Googling Forensics

نویسندگان

  • Benjamin Turnbull
  • Barry Blundell
  • Jill Slay
چکیده

This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop PCs, and how the information cached and stored with these systems can be retrieved and analysed, even after the original document has been removed. Focusing on the free Google Desktop Search program, this paper first analyses how the program operates, the processes involved, files created and altered, and methods on retrieving this data without corrupting the contents. The limitations of extracting data from Google Desktop Search have also been discussed, along with some future work in the area.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Googling Forensics – an analysis of the Google Desktop Search

This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop PCs, and how the information cached and stored with these systems can be retrieved and analysed, even after the original document has been removed. Focusing on the free Google Desktop Search program, this paper first analyses how the program operates, the processes involved, files created and altered, and...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

“Un-Googling”: Research Technologies, Communities at Risk and the Ethics of User Studies in HCI

Recent increase in volume of qualitative work on transnational technologies, HCI for development, virtual communities, and collaborative systems across a range of areas has resulted in focus on user communities whose very uniqueness may be of interest to HCI, but whose exposure in a research setting presents real threats to those individual’s or community’s livelihoods, work, or civil liberties...

متن کامل

Combating Against Anti-Forensics Aligned with E-mail Forensics

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals’ uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005