International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 2 | Year 2012 | Article Id. IJCTT-V3I2P114 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I2P114

Survey on Computer Crime Scene Investigation Forensic Tools


Dr.A.S.N.Chakravarthy,T.V.Sarath Kumar

Citation :

Dr.A.S.N.Chakravarthy,T.V.Sarath Kumar, "Survey on Computer Crime Scene Investigation Forensic Tools," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 2, pp. 274-277, 2012. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V3I2P114

Abstract

In the day to day life, the crime is becoming a big issue in the computer field. So to avoid and to protect from crime, Computer Forensics is used. This paper describes different tools that are used in the Computer Forensics. These tools are used to recover the data that is lost (ex., Hard disks).The universal truth says that the coin has two sides where as the technology also has both good and bad. We need to protect the technology by minimizing the impact of threat.

Keywords

Computer Forensics, The Coroners Tool, Win Hex, The free Hex Editor, Mazu Enforcer.

References

[1] Kruse W.G and Heiser J.G, Computer Forensics Incident Response Essentials, 2002, Addison Wesley Pearson Education, Boston
[2] Ibrahim M. Baggili, Richard Mislan, Marcus Rogers, Mobile Phone Forensics Tool Testing: A Database Driven Approach, International Journal of Digital Evidence Fall 2007, Volume 6, Issue 2
[3] SveinYngvarWillassen, Methods for Enhancement of Timestamp Evidence in Digital Investigations, Doctoral thesis at NTNU, 2008: 19
[4] http://www.porcupine.org/forensics/tct.html
[5] www.mazunetworks.com
[6] http://www.x-ways.com