wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

profile
02_Shaheen Ansari
Mar 14, 2022
0 Likes
0 Discussions
47 Reads

Computer Forensics is basically used for collecting evidence from the culprit devices like computers, laptops, mobile phones, RAM , Cache, Networks etc . But Computer Forensics is not only used for collecting evidences but also used in recovery the lost data . Most of the big companies uses computer forensic to recover their data if it incase is lost.

There are Numbers of Tools are available but in this blog you will find few of them and how to use that tools.

1. NetworkMiner

With the help of NetworkMiner tool you will be able to get information about your network, such as connected users and hosts. Try to make sure that you only connect individuals you know can help you become much safer when using the internet. It will assist you in protecting your data and information as well as your network from any assaults.

2. Process Hacker

It is a tool helps to moniter system resources, detect malware and debug the software. You can check which active connection is running at the time and close them if you do not require . This tool will get real time on disk access and also the information of usage of disk. so basically this tool is used to detect or identify the process and terminate that.

3. MAGNET RAM Capture

This tool is used to detect Processes and programmes operating on the system, network connections,  malware incursion, registry hives, usernames and passwords, decrypted files and keys which is  generally kept on the local hard disc and we can detect all of the mention with the help of MAGNET RAM Capture.

4. USB Historian

This tool helps you to Parses Computer Name  make it easier to find USB devices on many computers and Over 20 properties are displayed in this tool we can also parse multiple  DAT file at a same time.

5. Belkasoft Live RAM Capture

You can use this tool without even intalling in the system just directly launch in seconds from a USB flash drive and click on capture button. it will start capturing computer’s volatile memory even if it is protected by an any anti-debugging system.


Comments ()


Sign in

Read Next

File management

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

HACKING MOBILE PLATFORM

Blog banner

How To Secure Operating Systems ?

Blog banner

Short note on expert system

Blog banner

Place to visit in pune

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Android Flashlight Application

Blog banner

Jio .....A Revolution ?? ??

Blog banner

RAID_142

Blog banner

Memory input output management

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Instagram

Blog banner

Race Condition in Operating Theatre

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Smartsheet

Blog banner

Email Privacy

Blog banner

Crypto tax evasion

Blog banner

Uniprocessor Scheduling

Blog banner

Deadlock in Operating System

Blog banner

Embedded Operating System

Blog banner

Security in Cloud Computing

Blog banner

Threads and concurrency

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Caching windows

Blog banner

Routers

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Why is ITSM important in IT organization?

Blog banner

Facebook marketing

Blog banner

Linux 94

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Different types of scam frauds

Blog banner

Virtual Machine

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

MACHINE LEARNING

Blog banner

bulk email software

Blog banner