• Latest
  • Trending
  • All
  • News

Book Review: Computer Investigation by Elizabeth Bauchner

July 10, 2017
5 Vital Car Cleaning Tools To Make A Car Look Brand New

How Exterior Detailing Services Can Enhance the Look of Your Vehicle

January 21, 2024

The Ultimate Guide to Rebuilding a Transmission – Everything You Need to Know

December 10, 2023
5 Weekend Travel Tips for Lasting Joy With the Family

Preparing Your RV For Storage – Essential Steps to Take

November 21, 2023

5 Reasons Why Regular Auto Repair Services Are Crucial for Your Vehicle

November 21, 2023
Comparing the Services of Open Vs. Enclosed Car Shipping

Comparing the Services of Open Vs. Enclosed Car Shipping

November 20, 2023
Heavy Vs. Light Duty Towing: Knowing The Kind of Truck You’ll Need

Heavy Vs. Light Duty Towing: Knowing The Kind of Truck You’ll Need

November 11, 2023
6 great reasons why vehicle owners won’t be stranded when calling out a local locksmith

6 great reasons why vehicle owners won’t be stranded when calling out a local locksmith

October 27, 2023
Six Reasons to Buy a Classic Corvette

Six Reasons to Buy a Classic Corvette

October 20, 2023
Top 5 Signs of Alternator Problems

Top 5 Signs of Alternator Problems

October 10, 2023
7 Common Engine Rebuilding Mistakes and How to Avoid Them

The Benefits of Reliable Auto Repair Services You Can Trust

October 9, 2023
Practical Car Interior Gadgets to Upgrade Your Ride

Top Reasons Why Used Cars Are a Better Investment

July 2, 2023

Essentials of Handicap Vehicles

June 20, 2023
  • Guest Posts
  • Advertise
  • Contact
  • Privacy Policy
Sunday, June 22, 2025
  • Login
Tech Featured - Automotive
  • Home
  • Gadgets
  • Automotive News
  • Interesting Topics
No Result
View All Result
Tech Featured - Automotive
No Result
View All Result
Home News

Book Review: Computer Investigation by Elizabeth Bauchner

July 10, 2017
in News
0
77
SHARES
220
VIEWS
Share on FacebookShare on Twitter

Who is the target audience for this book?

Make no mistake. This book is not targeted for computer professionals. If you have a degree in Computer Science or just know a lot about computers, you won’t learn anything from this book. This book is targeted to children in the middle school age group, but it would also be a good introductory book for adults.

That said, what does the book talk about?

What is the science of computer forensics?

Computer forensics is a two-part process. First, data is retrieved and then the data is used. It is different from other forensic sciences because the data usually stands on its own and does not need to be interpreted.

What are the many duties of a computer forensics technician?

While doing their job, computer forensic specialists must preserve evidence, not introduce viruses or worms into a system, handle data properly, keep evidence within the chain of command, reduce the impact of the system’s analysis on any businesses affected, and make sure privileged information is not divulged.

Following those rules, computer forensic professionals find hidden files, swap files, and temp files used by the operating system and by applications. They access these files and protected and encrypted files, searching for information relevant to the case. They analyze the data found, especially in areas normally considered inaccessible. They perform an over all system analysis and list all relevant files. They provide an opinion of the system’s layout and who authored which files. They make notes of attempts to delete or protect files, and they provide expert testimony and/or consultation in court as needed.

The book gives definitions for commonly used words, or jargon, in the industry.

A hacker is someone who is really interested in a piece of technology and learns all possible about the technology.

A cracker is someone who uses their hacker knowledge for bad.

Hackers are white hat, and crackers are black hat hackers.

A phreaker was a person who scammed the telephone company to get free long-distance calls.

Spoofing is mimicking a website (or an email) so the receiver thinks the sender is someone else.

Phishing is trying to get information from people, like their user accounts and passwords, and social security numbers.

A virus is a program, attached to another program, that infects a system when the program is opened. The virus can’t do anything unless the program is opened and ran.

A worm is like a virus, but it can replicate itself without other programs being opened.

A Trojan horse is a program that pretends to be a different kind of program.

Denial of Service (DoS) is when a cracker tries to prevent a system from being accessible by its normal users.

Tags: ElizabethInvestigationReview
Share31Tweet19Share8
  • Trending
  • Comments
  • Latest

John Christie Electric Generator – Generates 24 Kilowatts Of Free Electricity

November 21, 2016

How to Use a Magnetic Generator to Get Rid of Your Electricity Bill

November 21, 2016

Buying a Gazebo – How to Install a Gazebo on Grass

June 8, 2017

The Environmental Benefits of Automobile Recycling

0

Automotive Fasteners – A Number of Items Included on the List

0

Drag Racing – The Perfect Launch

0
5 Vital Car Cleaning Tools To Make A Car Look Brand New

How Exterior Detailing Services Can Enhance the Look of Your Vehicle

January 21, 2024

The Ultimate Guide to Rebuilding a Transmission – Everything You Need to Know

December 10, 2023
5 Weekend Travel Tips for Lasting Joy With the Family

Preparing Your RV For Storage – Essential Steps to Take

November 21, 2023
Tech Featured - Automotive

Navigate Site

  • Guest Posts
  • Advertise
  • Contact
  • Privacy Policy

Follow Us

No Result
View All Result
  • Home
  • Gadgets
  • Automotive News
  • Interesting Topics

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In