Mac vs Pc

Monday, February 26, 2007

What is Computer Forensics?

It is the end of the day and it has been discovered that several critical files are missing from your file server. That alone is normally is enough to freak out most server administrators, but this specific incident also happened to be on the exact same day a particular employee was 'terminated'. As you recall that individual, had access to the missing data, but as far as you know, she didn't seem like the type of person to do something malicious. Then again, you noticed she seemed pretty upset as she was clearing out her desk that day too. You begin to wonder if there is a connection between the two, and if so, how you collect the necessary information to present to your manager.

No, you are not imagining a scene from CSI or Court TV. This situation happens daily in real life and may have happened, or could happen, at the company you work for. Remember Enron?

What is Computer Forensics?

Computer forensics, sometimes known as "Digital Forensics" or "Electronic Evidence Discovery", is often described as "the preservation, recovery and analysis of information stored on computers or other electronic media".

Computer forensics has quickly become a vital tool and source of information for criminal investigators, corporate counsel, and prosecutors. Computer forensics investigators use their skills to identify and restore formatted, corrupted, deleted or hidden files from computers or other electronic media while maintaining crucial data trails, time & date stamps and accurate chain of custody & controls. They also obtain access to protected or encrypted data by using specialized software.

In addition, with the increased usage and dependence on the Internet, for corporate and individual communication, computer forensic investigators are equip to analyze emails, Internet searches, file transfers, online account transactions and anything else a computer is used to do over the Internet.

How do they do it?

Computer forensic investigators typically focus on 4 areas when investigating a potential incident. There are other areas of attention as well, but the following are the most common. Including illicit and damaging activities that could damage your company's reputation.

Saved Files

These are files that can be viewed on the computer. This is usually a non-intrusive task to obtain these files.

Deleted Files

These files are just that...deleted. They are either in the 'trash' or require special software to 'capture and restore' the files. This is usually a non-intrusive task to obtain these files.

Temporary Files

These files are typically generated from browsing the Internet, working on a document, some types of back-up software as well as certain software installations for example. Identifying these requires specialized software and is an intrusive process.

Meta Data

This information typically is associated with the details of a file or document. Such as, the date the file was created, modified and last accessed. Additional information that could be captured could include the original creator of the file (of course that information depends on the original installation of the application) as well as anyone who has ever accessed the file. Identifying these requires specialized software and may or may not be an intrusive process.


What would Computer Forensics Service be used for?

There are several possible uses for this type of service. The most common applications of computer forensics are as follows:


Divorce Cases
Electronic Investigation
Expert Witness Service
Corporate E-mail Investigation
Litigation Support
Intellectual Property Disputes
Investigation and Discovery Litigation Programs
Insurance Fraud Cases
Corporate Investigations
Corporate Counsel Support
Electronic Records Management

There are many reasons why you, or your company, may require the service of a computer forensics investigator. If you suspect that you may have an incident requiring computer forensic service, or electronic evidence discovery & analysis, you should secure the computer from further use and contact an experienced computer forensics service company.

Jason Perry

ADR Data Recovery is available to evaluate the damage and potentially recover your lost data. For more information on ADR Data Recovery's Computer Forensics service, visit http://www.computerforensicsassociates.com

Article Source: http://EzineArticles.com/?expert=Jason_Perry

Data Recovery World Wide

IT Managers all over the world are struggling to manage the tremendous growth of data and protect it. This data comes in all forms, such as: databases, e-mail, stored files etc. These data are stored permanently and archived to meet the regulatory requirements, and for changes in business functions.

The developments in information technology help us to store huge quantities of data in magnetic, optical and solid-state storing devices. Data is stored in the most commonly used storage devices, such as: hard disks, micro drives, multiple disks, tape/digital linear tapes, CD/DVDs, portable drives, Magneto Optical storage devices, removable disks, Zip drives, diskettes, compact flash/memory cards, and USB flash drives.

In order to store the data in various formats we use certain platforms or computer programmes. Every computer will have an operating system for starting the computer, running the applications and saving them in the storage device. The operating system helps the coordination of all the inputting devices like keyboard and mouse to enter and store the input information. The commonly used operating systems to store data are Windows 95/98/ME, Windows NT/2000/XP, Apple Mac, Novel Netware and UNIX.

Some times the data stored in a computer device is lost either due to ‘Physical Damage’ or ‘Logical Damage’ to the computer. Data recovery is a method of retrieving the lost data due to physical damage to the system or due to the logical damage to the application software. Data recovery also helps to retrieve even deleted information for forensic investigation.

Data is stored in the most commonly used storage devices discussed above. Sometimes these storage devices may start malfunctioning or stop functioning completely due to physical damage. Some of the common physical damages are: scuffs in the data CD or DVD discs, head crash or failed motor in hard disks and data tapes. Physical damage may also happen due to external occurrences, such as accidentally dropping of the devices, flood, or fire. Data lost due to physical damages can be recovered either fully or partially only by experts under ideal conditions.

