Carrie Estes and Kristin Betancourt

Slides:



Advertisements
Similar presentations
Google Picasa Simple Sharing & Photo Editing May 2011Moore Memorial Library Public Computer Center | Greene, NY1.
Advertisements

Each of these photos represent an available slideshow. Click on any of these pictures and press [Tab] to open the new slideshow in a new window. Press.
How to install “bubble” fonts These fonts are used to create the Formative Assessment sheets.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
The sequence of folders to a file or folder is called a(n) ________.
Mac OS X (Mac Operating System 10) was developed by Apple Inc. in In this lesson, you will learn how to navigate, use, and manage files in Mac OS.
The basics of the Online Portal
Gorman, Stubbs, & CEP Inc. Introduction to Operating Systems Lesson 5 Windows 2000 Professional.
CST-092 © Delta College CST FacultyIntroduction to Windows Operating System Lecture 2.
‘ {] PowerPoint Presentation to Accompany GO! with Windows 7 Getting Started Chapter 2 Getting Started with Windows 7.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Archiving is downloading, keeping and protecting s that you are receiving or sending so they can be accessed at another time. Archiving.
Using Technology in Art Education. The Different Medias Power Points, You Tube Video, File Conversions, Photo-Story, Moviemaker, Jing and Blogs.
With Larry Anter (805) Website Facebook Twitter.
Database Applications – Microsoft Access Lesson 1 Introduction 26 Slides in Presentation Updated 8/12.
COMPREHENSIVE Access Tutorial 12 Managing and Securing a Database.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Sharing Google Docs. Open Google Chrome Open your dashboard.
Saving a Document in Microsoft Word (Versions prior to 2007) Educational Support Services Copy & Design: Verna Fisher.
PERKS Version 6.0: Installation & Use There are two mistakes one can make along the road to truth not going all the way, and not starting. -- Buddha.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Customer Service Website. What’s so great about it? Latest information Stock status Pricing Barcodes numbers Back / Forward orders Place.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Getting to Know Your Desktop Icons, Taskbar, Workspace, Window, Notifications, Start and Search.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
MS 365 Student Accounts Orientation Beavercreek High School.
®® Microsoft Windows 7 Windows Tutorial 2 Organizing Your Files.
Visit:  If you have lost important files, take a deep breath and rest assured that disk recovery software can likely help.
Joshua ISD Technology Training. Word 2013 Opening Word 2013  Click the Start button  Enter “word” in the Search box  Click on the Word 2013 when it.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Audio editing assignment 1st check out this in fun audio editing music mashup: Go to Select.
Know About MS Access Database
Chapter 6 Application Hardening
How to change the LOGO on PecStarWeb V3.6
Service Point 5 ReportWriter
**Please view the instructional guide as a slideshow**
Service Point 5 ReportWriter
Eagle Gate College/Provo College Group
How to Fi
What are the steps to install Norton antivirus on PC?
Bomgar Remote support software
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Bibliography and reference manager programs, Endnote 2018 Attila Skulteti
How to generate a kernel memory dump with Avast. Like every other technical and software company, Avast too provides support articles and guides to solve.
Office is a productivity tool which is available on the online as well as on offline store. MS Office is a suite of products.
How to Resolve QuickBooks Error Code Simple Steps to Fix QuickBooks Error Code 6150 QuickBooks is a versatile accounting software that is trusted.
We are here to help you in Reinstallation of Avira Antivirus. You just have to follow some steps which are mentioned in this Presentation……….
office.com/setup installation and Activation
How to Download and Install office setup
office.com/setup download,installation and Activation support guide
European Computer Driving Licence
Managing Your Files.
Database Applications – Microsoft Access
An Introduction to Collaborative Online Documents
HC Hyper-V Module GUI Portal VPS Templates Web Console
Lesson 12 -Maintaining Documents & Macros Lesson 13 - Protecting & sharing documents Lesson 14 - Advanced Options #1.12, #1.13, & #1.14.
Lippincott Procedures Training Tour for General Users
2018 OPP Physician Scorecard Employed - Login
How to Fix HP Printer Scanning Problems Using Scan Doctor?
OnCourse Connect is simple to use and can be accessed from any online computer, smartphone or tablet device. This secure website will allow you real-time.
MADE IN USA KEY QUOTE TOOL.
EXPERTIndex™ “Contains” Print, , Save Results
Print, , Save Results TUTORIAL EXPERT Product Tabs Print, , Save Results
Exchange of Information
Help Me FedEx – Installing and Using
Unity Application Generator
Training Tour for General Users
Tutorial 12 Managing and Securing a Database
Presentation transcript:

Carrie Estes and Kristin Betancourt OSFORENSICS Carrie Estes and Kristin Betancourt

THE IDEA BEHIND OSFORENSICS The idea behind OSForensics is to be able to find things on a computer that one would not want others to find. Can be installed on a thumb drive and used on computer to gain live information while also being able to take a copy of the original computer and search through it on another computer. OSForensics can also work in any environment and is faster than Windows at finding files.

FINAL VERSION Only in its beta version Final product will be able to: Search through files Search for emails Recover deleted files Show recent activity Collect system information View active memory Extract logins and passwords And more...

HOW IT WORKS Create a Case file Run various tools Tools are located along the left navigation bar Assign suspicious activities or files to the case. Attach supplemental files. Generate a report.

OUTPUT

EXPERIENCES Installation took a matter of seconds. Could be installed onto a thumb drive for portability. Easy to use. Well-documented help section. Could create a custom report of various scans in a matter of clicks. Still slightly buggy, crashed a few times. Being a beta version, some tools did not work. Overall, a good, simple tool to use.