Totally free and providing powerful features that no other free data recovery software like Recuva™ and Pandora™ have, even some commercial ones, it is the most popular and feature-rich hard disk recovery freeware for Windows today. With the use of computers continuing to increase, hard disk recovery is not a welcome task, but something that is very important for our business and daily life. Those who have computers know data loss is a common possibility because of accidental deletion, format, partition damage or loss, software crash, computer virus infection, power failure, etc. Whatever the cause, quality free hard disk recovery software is a preferable remedy to data loss and to get those lost files back quickly and easily. EASEUS Data Recovery Wizard Free Edition, the professional and comprehensive Windows disk recovery software, helps recover deleted or lost files easily from hard drive disks or other storage media whenever needed, and is tops in other areas due to: * Totally free and with powerful features of commercial ones; * Unformat files with original file name and storage paths; * FAT/NTFS Partition recovery when partitions are deleted or damaged; * Recover files from dynamic disk and RAID; * Recover lost files from Linux (EXT2/EXT3) files system under Windows; * Recover files from all kinds of storage media like external hard drive, USB disk, SD card, memory card; * Continue data recovery process at any time you want.
    [Show full text]
  • How to Know What Drivers to Download
    how to know what drivers to download How do I find the hard drive type and specifications? If you'd like to view detailed information about your hard disk drives, solid-state drives, or external storage devices attached to your computer, we recommend the methods below. System Information in Windows 10. In Windows 10, you can view information about your hardware (including disks) using the System Information utility . To open the System Information utility in Windows 10: Press the Windows key, type System Information , and press Enter . Or, you can use the Run box to open the System Information utility. Press the Windows key + R keyboard shortcut. In the Run box, type msinfo32 . Press Enter or click OK . In the System Information window that opens, in the left window pane, you'll see a list of hardware categories. Expand Components , then Storage . Then, choose Drives , Disks , or any category you'd like to view. Earlier versions of Microsoft Windows. In earlier versions of Microsoft Windows, you can open the System Information utility by following the steps below. Click Start and then click the Programs folder. Click Accessories and then the System Information or System Tools folder. Open the System Information file. In the System Information window, click the + symbol next to Components . Click the + next to Storage and click Drives . In the right-side of the window, you see information about the hard drive including its capacity and serial number. IBM-compatible users. IBM-compatible users can usually enter the computer's BIOS setup to view additional information about their hard drive.
    [Show full text]
  • Download Date 24/09/2021 14:31:55
    To Upgrade or Not To Upgrade Application Item Type Thesis Authors Francisco, Neil Download date 24/09/2021 14:31:55 Link to Item http://hdl.handle.net/20.500.12648/1799 To Upgrade or Not To Upgrade Application __________________________ A Master's Thesis Project Presented to the Department of Communication and Information Design __________________________ In Partial Fulfillment of the Requirements for the Master of Science Degree State University of New York Polytechnic Institute By Neil Francisco May 2021 TO UPGRADE OR NOT TO UPGRADE SUNY POLYTECHNIC INSTITUTE DEPARTMENT OF INFORMATION DESIGN AND TECHNOLOGY CERTIFICATE OF APPROVAL Approved and recommended for acceptance as a thesis in partial fulfillment of the requirements for the degree of Master of Science in Information Design and Technology. ____________________June 11, 2021 DATE ________________________________ Dr. Kathryn Stam Thesis Advisor ____________________ DATE ________________________________ Dr. Ryan Lizardi Second Reader 2 TO UPGRADE OR NOT TO UPGRADE ABSTRACT New Technology consists of new hardware devices, computational workflows, digital advances, and information systems. As technology continues to evolve over the years, this never-ending cycle of new devices and experiences will always be present amongst consumers. Traditionally, new hardware devices are intriguing because they are designed to improve our access to information, media, and a connection to the digital world, but does this mean our previous-gen devices are no longer valuable? This project involves creating a prototype application designed for both computer and mobile interfaces to help improve the accessibility to information and the overall user experience with an older device. The “To Upgrade or Not To Upgrade” app will inform end-users of their older technological device specifications and suggest hardware/software methods to unlock their full potential.
