CD-R Acquisition Hashes Affected by Write Options

نویسندگان

  • Christopher Marberry
  • J. Philip Craiger
چکیده

During the copy-editing of your paper, the following queries arose. Please respond to these by marking up your proofs with the necessary changes/additions. Please write your answers on the query sheet if there is insufficient space on the page proofs. If returning the proof by fax do not write too close to the paper’s edge. Please remember that illegible mark-ups may delay publication. Many thanks for your assistance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Operating system security by integrity checking and recovery using write-protected storage

The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write p...

متن کامل

Physiological responses of Celtis caucasica L. and Robinia pseudoacacia L. to the cadmium and lead stresses

Afforestation of contaminated areas is considered as a possible strategy for reduction of contaminations. In the present study, the effects of lead (Pb) and cadmium (Cd) were investigated on chlorophyll fluorescence parameters (Fv/Fm, Fo, and Fm), photosynthetic pigments (chlorophyll a, b, and total chlorophyll), and proline in one-year-old seedlings of Celtis caucasica and Robinia pseudoacacia...

متن کامل

Unifying File System Protection

This paper describes an efficient and elegant architecture for unifying the meta-data protection of journaling file systems with the data integrity protection of collision-resistant cryptographic hashes. Traditional file system journaling protects the ordering of meta-data operations to maintain consistency in the presence of crashes. However, journaling does not protect important system meta-d...

متن کامل

Low Budget Forensic Drive Imaging Using ARM Based Single Board Computers

Traditional forensic analysis of hard disks and external media typically involves a “dead analysis” of a powered down machine. Forensic acquisition of hard drives and external media has traditionally been accomplished by one of several means: standalone forensic duplicator; using a hardware write-blocker or dock attached to a laptop, computer, workstation, etc.; forensic operating systems that ...

متن کامل

Factors Affecting One-Way Hashing of CD-R Media

While conducting a validation study of proficiency test media we found that applying the same hash algorithm against a single CD using different forensic applications resulted in different hash values. We formulated a series of experiments to determine the cause of the anomalous hash values. Our results suggest that certain write options cause forensic applications to report different hash valu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Digital Forensic Practice

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2006