“At a basic level, digital data is a series of very small units on storage device that are set to 0 or 1 with the 0 or 1 representing a microscopic physical.

Slides:



Advertisements
Similar presentations
To print your results, click on the printer icon. Choose from the printing options suggested. You can choose to remove items from folder after printing.
Advertisements

Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Computer & Network Forensics
Your personal files go into the Private folder. Files you wish to share with others go into the Public folder. Everyone on campus can see the files in.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Operating System & Application Files BACS 371 Computer Forensics.
RULES Test retakes are Wednesday after school. You can retake the test if you got a C+ or lower. Do not call out the answer, instead walk calmly to the.
CMSC 104, Version 9/01 1 Machine Architecture and Number Systems Topics Major Computer Components Bits, Bytes, and Words The Decimal Number System The.
OS and Application Files BACS 371 Computer Forensics.
A presentation created by David C.
LEARNING CENTER Archiving in GroupWise LEARNING CENTER Demonstration Menu (Click to Select) Archiving Messages Retrieving Archived Messages What.
Networking Overview Your OUNet ID ("4 plus 4") OUNet Password Changing Your OUNet Password Your Official OU Forwarding Your Mail Getting Help Overview.
Follow these simple directions to create a place to save and share files.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Using a Template to Create a Resume and Sharing a Finished Document
NMU Voic Welcome to. This presentation will walk you through the setup and use of the NMU Voic system. Follow the step by step instructions.
Computer Programming for Biologists Oct 30 th – Dec 11 th, 2014 Karsten Hokamp  Fill out.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Microsoft Exchange 2000 Service Pack 2 Features Mark Barringer Support Professional Enterprise Messaging Support Microsoft Corporation.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Review Everything you need to know for the 1 st Quarter Test.
1. Visit 2. Click on
Project 6 Advanced File and Web Searching. 2 CHAPTER OBJECTIVES  Begin a new file or folder search, save a search, and find a file using a saved search.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Machine Architecture and Number Systems
Your Digital Technology Briefcase My information…when and where I need it.
Chapter 3 The Power of HEX Finding Slivers of Data.
CMSC Machine Architecture and Number Systems Topics Major Computer Components Bits, Bytes, and Words The Decimal Number System The Binary Number.
Quick Launch. Google Drive 30 GB Cloud Space Document.
You can save your Office documents directly to Google Docs or directly open your online documents in Microsoft Office programs for reading and writing.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Lab Lesson Three: How to save to a USB (or Flash) Drive.
Python: File Directories What is a directory? A hierarchical file system that contains folders and files. Directory (root folder) Sub-directory (folder.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Managing Digital Photographs Jack Pauli - Chuck Iliff –
Using the Correct Order Template Copy the presentation to your hard drive. Open the slides using slide sorter and copy slides #3, 4, and 5 for each question.
E Safety – Managing your online presence
Facebook privacy policy
Windows 7 and file management
Technology Skills for Life, Career, and Academic Success
Objectives Create a folder in Google Drive.
How to use Library Kindle Books
How to use Library Kindle Books
People used to install software on their computers
PubMed Database Interface (Basic Course Module 4 Part B)
Student Monmouth College

We now will look at options for saving searches in CINAHL
MAKE YOUR APPLE MACBOOK PRO FASTER. DIAL TOLL FREE TO CONNECT WITH EXPERTS.
Acquisition and Examination of Forensic Evidence
Chapter 8 Managing Files.
Hashing with Python Protecting Digital Evidence
Introduction to computers
COMP1321 Digital Infrastructures
Windows file management
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Machine Architecture and Number Systems
Machine Architecture and Number Systems
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story.
Notes from Last Class Office Hours: GL Accounts?
EBSCOhost Advanced Search Guided Style
Machine Architecture and Number Systems
Hashing files Searching files for keywords
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

“At a basic level, digital data is a series of very small units on storage device that are set to 0 or 1 with the 0 or 1 representing a microscopic physical condition, often a level of electric charge, on the media. Each individual unit is called a bit” (Vincze, 2016)

