Verified Document

Computer Forensic Tools: The Use Of Computers Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.

Programs for Recovering Deleted Files:

There are various programs that can be used for recovering deleted files such as UndeletePlus, Disk Digger, and EnCase Forensics, which are associated with different success rates and particular functions. UndeletePlus is a program that is available for $29.95 and is very easy to use since it involves selecting a drive and clicking the Scan button. The program will then list any or all deleted files it finds or discover in the recovery process (Easttom & Taylor, 2011, p.287). On the contrary, DiskDigger is a freeware, which has a wizard interface that takes the user through the process. This involves...

Parts of this document are hidden

View Full Document
svg-one

EnCase Forensics the leader in digital forensics and available for $2,995 since it incorporates various features such as searching across various machines at the same time, automatic tasks, processing huge files at faster speeds, developing templates based on care profiles, and conducting more powerful queries.
These programs not only differ in costs and specific features, they also vary in the type of file systems supported. Since it works under nearly all Windows operating systems, UndeletePlus supports all Windows file systems for hard disk and removable disk drives such as FAT12/16/32, NTFS and NTFS5. As a result, this program is a quick and effective tool for retrieving files that have been accidentally deleted. In contrast, EnCase Forensics support FAT 12/16/32, NTFS, CDFS (CD-ROM), HFS, EXT2 (Linux), UDFS, and UFS (Unix) file systems. DiskDigger has an in-built support for different file systems like FAT12/16/32, NTFS, and exFAT systems.

Costs of Tools for Gathering Evidence from a Cell Phone:

Similar to computers, there are various tools that can be used to collect evidence from a cell phone with varying hardware and extra device requirements. Some examples for these tools include Paraben Software Device Seizure and Cellebrite UFED Ultimate, which differ in costs, features, and hardware requirements. Paraben Software Device Seizure consists of various features like file system acquisitions,…

Sources used in this document:
References:

DeMarco, M. (2012, March 8). Dharun Ravi Found Guilty in Rutgers Webcam Spying Trial.

NJ.com -- True Jersey. Retrieved December 14, 2013, from http://www.nj.com/news/index.ssf/2012/03/state_to_rest_its_case_against.html

Easttom, C. & Taylor, J. (2011). Computer crime, investigation, and the law (1st ed.). Stamford,

CT: Cengage Learning.
"Paraben's Device Seizure." (n.d.). Paraben Corporation. Retrieved December 14, 2013, from http://www.paraben.com/downloads/ds6-brochure.pdf
14, 2013, from http://www.cellebrite.com/images/stories/brochures/UFED-Touch-Ultimate-ENGLISH-web.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Science Fundamentals Too Often the Mechanistic
Words: 1481 Length: 5 Document Type: Essay

Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain

Computer Dependence the Story of Pandora's Box
Words: 1586 Length: 6 Document Type: Essay

Computer Dependence The story of Pandora's Box reveals the dangers that technology brings along with its many gifts. Today, some very interesting cultural changes are beginning to take hold of society that stems from the dependence on technology and the way that it is interwoven into culture. The purpose of this essay is to examine the relationship between computer technology and the corresponding dependence that is created by this relationship. This

Computer History Museum
Words: 802 Length: 3 Document Type: Term Paper

Computer History Museum: A virtual visit Description of the event The Computer History Museum has both an online and a 'real world' incarnation. It is a physical warehouse of different types of computers, a virtual catalogue of computer history throughout the ages, and also provides information about specific topics pertinent to computer history, such as the history of video games. The Museum contains artifacts such as the first calculators, 'punch cards' and

Computer Addiction: Causes and Potential
Words: 874 Length: 3 Document Type: Research Paper

This is what creates the continual need to share literally everything going on in their lives, as each post releases a significant dopamine rush (Charman-Anderson, 17, 18). Dopamine is also the reason why the many forms of computer addiction are so difficult to treat. With anonymity comes the opportunity to create multiple identities or personas online (Soule, 66, 67). This is what leads employees who have Internet addictions to create

Computer History It Is Said
Words: 1593 Length: 5 Document Type: Research Paper

In some areas it will be used for more populist applications such as, in schools to introduce students to the discipline and within an environment that will give opportunity for participation of non-academics in academic discussion. Conclusion Computer has in a great deal widened the world's knowledge. As the fastest technology that has ever evolved, it has given opportunity for the children and adults, for personal, academic and commercial use. It

Computer Forensics: Generally, Forensics Can Be Described
Words: 917 Length: 3 Document Type: Essay

Computer Forensics: Generally, forensics can be described as the process of using scientific knowledge in the gathering, evaluation, and presentation of evidence to the courts. Since forensics deal with the presentation of evidence to the courts, it basically deals with the analysis and recovery of hidden evidence. In this case, the hidden evidence may be in several forms including fingerprints, blood stains, and DNA evidence. On the other hand, computer forensics

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now