A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Operating systems (3rd ed.): internals and design principles
Operating systems (3rd ed.): internals and design principles
DCC '00 Proceedings of the Conference on Data Compression
File System Forensic Analysis
Real Digital Forensics: Computer Security and Incident Response
Real Digital Forensics: Computer Security and Incident Response
Hi-index | 0.00 |
With the growth of many open source operating systems comes the introduction of open source file systems that allow free modification. File system modifications can be a method of users to evade investigators who use commercial tools to analyze the suspect's media. Investigators need to be aware of what is possible and ways to circumvent the methods that users can utilize when modifying their file system to hide data.