“Each individual unit is called a bit, and groups of eight bits are called ____ . Each _____ represents a ______ value, and groups of _____ values form numbers, letters, words, and all other manifestations of information stored on computers and their related devices” Fill in the blanks: Byte(s) Hexadecimal

Create a “.txt”, “.doc”, and “.docx” Write “Hello” in all of them Convert “Hello” to its Hexadecimal Equivalent Open the “.txt” file, the “.doc” file, and the “.docx” file in the hexadecimal viewer

Digital Forensics Analysis of Files: Keyword Search (Files that contain a name, an expression) Regular Expressions Search (Files that contain a credit card number, a phone number, a bank account, an ip address) Location of File: Cached file ?

Police sources said the two had a rocky relationship and the Twitter messages they posted - with friends jumping in - only made it worse. Hours before the shooting, Dancy may have taunted Blake with a tweet: "N-----s is lookin for u don't think I won't give up ya address for a price betta chill asap!" Blake's Twitter account is also full of online disses, though only one tweet mentions Dancy by name: "R.I.P. Kwame" on Dec.3.

“[e]ach time a web page is opened, it is sent to your browser’s temporary cache on the computer hard drive. If that page is accessed again and has not been modified, the browser will open the page from the previously saved cache instead of downloading the page again” (Brunty, 2012)

“Criticism ranged from claims that they ‘dumb down’ the digital investigative process to suggestions that they allow a deterioration of expert knowledge by an over reliance on automation and produce a less thorough, or lower quality, investigation” (Vincze, 2016)

“[e]ach time a web page is opened, it is sent to your browser’s temporary cache on the computer hard drive. If that page is accessed again and has not been modified, the browser will open the page from the previously saved cache instead of downloading the page again” (Brunty, 2012) Check your cached files What evidence do they reveal?

Objectives: Hashing Files Hashing all files in a folder Keyword searching: Listing the files the .txt files that contain a word Deleting duplicates: Deleting all duplicates of a file

Hashing a file import hashlib file1 = open("file1.txt","rb") fileContent = file1.read() m = hashlib.md5() m.update(fileContent) print(m.hexdigest()) a = input("press any key to exit")

Hashing all .txt files in a folder import os import hashlib folder = os.listdir(".") for name in folder: if(name.endswith(".txt")): file1 = open(name, "rb") fileContent = file1.read() m = hashlib.md5() m.update(fileContent) file1.close() print(m.hexdigest()) a = input("press any key to exit") Write the hashes to a file instead of printing them Hash all files in a directory called NewFolder Use os.listdir(“NewFolder”) Use name2 = “NewFolder/” + name

Listing files that contain the word hello import os import hashlib folder = os.listdir(".") for name in folder: if(name.endswith(".txt")): file1 = open(name, "r") fileContent = file1.read() if("hello" in fileContent): print(name) print("\n") a = input("press any key to exit")

Deleting a file import os os.remove("file1.txt")

Deleting if it contains the word ‘hello’ import os import hashlib folder = os.listdir(".") for name in folder: if(name.endswith(".txt")): file1 = open(name, "r") fileContent = file1.read() file1.close() if("hello" in fileContent): try: os.remove(name) except Exception as e: print(e) a = input("press any key to exit") 1. Create a python script that creates a file that contains a list of the files that contain the word ‘kill’

Removing Duplicates of the file f1.txt import os import hashlib items = os.listdir(".") hasher = hashlib.md5() file = open("f.txt", "rb") file2 = file.read() hasher.update(file2) h1 = hasher.hexdigest() for nn in items: file = open(nn, "rb") h2 = hasher.hexdigest() file.close() if(h1 == h2 and nn != 'f.txt'): print(nn) try: os.remove(nn) except: print("failed") e = input("press any key to exit") Removing Duplicates of the file f1.txt The script removes all duplicates of the file f.txt How do we create a script that remove all duplicates?