Retrieved from https://studentshare.org/information-technology/1463687-computer-fraud-tools
https://studentshare.org/information-technology/1463687-computer-fraud-tools.
This software works best in machines that contain 64MB or more of system memory, with a processor of Pentium II 400 MHz core or a more advanced processor than this, and lastly it can work in Vista, Windows 7, and XP, 98, 2000, 2002, and 2003 (Sammons, 2012). This program has the following features: deleted files recovery, missing folders and files recovery, live updates are available for the program, full support for long string variables and names, and it fully supports SCSI, EIDE, IDE, and PAN, SATA, ZIP drives (Mary-Jo Kranacher, Richard Riley, Joseph T.
Wells ,2010). It is used to recover files deleted from NTFS and FAT based operating systems. This program cost about $29, and can be accessed online with a full license or bought from different outlets worldwide. Disk doctors undelete (Mary-Jo Kranacher, Richard Riley, Joseph T. Wells, 2010) This program can recover deleted files on SATA, IDE, ATA, SCSI hard disk drives, memory sticks, SD cards, USB hard drives, and external Zip drives. It supports recovery in the FAT32, FAT, FAT16, NTFS5 and the normal NTFS file systems in the following operating systems: XP, 2003 and 2000, Windows VISTA (Sammons, 2012).
It recovers files that are accidentally deleted on a window running operating system. This software costs $49.00 USD. Tools that can be used to collect digital evidence from a cell phone are softwares, which use forensic abilities, to recover data that is not currently in the phone. These programs include; Cell phone and data mining (Androulidakis, 2012) This tool involves evidence from cellular devices playing a critical role in the component of data mining. This ability is often overlooked in the use of digital evidence (Androulidakis, 2012).
This tool involves the export of information from various digital devices like the cell phones. For cell phones, you export the call logs, stored files from the phone and possibly the net visited sites if it is web enabled. After exporting, then the data is imported into an analytical software package, whereby the experts and investigators using the data mining techniques can visualize and diagram a timeline of events or a criminal enterprise. To understand the complex relationships of the timeline of events and criminal enterprise, the graphical representation would do a lot better for investigators and the jury in the courtroom presentation on a criminal investigation.
an example of the is the AFLOGICAL 1.4 investigation tool (Androulidakis, 2012). This tool tested personal Information Management data was attempted including access to the multimedia messaging services, and it runs on Mac OS X 10.5.4. It is quite an expensive tool. Camera (Androulidakis, 2012) A cell phone camera can be used as a forensic tool to collect digital evidences (Androulidakis, 2012). A camera takes photos and subsequently stores them in memory in the phone or an external storage device.
These tools are fairly cheap and must be attached to the phone and connected to the phone system. So it must be compatible with the cell device that it is to be installed. Cell phone analysis tools These are tools that are used to read a SIM card. A SIM (subscriber identity module) accommodates text messages, recently dialed
...Download file to see next pages Read More