    [Show full text]
  • Using Speccy to Report on Your Computer Components
    Using Speccy to Report on Your Computer Components Ronald Ross [email protected] Today we’re going to have a look at what I consider to be a useful Windows reporting utility. I’ll be talking about Speccy, which is put out by Piriform. As is usual for many free software packages, you can also pay for personal and business support, but with Speccy there doesn’t seem to be much need for paid support. You can download both free and supported versions of Speccy at: http://www.piriform.com/speccy We won’t go through the download and install process, since it’s pretty self explanatory after clicking on the link above. Let’s just launch the tool and have a look at what it can show us. We will have a look at the outputs from both Windows XP and also Windows 7 in this document. In the screen shot above, we see summary information for a Windows XP, 32-bit machine. Each of the items listed in the left hand panel can be drilled down into for expanded information. Before we have a more detailed look at some of the components we see summarized, it might be useful to look at some of the general features of Speccy. Above we see that it is possible to take a full snapshot of a machine’s information. This snapshot can be reloaded later by Speccy for analysis, or comparison with some other snapshot. It’s also possible to publish the snapshot to a webpage with the Publish Snapshot… menu choice.
    [Show full text]
  • Defraggler Windows 10 Download Free - Reviews and Testimonials
    defraggler windows 10 download free - Reviews and Testimonials. It's great to hear that so many people have found Defraggler to be the best defrag tool available. Here's what people are saying in the media: "Defraggler is easy to understand and performs its job well. if you want to improve computer performance, this is a great place to start." Read the full review. LifeHacker. "Freeware file defragmentation utility Defraggler analyzes your hard drive for fragmented files and can selectively defrag the ones you choose. The graphical interface is darn sweet." Read the full review. PC World. "Defraggler will show you all your fragmented files. You can click one to see where on the disk its various pieces lie, or defragment just that one. This can be useful when dealing with very large, performance critical files such as databases. Piriform Defraggler is free, fast, marginally more interesting to watch than the default, and has useful additional features. What's not to like?" Read the full review. - Features. Most defrag tools only allow you to defrag an entire drive. Defraggler lets you specify one or more files, folders, or the whole drive to defragment. Safe and Secure. When Defraggler reads or writes a file, it uses the exact same techniques that Windows uses. Using Defraggler is just as safe for your files as using Windows. Compact and portable. Defraggler's tough on your files – and light on your system. Interactive drive map. At a glance, you can see how fragmented your hard drive is. Defraggler's drive map shows you blocks that are empty, not fragmented, or needing defragmentation.
    [Show full text]
  • Release 343 Graphics Drivers for Windows, Version 344.48. RN
    Release 343 Graphics Drivers for Windows - Version 344.48 RN-W34448-01v02 | September 22, 2014 Windows Vista / Windows 7 / Windows 8 / Windows 8.1 Release Notes TABLE OF CONTENTS 1 Introduction to Release Notes ................................................... 1 Structure of the Document ........................................................ 1 Changes in this Edition ............................................................. 1 2 Release 343 Driver Changes ..................................................... 2 Version 344.48 Highlights .......................................................... 2 What’s New in Version 344.48 ................................................. 3 What’s New in Release 343..................................................... 5 Limitations in This Release ..................................................... 8 Advanced Driver Information ................................................. 10 Changes and Fixed Issues in Version 344.48.................................... 14 Open Issues in Version 344.48.................................................... 15 Windows Vista/Windows 7 32-bit Issues..................................... 15 Windows Vista/Windows 7 64-bit Issues..................................... 15 Windows 8 32-bit Issues........................................................ 17 Windows 8 64-bit Issues........................................................ 17 Windows 8.1 Issues ............................................................. 18 Not NVIDIA Issues..................................................................
    [Show full text]
  • Architecture for Analyzing Potentially Unwanted Applications
    Architecture for analyzing Potentially Unwanted Applications Alberto Geniola School of Science Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 10.10.2016 Thesis supervisor: Prof. Tuomas Aura Thesis advisor: M.Sc. Markku Antikainen aalto university abstract of the school of science master’s thesis Author: Alberto Geniola Title: Architecture for analyzing Potentially Unwanted Applications Date: 10.10.2016 Language: English Number of pages: 8+149 Department of Computer Science Professorship: Information security Supervisor: Prof. Tuomas Aura Advisor: M.Sc. Markku Antikainen The spread of potentially unwanted programs (PUP) and its supporting pay par install (PPI) business model have become relevant issues in the IT security area. While PUPs may not be explicitly malicious, they still represent a security hazard. Boosted by PPI companies, PUP software evolves rapidly. Although manual analysis represents the best approach for distinguishing cleanware from PUPs, it is inapplicable to the large amount of PUP installers appearing each day. To challenge this fast evolving phenomenon, automatic analysis tools are required. However, current automated malware analisyis techniques suffer from a number of limitations, such as the inability to click through PUP installation processes. Moreover, many malware analysis automated sandboxes (MSASs) can be detected, by taking advantage of artifacts affecting their virtualization engine. In order to overcome those limitations, we present an architectural design for imple- menting a MSAS mainly targeting PUP analysis. We also provide a cross-platform implementation of the MSAS, capable of running PUP analysis in both virtual and bare metal environments. The developed prototype has proved to be working and was able to automatically analyze more that 480 freeware installers, collected by the three top most ranked freeware websites, such as cnet.com, filehippo.com and softonic.com.
