wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

profile
02_Shaheen Ansari
Mar 14, 2022
0 Likes
0 Discussions
47 Reads

Computer Forensics is basically used for collecting evidence from the culprit devices like computers, laptops, mobile phones, RAM , Cache, Networks etc . But Computer Forensics is not only used for collecting evidences but also used in recovery the lost data . Most of the big companies uses computer forensic to recover their data if it incase is lost.

There are Numbers of Tools are available but in this blog you will find few of them and how to use that tools.

1. NetworkMiner

With the help of NetworkMiner tool you will be able to get information about your network, such as connected users and hosts. Try to make sure that you only connect individuals you know can help you become much safer when using the internet. It will assist you in protecting your data and information as well as your network from any assaults.

2. Process Hacker

It is a tool helps to moniter system resources, detect malware and debug the software. You can check which active connection is running at the time and close them if you do not require . This tool will get real time on disk access and also the information of usage of disk. so basically this tool is used to detect or identify the process and terminate that.

3. MAGNET RAM Capture

This tool is used to detect Processes and programmes operating on the system, network connections,  malware incursion, registry hives, usernames and passwords, decrypted files and keys which is  generally kept on the local hard disc and we can detect all of the mention with the help of MAGNET RAM Capture.

4. USB Historian

This tool helps you to Parses Computer Name  make it easier to find USB devices on many computers and Over 20 properties are displayed in this tool we can also parse multiple  DAT file at a same time.

5. Belkasoft Live RAM Capture

You can use this tool without even intalling in the system just directly launch in seconds from a USB flash drive and click on capture button. it will start capturing computer’s volatile memory even if it is protected by an any anti-debugging system.


Comments ()


Sign in

Read Next

"Life as a Part-time Student"

Blog banner

IoT Evolution

Blog banner

Two major obstacle to India’s economic growth: Twin Balance Sheet and Lower Private Investments

Blog banner

Session Hijacking

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

RAID

Blog banner

Worms, viruses and Bots

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

FREE VERSION OF G-MAIL

Blog banner

Deadlock

Blog banner

Importance of education

Blog banner

Deadlock and starvation in operating system

Blog banner

Deadlock and Starvation

Blog banner

Be kind person

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Information Technology In E- Commerce

Blog banner

Concurrency and Deadlocks

Blog banner

Trello ( management software)

Blog banner

On-Page SEO

Blog banner

An Introduction To Quick Solutions Of International Dating Sites

Blog banner

What your Favorite colour says about You?

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

How to grow followers on Instagram business account?

Blog banner

Characteristics of Etherum

Blog banner

What is HTML?

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Brain wash of social media

Blog banner

Water Resources are about to exhaust...

Blog banner

geographic information system (GIS)

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Monday. com App

Blog banner

File Systems in OS.

Blog banner

A True Friendship

Blog banner

The Right way of cooking

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

Depression

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Honeypot in cyber security

Blog banner

Evolution of Operating system.

Blog banner

Evolution of Operating System

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner