Computer Information - myOddPc
Computer forensic services
What is Computer forensic?
Computer forensic services offer scientifically proven methods to gather, process, interpret, and to use digital evidence to provide a conclusive description of cyber crime activities.
The data interpreted has to become "human friendly", (or to demonstrate that the user was expert enough to interpret it), so it can be used in a court of law. Unlike most experts, the Forensic Analysis cannot simply give his professional opinion, but instead give a clear explanation on how he came to certain conclusions, (and what the data itself indicates).
Cyber forensics, (or computer forensic), involves many aspects of a traditional investigation.
It handles every aspects of data and media life cycle.
Once all the information has been gathered it is analysed to prove, (or disprove), the actions of a user/group of users.
- Reconstructing Events
- Tracking internet browsing habits
- Inferring intentions
Not every computer/digital information fall under digital evidence gathered by forensic services, the data must be able to be interpreted by a human with expertise in the subject. In other words, the evidence gathered must apply to the accusation. Finding data on a media does not necessarily mean that it was understood by the user.
But Computer forensic science is not only limited to the retrieval of evidence, it also also includes the act of making digital data suitable for inclusion into a criminal investigation.
Not all data is admissible in court, a good computer forensic services company, or computer forensic analyst, will be able to differentiate what is acceptable within the jurisdiction of the court.
In many country evidense recovered by private computer forensic services is not admissible, (in the US for example many, but not all investigations have to be handled by the FBI).
Forensic Analysis have come a long way from been a simple help to law enforcement investigations to actually securing convictions. Many law enforcement agencies and/or colleagues offer Computer forensic Services as a course.
What are Computer forensic services used for?
Wide range of computer crimes and misuses
- Non-Business Environment: evidence collected by Federal, State and local authorities for crimes relating to:
- Theft of trade secrets
- Industrial espionage
- Position of pornography
- SPAM investigations
- Virus/Trojan distribution
- Homicide investigations
- Intellectual property breaches
- Unauthorized use of personal information
- Theft of or destruction of intellectual property
- Unauthorized activity
- Missues of company bandwidth, (reselling and so forth)
- Sexual harassment
- Software Piracy
Claims made to counter Computer forensic services.
Many software claim that any evidence can be "erased", this is almost never the case. Although there is no doubt that the data will be difficult to recover and that it will be "hidden" to most users, any good company offering comprehensive computer forensic services will be able to recover the data, (and ask the question as to why an attempt was made to hide it).
For example, successfully removing data from a computer in the hope of masking browsing habits will almost never be able to clear the information contained on the ISP computer, (the computer used to connect).
This is partly why computer forensic services are so successful. Because the data is never really removed from the media, if the data can be hidden, it will be recovered. Even if the media is totally destroyed, the data can almost always be recovered, (using third party computers that came in contact with the media).
It is only a matter of time, commitment and available funds.
Example of forensic services
Mobile phone forensics is also a science performed by many computer forensic services, retrieving data from a mobile phone. This includes full data retrieval and examination of data found on the SIM/USIM cards, the phone body itself and the optional memory cards.
- Recovering "deleted" emails
- Performing investigation even if the system has already been used by multiple users.
- Performing investigation post employment termination
- Recovering evidence after a hard drive has been formatted.
- Wrongful dismissal claims
- insurance claims verifications.
Data retrieved and examined can include images, videos, text or SMS messages, call times and contact numbers.
FlipSide case for iPhone packs stealthy game controls, plays on solar power (video)
2012 - 12 - 23
The perpetual challenge of developing an iPhone-friendly gamepad (or any phone-oriented gamepad) is the bulk, either for a gargantuan case or else a separate controller. If Justice Frangipane's team and iDevices have their way, that clunkiness will be a distant memory. Their proposed FlipSide case for iPhones (we see a prototype here) centers on Bluetooth 4.0 gamepad controls that stay clipped to the back when just checking email, but attach to the front for playtime. They'll save us from hunting down a wall outlet, too; the combination of a sensitive solar cell and a thin film battery from Infinite Power Solutions should keep the case powered up through even indoor lighting. The only real challenge is getting the case produced, as Frangipane is looking for crowdfunding to make the FlipSide a reality. Provided his group makes its donation target, though, there's the prospect of an Android version -- so those who don't play the iOS way could still reap the rewards if they chip in at the source link.
Continue reading FlipSide case for iPhone packs stealthy game controls, plays on solar power (video)
Filed under: Cellphones, Gaming, Peripherals, Mobile, Apple
Source: Flipside (Kickstarter)
YouTube Player API for Android opens for all, brings seamless app integration (video)
2012 - 12 - 23
Adding a little dash of YouTube magic to your Android apps should be simple affair right? Well, historically, not entirely. That's all set to change though, now that the long-promised Android YouTube Player API has finally been set loose in the wild. This means developers can access some new tools that should bring the ubiquitous video service snuggly inside any app that wants to use it. This includes high-quality playback for devices running Android 2.2 and above, easier integration there-of due to a change in how to call the videos, full screen and orientation mode support, closed captions display, support for YouTube ads and the ability to program most elements of the playback experience natively within your app. The tools have already been put to use by some partners who got early access, including one of our favourite social feed-readers Flipboard. Full details and tools at the source, or slide past the break for Google developers video showing it in action.
Continue reading YouTube Player API for Android opens for all, brings seamless app integration (video)
Filed under: Cellphones, Mobile, Google
Via: Android Central
Source: YouTube API blog
Asteroid 2011 AG5 Will Miss Earth In 2040
2012 - 12 - 23
dryriver writes with a report from CNN that the asteroid known as 2011 AG5 will not hit Earth in 2040 as early calculations had led some to fear when it was first spotted last year. "To narrow down the asteroid's future course, NASA put out a call for more observation. Astronomers from the University of Hawaii at Manoa took up the task and managed to observe the asteroid over several days in October. 'An analysis of the new data conducted by NASA's Near-Earth Object Program Office at the Jet Propulsion Laboratory in Pasadena, California, shows that the risk of collision in 2040 has been eliminated,' NASA declared Friday."
Read more of this story at Slashdot.
Please note that this website is for information only. Whilst every care has been taken to provide accurate information you should always seek the advice of a professional before attempting any repairs or making any purchase(s).
You need to take special care to ensure that the information given applies your system.