Download presentation
Presentation is loading. Please wait.
Published byEdward Bates Modified over 9 years ago
1
Chapter 15 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Computer Basics for Digital Investigators
2
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.1 Diagram of the Atanasoff-Berry Computer (ABC). Image from http://www.scl.ameslab.gov/ABC/Progress.html (reproduced with permission). http://www.scl.ameslab.gov/ABC/Progress.html
3
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.2 An electrical pulse resets the CPU, which, in turn, activates the BIOS
4
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.3 Beginning of a JPEG-encoded EXIF file.
5
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.4 Magnetic patterns on a hard disk as seen through a magnetic force microscope. Peaks indicate a one (1) and troughs signify a zero (0). Image from http://www.ntmdt.ru/applicationnotes/MFM/ (reproduced with permission).http://www.ntmdt.ru/applicationnotes/MFM/
6
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.5 A depiction of platters, tracks, sectors, clusters, and heads on a computer disk.
7
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.6 Simplified depiction of disk structure with two partitions, each containing a FAT formatted volume.
8
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.7 Prior folder structure recovered from a reformatted NTFS volume.
9
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.8 Windows 95 boot sector viewed using Norton Diskedit.
10
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.9 Volume slack containing remnants of Form virus viewed using EnCase.
11
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.10 When old data are overwritten with new data, some of the old data can remain.
12
Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 15.11 A folder named “tk” contained important evidence related to a computer intrusion investigation. The “tk” folder is visible using a newer version of a digital evidence examination tool (left) but not an older version containing a bug (right). Reproduced from Casey (2005).
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.