Verified Document

Forensic Tools For Computers Term Paper

Zilla Data Nuker Test: Zilla Data Nuker

Software Title

Files created or downloaded leave a trace even when deleted. These traces allow skilled computer forensic professionals to retrieve the data. Zillasoft, LLC, a New England-based software developing entity provides Zilla Data Nuker that "Shreds sensitive files so they cannot be recovered or undeleted" according to the promotional material for the software. (Zilla Data Nuker 2.0) Zilla Data Nuker is freely downloadable from the ZDNet site at www.zdnet.com or can be obtained directly from the Zillasoft website at www.zillasoft.ws.

Software Functionality

Zilla Data Nuker uses what the company terms as "shredding algorithms" to obliterate data. Ostensibly the software is designed to be used to improve the functionality of a home or office computer by deleting unnecessary files from the hard drive. Zillasoft also claims that the software can function to help protect the user's privacy by completely destroying information targeted by Zilla Data Nuker. This tool might be used by someone who wants to delete personal files that contain sensitive information or by someone working for a company that is attempting to "prevent employees from wasting company time on things such as pornography and music downloading." (Rothke, 2004) Many companies are beginning to more closely examine the files on employee computers to assure that misuse is not taking place. Zilla Data Nuker claims that it can remove such files not just from visibility but from existence on the hard drive. Since the Enron case where data was destroyed by the terabytes, "recovery and analysis of data has come to form a central part of internal investigations." (Marlin, 2004)...

Some proponents of command line forensic tools "argue that most users really do not know what is going on when they 'point and click' their way around a computer forensic examination." (Kuchta, 2001) This may be a true statement but is somewhat beyond the scope of this text since the testing information is not being submitted in a legal proceeding. Conditions where the specifics regarding the process that the software uses to perform its function will often require software experts from the company that wrote the software to help solidify the reliability of the program in question.
'The Computer Forensics Tool Testing project at the National Institute of Standards and Technology (NIST), an agency of the United States Department of Commerce, was designed to provide a measure of assurance for the software tools used by law enforcement in computer forensics investigations." (General Test Methodology, 2001)

The test method is a combination of the software used for testing and the procedures for completing the testing. (General Test Methodology, 2001) Each of the applicable procedures mentioned in the U.S. Commerce Department prescribed methodology has been included below.

Title stating what product was tested: Zilla Data Nuker

Identification of the testing environment: Local corporate office.

The name and address of the vendor: Zillasoft, LLC. The address was unlisted on the website. After conducting a…

Sources used in this document:
References

General Test Methodology. v1.9. (2001). National Institute of Standards and Technology

U.S. Department of Commerce. Retrieved from http://www.cftt.nist.gov/Test%20Methodology%207.doc

Kuchta, Kelly J. (2001). Your Computer Forensic Tookit. Information Systems Security, (10) 49.

Retrieved from Academic Search Premier database.
Zilla Data Nuker 2.0. (n.d.) Retrieved from http://downloads-zdnet.com.com/Zilla-Data-
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensic Tools: The Use of Computers
Words: 1019 Length: 3 Document Type: Essay

Computer Forensic Tools: The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of

Forensic Science and Technology
Words: 2146 Length: 8 Document Type: Research Paper

Forensics in Criminal Investigations Exploring the Use of Forensics in Criminal Investigations Forensic Science and Technology This paper explores the role of forensic science and technology in modern criminal investigations. It first examines the nature and role of physical evidence in regards to how it is uncovered, preserved, and analyzed within forensics today. Physical evidence is described in the varying types and categories. Then, the paper moves to evaluating different types of forensic

Forensic Lab Forensic Crime Labs Are Important
Words: 975 Length: 4 Document Type: Essay

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Computer Forensic Investigation Making an
Words: 3228 Length: 12 Document Type: Research Paper

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

Forensics Evidence Elimination Tools the
Words: 790 Length: 3 Document Type: Essay

DIBS Forensic Workstation - Complete solution for problems faced by investigator of computer crimes; FREDDIE - Forensic recovery of evidence deice diminutive interrogation equipment; EnCASE - Fully integrated forensic application for Windows; and ProDiscover DFT - completely integrated Windows ™ application for the collection, analysis, management and reporting of computer disk evidence. Designed specifically to meet NIST (National Institute of Standards and Technology) standards. (Timberline Technologies, 2005) Harris (2005) states that if anti-forensic

Benchmarking Key Loggers for Gathering Digital Evidence on Personal...
Words: 8600 Length: 18 Document Type: Multiple Chapters

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now