The exact damage to the storage device is discovered and the extent of the damage is evaluated. The techniques of recovering the data are not the same for all physical damages. It is normally decided after finding out the details about the storage device, storage space, nature of files lost, operating system used and the name of the manufacturing company.

Firstly, the extent of physical damage is assessed using customised special tools. Then the storage device is opened in a special dust free room to prevent further damage. Data stored in magnetic form is analysed in detail using special equipment. Retrievable data is collected from the device in analogue form and later this data is converted into a digital format as readable data and copied in a new device for use. The percentage of data recoverable depends upon the amount of physical damage to the device.

Most of these storage devices are not fire and water proof. In case of fire, water should not be used to extinguish the fire. If water is used the data must be recovered before the water dries up and corrodes the metal surfaces. In case of flood the storage device must be continued to be kept in a wet condition without drying for recovery of data.

A hard disk with a high storage capacity is logically partitioned as individual storage units (e.g. C:, D: and E: etc) called ‘drives’ for use by the operating system. This logical partitioning saves the trouble of having a number of hard disks in the same system. Similar partitioning is done on tape storage units or any other storage unit with a different format. Logical damage is a more common problem than a physical damage. In the case of logical damage the storage devices will remain intact and usable but the data stored inside the devices is corrupted or lost.

Most of the logical damages are caused by sudden power failures. System crash is another form of logical damage where the operating system may fail to start or malfunction. In either of these situations the data file will not get stored appropriately and left in a conflicting condition. If infected by a virus the self-generated copies of the virus will overwrite the existing programmes and cause system malfunctioning and logical damage. Sometimes data is lost or erased due to formatting the computer partitions.

Unlike physical damage, logical damage comes with an option of self repairing tools. In normal conditions these tools are sufficient to restore work and recover the lost data. When these tools fail to correct the problem professional help should be sought. Initially, a consistency check is done to check the file structure and system information. If there is more damage in the file system the running of a consistency check will fail and crash and may never find the right system file. In another method the consistency check is not done and instead the complete drive is checked for file system structure and limits. Using this technique without disturbing or repairing the file system allows the data to be recovered and stored in a different device.

Data recovery is mostly used by big business, covert army activities, police authorities and tax authorities.

Current trends in data recovery management advises more back up services with improved storage facilities including online storing of data.

Article Source: http://EzineArticles.com/?expert=Rose_Davies

Malaysia Online : Related Link
data recovery software are they useful?

A Safety and Care Guide for Notebook or Laptop Computers

Notebook computers - also known as laptop computers - have become an important part of our lives. They are more affordable than ever and as popular as cell phones. A laptop computer has a versatility that the home PC does not provide. With its smaller size it is portable and easier to carry along. This makes it convenient to use in many situations. You can take it to work and back home as well as take it on more extensive travel.

Laptop computers are not just for older working people anymore. Because of its ease of use, more young people are using them for school and college. They can access the Internet almost anywhere and provide updates for work, research, and even games.

Taking Care of Your Laptop or Notebook Computer

It is important to take care of your laptop computer and protect it from accidents. They are designed for heavy use but common sense will tell you that you need to be prudent in your treatment.

One of the first recommendations is to buy a case designed for a notebook computer. These are made with padding to protect your laptop computer from wear and tear and protection in case you drop it. It is not good to carry your notebook computer unprotected or in a purse or backpack. You can easily find a case by shopping online where you will find 1000s of products to choose from.

Another important tip for laptop computer care is to keep food and drinks away from it. Even a small amount of liquid is enough to ruin the delicate components in the laptop computer. It means almost certain replacement, and most warranties will not cover it. It is not worth the risk to lose all your data.

Protect Your Notebook Computer

When using your laptop computer you should always use a surge protector. An electrical surge may not hurt it one time, but continued surges could destroy it. If you are using a cable or dial-up modem during a storm, be sure to unplug it. Lightening can travel through phone lines and ruin the laptop computer.

You should not leave your notebook computer in a cold environment. This can cause condensation when you return it to a warm area and could cause the circuitry to short it out. If it has been in the cold, let it warm up before turning it on.

When traveling with your laptop computer, be sure to charge all your batteries before you leave. You might not know when you will be able to charge them again. On a long trip, take extra batteries to avoid this problem. By shopping online, you can find the supplies you need as well as other products such as iPods, jewelry, games, toys, sporting goods, pet supplies and cell phones - even free gifts.

Do not leave your notebook computer unattended and do not check it as baggage when flying. Keep it in your hands at all times to avoid the possibility of theft. Don't try to disassemble or repair your laptop computer; this is a job for professionals. You may inadvertently cause more damage by your lack of knowledge.