    [Show full text]
  • Recuva Software Free Download Full Version for Windows 8 ->>->>->>
    Recuva Software Free Download Full Version For Windows 8 ->>->>->> http://shurll.com/78fy0 1 / 5 2 / 5 You..may..want..to..scan..your..system..for..spyware..and..viruses,..as..they..may..interfere..with..yo ur..ability..to..connect..to..Yahoo!Close..Update..Your..Review..Since..you've..already..submitted..a..r eview..for..this..product,..this..submission..will..be..added..as..an..update..to..your..original..reviewEd itors'....Review+....by:....Download.com....staff....on....September....10,....2014....Recuva....undeletes. ...files;....recovers....data....from....corrupted,....damaged,....and....reformatted....discs;....restores....u nsaved....Word....documents;....and....securely....deletes....files....so....they're....unrecoverable,....eve n....by....RecuvaAnother....Picture....recovery....software....(that's....free)....is....TestDisk....and....it's... .sister....program....PhotoRecThank...you,...manIncluding..both..32-bit..and..64-bit..versions,..but..not ..RT..tablet..editions.Builds..We..also..offer..a..portable..version..for..installing..on..USB..thumb..drive sreviewed....on....October....19,....2015....Read....all....reviews....Review........You....may....also....like... .....Recuva....PortableA....portable....tool....to....restore....accidentally....deleted....filesFreeEnglish....S peccyA....simple....way....to....get....your....system....specificationsFreeEnglish....DefragglerFree....def ragmenter....from....the....creators....of....CCleanerFreeEnglish....Speccy....Portable....Easy....portable. ...system....information....tool....for....your....PCFreeEnglish........Features........about....Recuva....list...
    [Show full text]
  • Anti Forensics Analysis of File Wiping Tools
    Anti Forensics Analysis of File Wiping Tools A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cyber Security by Narendra Panwar 14MS013 Under the Supervision of Dr. Babu M. Mehtre Associate Professor Center For Cyber Security, Institute For Development And Research In Banking Technology, Hyderabad (Established by Reserve Bank of India) COMPUTER SCIENCE AND ENGINEERING DEPARTMENT SARDAR PATEL UNIVERSITY OF POLICE, SECURITY AND CRIMINAL JUSTICE JODHPUR – 342304, INDIA May, 2016 UNDERTAKING I declare that the work presented in this thesis titled “Anti Forensics Analysis of File Wiping Tools”, submitted to the Computer Science and Engineering Department, Sardar Patel Uni- versity of Police, Security and Criminal Justice, Jodhpur, for the award of the Master of Science degree in Cyber Security, is my original work. I have not plagiarized or submitted the same work for the award of any other degree. In case this undertaking is found in- correct, I accept that my degree may be unconditionally withdrawn. May, 2016 Hyderabad (Narendra Panwar) ii CERTIFICATE Certified that the work contained in the thesis titled “Anti Forensics Analysis of File Wiping Tools”, by Narendra Panwar, Registration Number 14MS013 has been carried out under my supervision and that this work has not been submitted elsewhere for a degree. Dr. Babu M. Mehtre Associate Professor Center For Cyber Security, Institute For Development and Research in Banking Technology, Hyderabad May, 2016 iii Acknowledgment The success of this project work and thesis completion required a lot of guidance. I would first like to thank my supervisor, Dr. Babu M.
