Wednesday, September 19Care to be aware

Cyber Forensics

Disk Forensics : Process Overview

Disk Forensics : Process Overview

Concepts, Cyber Forensics
                                           Disk forensics is the science of extracting forensic information from digital storage media like Hard disk, USB devices, Firewire devices, CD, DVD, Flash drives, Floppy disks etc.. The process of Disk Forensics are Identify digital evidence Seize & Acquire the evidence Authenticate the evidence Preserve the evidence Analyze the evidence Report the findings Documenting                                                                                                                                                                                                                                                                                                                                           Identify digital ev
Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Concepts, Cyber Forensics
                                   Whenever we talk about the terms like wipe, shred, delete, or erase, we often use them interchangeably. It’s generally acceptable in layman terms but these technology terms have distinct meanings and specific uses. In this article, I’m going to tell you why it’s important to understand the underlying differences and working. What is Delete? Without a doubt, Delete is the common term on this list. In literal meaning, delete refers to the act of removing a file from a computer and smartphone. You might have noticed that the deleted files in your computer are sent to Recycle Bin. But, is that it? Whenever you perform the delete action on your computer, smartphone, or any other electronic device, you don’t get rid of it. The deleted file exists on you
How To Repair Corrupted Pen Drive or SD Card In Simple Steps?

How To Repair Corrupted Pen Drive or SD Card In Simple Steps?

Cyber Forensics, Tools
Dealing with a corrupted SD card or pen drive is a tedious task. We spend hours to get back our storage into working condition but get nothing. This article comprises of various methods which will help you repair your corrupted pen drive or SD card. For SD card, you will have to insert it into the slot provided in your computer or by using a card reader. Use adapter if you have a microSD card. It will not work if you connect some device having the SD card like a smartphone or a camera. Check out these different methods. Different methods to repair corrupted pen drive or SD card: Change the drive letter Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason, the files on it can’t be accessed. To resolve this issue, you ca
Quick Format And Full Format: What’s The Difference and Which One Should I Use?

Quick Format And Full Format: What’s The Difference and Which One Should I Use?

Concepts, Cyber Forensics
The bookshelf and file system analogy Before going into the details of this answer, one should know the basics of how a file system is built. You can treat it like a bookshelf where books represent files and a catalogue is maintained to keep a record . Let’s consider a scenario where a book will be no longer present (a file is deleted from the disk) or some books are added that aren’t listed in the catalogue. In such case, there will be an error in the system, i.e. irregularities in the catalogue. Deleting files from a disk When you simply delete a file from your computer, it’s just like clearing out the catalogue but leaving behind the books in their shelves. Following that, when one adds a new book to the shelf, older books are replaced by new ones. Same happens with files. Having
Disk Defragmentation: What It Is and How Helpful Is It To Defrag My PC?

Disk Defragmentation: What It Is and How Helpful Is It To Defrag My PC?

Concepts, Cyber Forensics
You might have heard tech people talking about the need of defragging the PC to make it faster. It’s often recommended as a way to increase the PC performance. But, do You know the meaning of disk defragmentation? Do you know how often you need to defrag your storage drive? Well, as the name suggests, disk defragmentation sounds something like putting back the broken pieces together. In terms of PC management, it deals with picking up all the pieces of data spread across your hard drive and bringing them together. How does disk fragmentation occur? Most PC hard drives have spinning patterns and they store data in different places. While writing some new data, blocks are created that are sequentially ordered. When a file gets split between different far away blocks, fragmentation o
Malware Forensics : The Right Approach

Malware Forensics : The Right Approach

Concepts, Cyber Forensics
In many ways preparation is key to success. Look at any sporting event and the team who usually comes out on top are the ones who are better prepared. I'm not just referring to game day; I'm also talking about the coaching schemes and building a roster. Preparation is a significant factor to one's success in the Digital Forensic and Incident Response field. This applies to the entire field and not just malware forensics, which is the focus of this post. When you are confronted with a system potentially impacted with malware your ability to investigate the system successfully depends on your knowledge, experience, and toolset.  This is where there is a conundrum. There is a tendency for people not to do malware cases (either through being hired or within an organization) due to a lack of kn
EnCase Forensic: A Guidance Software

EnCase Forensic: A Guidance Software

Cyber Forensics, Tools
Encase Forensic v7.05.02 is a tool for computer investigation that both searches a computer system for information, as well as aids in the process of developing this information into a complete report. This software can decrypt high-level forms of encryption, create an image of the physical drive, and then generate reports on the evidence. After some initial challenges - the package we received did not include all necessary information - we were able to contact the company and receive the files necessary to install the software. The company's customer service was helpful in getting us through the install process after we encountered problems getting the software fully functional. We must say it took a lot of time to finally get all the necessary information for the installation proc...
Popular Cyber Forensics Tools

Popular Cyber Forensics Tools

Cyber Forensics, Tools
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime. For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team. These computer forensics tools can also be classified into various categories: Disk and data capture tools File viewers File analysis tools Registry
How to make most of the Windows 10 Event Viewer?

How to make most of the Windows 10 Event Viewer?

Cyber Forensics, Tools
Do you ever wish to know if someone used your Windows computer without your permission? Few people know that an inbuilt utility named Event Viewer can help them out and tell lots of information like the start-up and shutdown time of their computers. To do this, one simply needs to open Event Viewer and filter the logs to see the required details.  Step 1: Open the Event Logger Way 1: Open it by search. Type event in the search box on taskbar and choose View event logs in the result. Way 2: Turn on Event Viewer via Run. Press Windows+R to open the Run dialog, enter eventvwr (or eventvwr.msc) and hit OK. Way 3: Open Event Viewer via Command Prompt. Open Command Prompt, type eventvwr and press Enter. Way 4: Turn Event Viewer on via Windows PowerShell. Open Windows PowerShell th