Forensic Tools For Computers Term Paper

PAGES
3
WORDS
1027
Cite

Zilla Data Nuker Test: Zilla Data Nuker

Software Title

Files created or downloaded leave a trace even when deleted. These traces allow skilled computer forensic professionals to retrieve the data. Zillasoft, LLC, a New England-based software developing entity provides Zilla Data Nuker that "Shreds sensitive files so they cannot be recovered or undeleted" according to the promotional material for the software. (Zilla Data Nuker 2.0) Zilla Data Nuker is freely downloadable from the ZDNet site at www.zdnet.com or can be obtained directly from the Zillasoft website at www.zillasoft.ws.

Software Functionality

Zilla Data Nuker uses what the company terms as "shredding algorithms" to obliterate data. Ostensibly the software is designed to be used to improve the functionality of a home or office computer by deleting unnecessary files from the hard drive. Zillasoft also claims that the software can function to help protect the user's privacy by completely destroying information targeted by Zilla Data Nuker. This tool might be used by someone who wants to delete personal files that contain sensitive information or by someone working for a company that is attempting to "prevent employees from wasting company time on things such as pornography and music downloading." (Rothke, 2004) Many companies are beginning to more closely examine the files on employee computers to assure that misuse is not taking place. Zilla Data Nuker claims that it can remove such files not just from visibility but from existence on the hard drive. Since the Enron case where data was destroyed by the terabytes, "recovery and analysis of data has come to form a central part of internal investigations." (Marlin, 2004)...

...

Some proponents of command line forensic tools "argue that most users really do not know what is going on when they 'point and click' their way around a computer forensic examination." (Kuchta, 2001) This may be a true statement but is somewhat beyond the scope of this text since the testing information is not being submitted in a legal proceeding. Conditions where the specifics regarding the process that the software uses to perform its function will often require software experts from the company that wrote the software to help solidify the reliability of the program in question.
'The Computer Forensics Tool Testing project at the National Institute of Standards and Technology (NIST), an agency of the United States Department of Commerce, was designed to provide a measure of assurance for the software tools used by law enforcement in computer forensics investigations." (General Test Methodology, 2001)

The test method is a combination of the software used for testing and the procedures for completing the testing. (General Test Methodology, 2001) Each of the applicable procedures mentioned in the U.S. Commerce Department prescribed methodology has been included below.

Title stating what product was tested: Zilla Data Nuker

Identification of the testing environment: Local corporate office.

The name and address of the vendor: Zillasoft, LLC. The address was unlisted on the website. After conducting a…

Sources Used in Documents:

References

General Test Methodology. v1.9. (2001). National Institute of Standards and Technology

U.S. Department of Commerce. Retrieved from http://www.cftt.nist.gov/Test%20Methodology%207.doc

Kuchta, Kelly J. (2001). Your Computer Forensic Tookit. Information Systems Security, (10) 49.

Retrieved from Academic Search Premier database.
Zilla Data Nuker 2.0. (n.d.) Retrieved from http://downloads-zdnet.com.com/Zilla-Data-


Cite this Document:

"Forensic Tools For Computers" (2005, January 27) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/forensic-tools-for-computers-61412

"Forensic Tools For Computers" 27 January 2005. Web.25 April. 2024. <
https://www.paperdue.com/essay/forensic-tools-for-computers-61412>

"Forensic Tools For Computers", 27 January 2005, Accessed.25 April. 2024,
https://www.paperdue.com/essay/forensic-tools-for-computers-61412

Related Documents

It is thus that technologies which work to yield that crucial data from the memory store of any such device have become so valuable to law enforcement in the age of terrorism. According to the Computer Forensics Tool Testing Program (CFTT), "a cellular forensic tool shall have the ability to logically acquire all application supported data elements present in internal memory without modification" (Ayers, 15) This is to indicate that

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Digital Forensics to Capture Data Sources Network Intrusion Prioritizing Data Sources Account Auditing Live System Data Intrusion Detection System Event Log Analysis Malware Installation Prioritizing data sources Activity Monitoring Integrity Checking Data Mining Insider File Deletion Prioritizing data sources Use of Uneraser program Recovers the Deleted Data Network Storage A recent advance in information technology has brought about both benefits and threats to business organizations. While businesses have been able to achieve competitive market advantages through the internet technology, the hackers are also using the opportunities

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Specialized forensic tools will be necessary to retrieve and analyze deleted, renamed and encrypted data that search tools will overlook. Further, forensic tools will help with complex information correlation. For example, to construct a timeline of events it may be necessary to tie network log stamps and data together with database access and usage logs. Reporting is the final phase of forensic investigation. Here, the article is weak, only recommending