    [Show full text]
  • Name Link Description
    Name Link Description Rufus https://rufus.akeo.ie/ Create bootable USB drives the easy way Super Micro http://www.supermicro.com/support/ This is your one-stop area for access to product-specific resources resources/ including BIOS, Drivers, Manuals and Memory Compatibility Lists. Please choose from the following options: CCleaner http://download.cnet.com/CCleaner/? CCleaner is a freeware system optimization, privacy and cleaning tool. It tag=main;dlStartKitList removes unused files from your system allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. Glary http://download.cnet.com/Glary- Glary Utilities is a comprehensive system cleaner and performance booster Utilities/3000-2094_4- for your PC that includes an excellent suite of tools. You can take 10508531.html?tag=main;dlStartKit advantage of 1-Click Maintenance, or pick and choose the operations you'd List like the app to perform, all through its streamlined and intuitive interface. Kaspersky http://download.cnet.com/Kaspersky- Kaspersky Virus Removal Tool automatically removes viruses, Trojans, Virus Virus-Removal-Tool-2015/3000- rootkits, adware, or spyware. Removal 2239_4-76079830.html?tag=main;lsr Tool 2015 Tweaking.co http://www.bleepingcomputer.com/d A free suite of administration tools and system monitors that allows a user m ownload/tweakingcom-technicians- to quickly perform diagnostics on a computer. These tools allows for Technicians toolbox/ quickly fixing common problems on a computer or diagnosing what could Toolbox be causing them. It should be noted that this free version is only available for non-commercial users.
    [Show full text]
  • “Efficacy of Open Source Tools for Recovery of Unconventionally Deleted Data for Forensic Consideration”
    IJournals: International Journal of Social Relevance & Concern (IJSRC) ISSN-2347-9698 Volume 3 Issue 9, September 2015 “Efficacy of open source tools for recovery of unconventionally deleted data for forensic consideration” Vinay Singh*, Lav Kesharwani, Vaibhav Saran, A K Gupta, E.P. Lal, Amrita Verma Sam Higginbottom Institute of Agriculture, Technology & Sciences Deemed to be University, Allahabad [email protected]; [email protected]; [email protected] *Corresponding Author: Vinay Singh occurred or that deal with critical element of the offense such as intent or alibi. ABSTRACT Nelson et al., (2004) [9], explained that digital Overwriting of digital data can be defined as forensic involves scientifically investigating and obliteration of evidence in digital world. Most computer users today are familiar with the risk of their files being recovered even after deletion and scrutinizing data from digital device storage media hence many often use concept of overwriting their so that the data can be used as an evidence in court. [6] files instead of deleting them in order to prevent the Goel, (1985) , has clearly stated that software unwanted recovery of those files. Although there reliability can be assured if software faults do not are specialized tools available for the successful cause a failure during a specified exposure period retrieval of unconventionally deleted data but they in a specified environment. Understandably, are highly costly and require experienced technical unpredictable digital forensic software will lead to efficiency. In order to deal with the variations of untrustworthy results which may put at risk the digital evidences in eccentric situations it was whole forensics investigation.
    [Show full text]
  • Evaluation of Digital Forensics Tools on Data Recovery and Analysis
    Proceedings of the Third International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2016), Thessaloniki, Greece, 2016 Evaluation of Digital Forensics Tools on Data Recovery and Analysis Ioannis Lazaridis, Theodoros Arampatzis, Sotirios Pouros AMC Metropolitan College 14th El. Venizelou Str., 54624, Thessaloniki, Greece [email protected] ABSTRACT Image/Video/Audio Files System/Server/Network Log Files This paper presents a comparison and evaluation of Emails several digital forensics tools on data recovery Browser History/Cache scenarios. Modern tools have been tested and evaluated in order to provide evidence regarding Document Files such as their capabilities in qualitative analysis and .doc/.txt/.xml/.pdf recovery of deleted data from various file systems. Results derived from the comparisons, present the Hard drives are likely to include an Operating capability of each digital forensics tool. Based on System (or more than one), application variables and specifications, the tool with the best programs and user data stored in files. Hard performance is considered the most suitable drives also provide additional storage for application for analysing and retrieving files. A system information used by the processor if comparison between digital forensics tools takes necessary (backing store) [9-15]. place as well, alongside conclusions. The hierarchy of files is divided in six levels: KEYWORDS Level 0 (Regular Files): The Forensic analysis, Data Recovery, Encase, Autopsy, FTK imager, DFF, OSForensics, Recuva information contained in the file system. It includes the file names, file attributes and file content. Can be accessed 1 INTRODUCTION directly. Level 1 (Temporary Files): Temporary Digital forensics is the science which deals with files, including printed files (print the discovery, validation and interpretation of spooler), the cache of the browser and digital evidence found in electronic devices, files in the Recycle Bin.
    [Show full text]