Googling Forensics
نویسندگان
چکیده
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop PCs, and how the information cached and stored with these systems can be retrieved and analysed, even after the original document has been removed. Focusing on the free Google Desktop Search program, this paper first analyses how the program operates, the processes involved, files created and altered, and methods on retrieving this data without corrupting the contents. The limitations of extracting data from Google Desktop Search have also been discussed, along with some future work in the area.
منابع مشابه
Googling Forensics – an analysis of the Google Desktop Search
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop PCs, and how the information cached and stored with these systems can be retrieved and analysed, even after the original document has been removed. Focusing on the free Google Desktop Search program, this paper first analyses how the program operates, the processes involved, files created and altered, and...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کامل“Un-Googling”: Research Technologies, Communities at Risk and the Ethics of User Studies in HCI
Recent increase in volume of qualitative work on transnational technologies, HCI for development, virtual communities, and collaborative systems across a range of areas has resulted in focus on user communities whose very uniqueness may be of interest to HCI, but whose exposure in a research setting presents real threats to those individual’s or community’s livelihoods, work, or civil liberties...
متن کاملCombating Against Anti-Forensics Aligned with E-mail Forensics
Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...
متن کامل