Computer forenscis - Article Example

Comments (0) Cite this document
The various Linux distributions are used for basic operations at home or professional services, for example; in forensic labs (Dixon). Linux has…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Computer forenscis
Read TextPreview

Extract of sample "Computer forenscis"

Linux in Forensics Linux has various distributions that are very popular mainly because of the stability, better security and open source nature. The various Linux distributions are used for basic operations at home or professional services, for example; in forensic labs (Dixon). Linux has distinct advantages in a forensic lab setting; they are; availability and accessibility; the software is readily available on the internet. The source code is provided, and tools are carefully monitored for bugs. Efficiency; it allows much scripting and automation making it ideal for labs running more casework. Customization and optimization; the source code can be modified; therefore, the OS can be customized to suit the requirements of a particular lab. Support; its Adhoc support is excellent; mailing lists answer calls and provide assistance within minutes. It offers fast implementation of feature and patch requests.
Disadvantages; requires retraining, learning Linux takes time and effort, and the command line is not intuitive. Support; Linux offers no formal support organization. Support queries are direct to the community, and the answer quality varies considerably. Interoperating; interoperating with proprietary technologies is difficult, implementation takes time and may even be incomplete. Volunteer development effort; many projects are in perpetual development stage and may be edgy, poorly documented and abandoned (Wolfe).
In a forensic lab setting, both Linux and Windows have advantages and disadvantages. They are different but employ similar tools. The main difference is the approach taken in obtaining and interpreting the data. Recovery of data is crucial in forensics, and this is where Linux has an upper hand over Windows. Data on Linux is held for months even on heavily used systems. Linux file system avoids file fragmentation, and data remain clustered together. Deleted files are, therefore, easily recoverable on Linux than on Windows. Also, everything in Linux is noted as a file, and this translates to; any transaction occurring in Linux will leave traces (Grundy).
Works Cited
Dixon, P.D. An Overview of Computer Forensics. IEEE Potentials 24.5 (2005): 7-10. Web.
Grundy, Barry J. The Law Enforcement and Forensic Examiners Introduction to Linux. A Practitioners Guide to Linux as a Computer Forensics Platform 3.78 (2008): n. pag. Web. 16 Mar. 2015.
Wolfe, Dr.Henry B. Computer Forensics. Computers & Security 22.1 (2003): 26-28. Web. Read More
Cite this document
  • APA
  • MLA
(“Computer forenscis Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Computer forenscis Article Example | Topics and Well Written Essays - 250 words. Retrieved from
(Computer Forenscis Article Example | Topics and Well Written Essays - 250 Words)
Computer Forenscis Article Example | Topics and Well Written Essays - 250 Words.
“Computer Forenscis Article Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer forenscis

Zhu Bajie: Buddhism (personal sacrifice)

12 Pages(3000 words)Essay

Computer security

...?Assessment Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken. It also provides recommendations for them. Threats to the system...
6 Pages(1500 words)Essay


...?[Your full August 8, Preface In this essay, I have discussed how computer has made the life ofmodern man easier through the introduction of its fast and reliable services. The main theme is how computer has helped us cope with our conventional methods of, for example, manually writing down notes and copying them, playing games, saving pictures, and most of all, connecting with friends. To elaborate on this, I have presented anecdotes regarding how my friends and I decided to buy a computer to help us save manual work that consumed a lot of time and energy in the past; and, how computer enables people to connect with their long lost friends. My goal while writing this...
5 Pages(1250 words)Essay


...After reading Josh Coates’ article “Internet storage boosts Web sites”, I probably would not choose Internet storage for my digital pictures. Since I am an AOL user, I have enough storage (unlimited email storage) to save my vacation pictures in emails. I would attach my digital photos onto one, two, or as many emails as it took, and then I would email them to myself. I would then save my emails online. This would allow me to access my digital photos from any computer connected to the Internet. Even if my computer crashed, I would still have my vacation photos. The main reason I would not save my digital photos on Internet storage after reading Coates’ article is the inference Internet storage can be...
2 Pages(500 words)Essay


