Thursday, July 19Care to be aware

Concepts

Disk Forensics : Process Overview

Disk Forensics : Process Overview

Concepts, Cyber Forensics
                                           Disk forensics is the science of extracting forensic information from digital storage media like Hard disk, USB devices, Firewire devices, CD, DVD, Flash drives, Floppy disks etc.. The process of Disk Forensics are Identify digital evidence Seize & Acquire the evidence Authenticate the evidence Preserve the evidence Analyze the evidence Report the findings Documenting                                                                                                                                                                                                                                                                                                                                           Identify digital ev
Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Concepts, Cyber Forensics
                                   Whenever we talk about the terms like wipe, shred, delete, or erase, we often use them interchangeably. It’s generally acceptable in layman terms but these technology terms have distinct meanings and specific uses. In this article, I’m going to tell you why it’s important to understand the underlying differences and working. What is Delete? Without a doubt, Delete is the common term on this list. In literal meaning, delete refers to the act of removing a file from a computer and smartphone. You might have noticed that the deleted files in your computer are sent to Recycle Bin. But, is that it? Whenever you perform the delete action on your computer, smartphone, or any other electronic device, you don’t get rid of it. The deleted file exists on you
Quick Format And Full Format: What’s The Difference and Which One Should I Use?

Quick Format And Full Format: What’s The Difference and Which One Should I Use?

Concepts, Cyber Forensics
The bookshelf and file system analogy Before going into the details of this answer, one should know the basics of how a file system is built. You can treat it like a bookshelf where books represent files and a catalogue is maintained to keep a record . Let’s consider a scenario where a book will be no longer present (a file is deleted from the disk) or some books are added that aren’t listed in the catalogue. In such case, there will be an error in the system, i.e. irregularities in the catalogue. Deleting files from a disk When you simply delete a file from your computer, it’s just like clearing out the catalogue but leaving behind the books in their shelves. Following that, when one adds a new book to the shelf, older books are replaced by new ones. Same happens with files. Having
Disk Defragmentation: What It Is and How Helpful Is It To Defrag My PC?

Disk Defragmentation: What It Is and How Helpful Is It To Defrag My PC?

Concepts, Cyber Forensics
You might have heard tech people talking about the need of defragging the PC to make it faster. It’s often recommended as a way to increase the PC performance. But, do You know the meaning of disk defragmentation? Do you know how often you need to defrag your storage drive? Well, as the name suggests, disk defragmentation sounds something like putting back the broken pieces together. In terms of PC management, it deals with picking up all the pieces of data spread across your hard drive and bringing them together. How does disk fragmentation occur? Most PC hard drives have spinning patterns and they store data in different places. While writing some new data, blocks are created that are sequentially ordered. When a file gets split between different far away blocks, fragmentation o
Malware Forensics : The Right Approach

Malware Forensics : The Right Approach

Concepts, Cyber Forensics
In many ways preparation is key to success. Look at any sporting event and the team who usually comes out on top are the ones who are better prepared. I'm not just referring to game day; I'm also talking about the coaching schemes and building a roster. Preparation is a significant factor to one's success in the Digital Forensic and Incident Response field. This applies to the entire field and not just malware forensics, which is the focus of this post. When you are confronted with a system potentially impacted with malware your ability to investigate the system successfully depends on your knowledge, experience, and toolset.  This is where there is a conundrum. There is a tendency for people not to do malware cases (either through being hired or within an organization) due to a lack of kn