Shopping Online

When you are ready to buy a laptop computer, cell phone, iPod, or other electronics, shopping online will provide everything you need.

Article Source: http://EzineArticles.com/?expert=Chris_Robertson

Important Advice On Adware Removal

Your computer is acting a little strange. It’s taking a little too long to go from page to page, even though you have high speed internet. Pages close at random for no apparent reason. You get strange little message from your computer that make no sense to you at all. Does this sound familiar to you? If it does, your computer may be bogged down by adware programs that are making your internet surfing feel more like internet sludging. You need a good adware removal program.

A simple plug in appliance can help you stop spam at its entry point. Your computer does not have to make you feel like you’re fighting your way through a swamp. An adware removal program can help you get rid of existing problems and protect you against future difficulties.

One of the biggest threats that most people are not even aware exist on their computers is tracking programs. More often than not, when you download anything on the internet, you are also downloading tracking programs. Some of these are harmful and some are less so, but many of them working together can make your computer sluggish. Mostly, tracking programs allow whoever you have downloaded it from to see what sites you are visiting and with what frequency. It helps them to make their sites and programs more appealing to the internet surfer. Sometime, tracking devices allow others to see what is in your computer, what information you are relaying across the internet, and thus target their product or service towards you. An adware removal program will help you get rid of the ones that are causing problems and quarantine the programs that are just inconvenient.

Adware removal programs can be bought online or in a computer store. You can pay to install some of the best programs available or you can download a program for free on the internet. Whatever you choose, you can research it first and find out what others have to say about it. Reading what others have to say about adware removal programs is a good way to find out which one might be best suited to your needs. Comparison shopping is always the best way to getting a program that is suited for you and not one that has way more capabilities than you need. While free downloads are good, they may not protect your computer the best when you consider your internet surfing habits. Spend some time to compare adware removal programs before you purchase or download and you’ll soon be surfing on the safest and most exciting wave of the season.

Rich Beasley works for a well known computer company in Los Angeles. You can visit his latest website concerning Spyware removal and other software resources.
http://www.software-world-online.com

Article Source: http://EzineArticles.com/?expert=Rich_Beasley

Malaysia Online : Related Link
virus attacks can you save your data ?

5 Tips to Avoid Needing Laptop Data Recovery

With the costs of laptops coming down and performance going up, it has become more viable for companies to equip their employees with laptops--for those who travel, work from home, or for those who just prefer them to full size computers. Individual users, from college students to self employed people, now use laptops too because they are not as expensive as they once were. And lets face it, sitting at Starbucks with a laptop is much more appealing than sitting in a 6x6 cube in an office.

Most people don't consider what they can do to protect their data should their laptop gets lost, stolen, or just have a bad hard drive that fails or corrupts the data on the disk. Below are 5 simple things users can do to safely reduce the chances of losing their important files.

Download your Email. Store a copy of your email on your company's email server. Most email software allows you to 'store a copy' on the server. Outlook does it, for example. Set this option in your settings and it will allow you to download messages to multiple computers.

Virus and Spyware Protection. Use an anti-virus software package, and protect your system with spyware software. This is a step all users should do to protect their computers. Viruses are all over the internet, from questionable websites to that cute email your Aunt Mildred just had to send. Be smart and invest in virus and spyware protection. And then get a copy of it for your Aunt. :)

CDs are Cheap! Use CDs or DVDs to quickly back-up critical files and store those CDs to a safe place. Make a weekly backup of your important files. If you get rewritable CDs, then you can use the same one a few times, though it would be best to not reuse them too much. CDs have issues too after time which may cause you to need data recovery as well...but it is a lot less expensive than recovering data from a hard disk!

Buy an External USB Hard Drive Use an external USB hard drive to do a complete back-up of your system. Now, some people use those little flash USB drives to back-up critical files, which is great (just don't loose it!). Others use the external USB hard drives which don't take up much room at all on a desk. Both are good options to consider.

Network Back-ups If you attach to a network, speak with your IT department to request that your laptop be added to a network back-up schedule. Or perhaps, give them your laptop before you go to lunch and have them back up your data. Most IT departments figure the laptop users are on their own, so by asking them for a little preventive help with your computer using your savy tech talk, you may impress them... and who knows, they may upgrade your software for you while they have your system. :)

These are all simple low cost precautions you can take to protect yourself from losing your data, spending a lot of money, and effectively becoming unproductive. After all, your laptop is nothing more than a fancy paperweight without a working hard drive.

ADR Data Recovery is available to evaluate the damage and potentially recover your lost data. For more information on ADR Data Recovery's service, visit http://www.adrdatarecovery.com

Article Source: http://EzineArticles.com/?expert=Jason_Perry

Malaysia Online : Related Link
data recovery software are they useful ?

KeyBoard - TypeMatrix 2030

Link Exchange - Increase your rankings with easy to use reciprocal links software.