...Who is Bill Gates Bill Gates was born in Seattle on 28th October 1955. He is a son of an attorney who also teaches in a school. In the age of 17, Bill Gates sold out his first computer program that was a timetable system to a school for worth $ 4200. While studying in Harvard, he wrote the first computer language program along with Paul Allen, who was his friend. Both of them founded Microsoft in 1975, and after one year, Gates left out Harvard to run Microsoft and in 1986, the organization was storming upwards with a $ 61 million turnover (Jones 2006). Bill Gates, who is considered the architect of Microsoft, stands in the top twenty richest people in the world with assets of over $ 56 Billion (THE TOP...
4 Pages(1000 words)Assignment


... is also available in Ubuntu 11.10, so there is no difference in the way the Internet is accessed for e-mails or to retrieve information from websites. Summary Ubuntu was found to provide all the basic functionalities that are normally used in Windows. The interface for Ubuntu is although different from Windows Vista yet it is equally simple to use for even a person new to using computers. Similar to Windows Vistas, no advanced technical knowledge is necessary on part of user to learn to use Ubuntu 11.10. To summarize, Ubuntu 11.10 offers an equally sound alternative to Windows Vista.... Vista (using) vs. Ubuntu 11.10 (compared with) A few functionalities that are typically used in every Windows Vista machine were compared with the...
1 Pages(250 words)Essay


...Reflective Assignment Insert Reflective Assignment Essay Reflection on Bad Design It is clear that this essay met its objective in the sense that, it is precise and on point. The essay dwells on the concept of bad design. There are several reasons that bring about the conclusion that the essay met its required objectives. To begin with, there is no way one can issue a statement or discussion about bad design and fail to provide an example of a sample image (Ursula 2007). The fact that this essay contains a depiction of some sort of a switch clearly implies that the objective of describing a bad design has been met. According to the essay, the concept of technology had to come out clearly through sharing the image... Assignment Insert...
4 Pages(1000 words)Assignment

Computer their operations and require less training and educating compared to the past. Slow processor based computers, low capacity possessed hardwares and limited connectivity based systems and connecting devices define the present outlook, which can be replaced by a sleeker, efficient, and reliant set of component in form of modern equipment.  Make a formal recommendation to the IT group. Having observed the present state of affairs in the organization, it is being realized that changes are needed; these changes can come in form of properly conducted homework and feasibility studies to determine what exactly is needed and in what proportion, relevant to the budgets and resources availability. The formal recommendation list...
2 Pages(500 words)Essay


...Dell Inspiron 15R laptop A picture of Dell Inspiron 15R laptop as shown in the dell website, The Dell Inc. Computer Technology company provides a variety of computers. Among their products include the Dell Inspiron 15R laptop. This is a smooth laptop which is 17 percent thinner than preceding generations. The laptop is unique in nature since it offers the features of both mid-range and mid-sized computers, it is also flexible and is very efficient for operators who do not need neither a technical powerhouse nor a computer that withholds on the normal basic features. Also to mention, Dell Inspiron 15R laptop stands out from other machines in that in addition...
2 Pages(500 words)Essay


...COMPUTER SCIENCE SECTION A How to represent data A digital computer is created to process data. The circuits conduct mathematical operations that include division, multiplication, subtraction and addition. The numbers that are used in a digital computer are expressed in bits of binary digits and these include zero and one, zero, one, ten eleven, one hundred and so on. The binary digits can be defined in the circuitry of the computer by a current presence or absence of a voltage. A sequence of eight successive digits is referred to as byte, which can authorize 256 combinations (Knuth, 2003, p.67). Every bite can indicate 256 alphanumeric oddities referred to as SBCS....
6 Pages(1500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Computer forenscis for FREE!

Contact Us