Acquiring Digital Data - Choosing Essay

A hash is a one way operation that is performed on a block of data to create a unique hash value that represents the contents of the data. No matter when the hash is performed, the same hashing algorithm performed on the same data will always produce the same hash value. If any of the data changes, the hash value will change appropriately. Hashes are not useful for encrypting data because they are not intended to be used to reproduce the original data from the hash value. Hashes are most useful to verify the integrity of the data when used with an asymmetric signing algorithm. ("Creating a Hash with CNG," 2010, para. 1)

In choosing a hash the one chosen for this essay is the HashTab Shell Extension to Windows, HashTab provides OS extensions to calculate file hashes. HashTab supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool. Hashtab is supported as a Windows shell extension and a Mac Finder plug-in. HashTab provides an easy way to verify file integrity and authenticity. The main reason for choosing HashTab is its ability to work with Windows XP and it is one of the easier hash programs to...

...

If two computer files are identical, then they will have the same hash value. Even if the files have a different name, if their contents are the same, exactly the same, they will have the same hash. This allows for easy identification and elimination of redundant documents. But if you so much as change a single comma in a thousand page text, it will have a completely different hash number than the original. There are no similarities in the hash numbers based on similarities in the files. Each number is unique. That is how the math in all hashing works. (Losey, n.d., para. 1)

Sources Used in Documents:

References

Creating a Hash with CNG. (2010). Retrieved from http://msdn.microsoft.com/en-us/library/aa376217 (vs.85).aspx

Losey, R. (n.d.). Computer Hash. Retrieved from http://e-discoveryteam.com/computer-hash-5f0266c4c326b9a1ef9e39cb78c352dc

Michael, Dr., & Penrod, L. (n.d.). How to Choose a Drive. Retrieved from htpp://www.directron.com/howtochoosesha.html


Cite this Document:

"Acquiring Digital Data - Choosing" (2010, August 13) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/acquiring-digital-data-choosing-9058

"Acquiring Digital Data - Choosing" 13 August 2010. Web.19 April. 2024. <
https://www.paperdue.com/essay/acquiring-digital-data-choosing-9058>

"Acquiring Digital Data - Choosing", 13 August 2010, Accessed.19 April. 2024,
https://www.paperdue.com/essay/acquiring-digital-data-choosing-9058

Related Documents
Digital Forensics
PAGES 6 WORDS 1974

Digital forensic can be described as a branch of forensic science surrounding the recovery as well as investigation of materials which are found within digital devices, in many occasion regarding computer crime. Originally the term was always used as a synonym for computer forensics; however it has spread out to be used in investigations of the entire devices with capability of storing digital data. Having its grounds in the personal

Sports Management The Emergence of Big Data in Sports Performance Management Introduction In the past twenty-five years, the amount of data available in this world has grown exponentially. In Western society in particular, we have become obsessed with the quantification of just about everything. One of the reasons is simple – there’s a lot more data out there, it’s relatively cheap to acquire, and there are just enough statisticians who know how to

Digital Technologies An investigation into the effects of DIGITAL TECHNOLOGIES on U.S. PRINTING INDUSTRY US Printing Industry Business Segmentation of Print Market Industry Trends Traditional Printing Digital Technology for Printing Effects of Digital Technology on Printing Industry Graphic Designing Work Flow Redefined Repurposing Strategic Integration Digital Media to Plate Advantages Disadvantages Challenges of Digital printing Industry Comparison of views on Issues Similar conclusions of Research Critical Aspects of Methodology Gaps in Research Previous Studies and Current Research Relatedness with Literature in General Method of Data Collection Ethical Considerations Results and Findings Positive Impacts of Digital

The rapid development of predictive routing algorithms that seek to anticipate security breaches are also becoming more commonplace (Erickson, 2009). Evidence acquisition through digital forensics seeks to also define preservation of all patterns of potential crime, regardless of the origination point (Irons, 2006). The collaboration that occurs in the open source forensic software industry acts as a catalyst of creativity specifically on this point. There are online communities that

Data Warehousing: A Strategic Weapon of an Organization. Within Chapter One, an introduction to the study will be provided. Initially, the overall aims of the research proposal will be discussed. This will be followed by a presentation of the overall objectives of the study will be delineated. After this, the significance of the research will be discussed, including a justification and rationale for the investigation. The aims of the study are to

solution of the heterogeneous data integration problem is presented with the explanation if the criteria to be employed in the approval of the validity. The tools to be used are also indicated. The proposed solution is to use semantic web technologies (Semantic Data Integration Middleware (SIM) Architecture) for the initial integration process (Cardoso,2007) and then couple it with broker architecture to improve integration and interoperability while solving the problem of