Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Digital Evidence and Computer Crime
Digital Evidence and Computer Crime
Live forensics: diagnosing your system without killing it first
Communications of the ACM - Next-generation cyber forensics
Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)
Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)
Computer Forensics: Principles and Practices (Prentice Hall Security Series)
Computer Forensics: Principles and Practices (Prentice Hall Security Series)
Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
Knoppix Hacks
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
Building theoretical underpinnings for digital forensics research
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of such offenders increases these days, fact to the crime of computer case traditional investigators have been unable to complete the admissibility of evidence. To solve this problem, we must collect the evidence by digital forensics tools and analysis the digital data, or recover the damaged data. In this research, we use the open source digital forensics tools base on Linux and want to make sure the stability of software then prove the evidence what we have. To avoid the data loss due to the shutdown of machines, we use the Live-analysis to collect data and design the Live DVD/USB to make image file and analysis the image. We use the MD5 and SHA-1 code to identity the file before the final report and ensure the reliability of forensic evidence on court.