wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

profile
02_Shaheen Ansari
Mar 14, 2022
0 Likes
0 Discussions
47 Reads

Computer Forensics is basically used for collecting evidence from the culprit devices like computers, laptops, mobile phones, RAM , Cache, Networks etc . But Computer Forensics is not only used for collecting evidences but also used in recovery the lost data . Most of the big companies uses computer forensic to recover their data if it incase is lost.

There are Numbers of Tools are available but in this blog you will find few of them and how to use that tools.

1. NetworkMiner

With the help of NetworkMiner tool you will be able to get information about your network, such as connected users and hosts. Try to make sure that you only connect individuals you know can help you become much safer when using the internet. It will assist you in protecting your data and information as well as your network from any assaults.

2. Process Hacker

It is a tool helps to moniter system resources, detect malware and debug the software. You can check which active connection is running at the time and close them if you do not require . This tool will get real time on disk access and also the information of usage of disk. so basically this tool is used to detect or identify the process and terminate that.

3. MAGNET RAM Capture

This tool is used to detect Processes and programmes operating on the system, network connections,  malware incursion, registry hives, usernames and passwords, decrypted files and keys which is  generally kept on the local hard disc and we can detect all of the mention with the help of MAGNET RAM Capture.

4. USB Historian

This tool helps you to Parses Computer Name  make it easier to find USB devices on many computers and Over 20 properties are displayed in this tool we can also parse multiple  DAT file at a same time.

5. Belkasoft Live RAM Capture

You can use this tool without even intalling in the system just directly launch in seconds from a USB flash drive and click on capture button. it will start capturing computer’s volatile memory even if it is protected by an any anti-debugging system.


Comments ()


Sign in

Read Next

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Virtual memory

Blog banner

Reconnaissance

Blog banner

Making Money through Instagram

Blog banner

Pooja Silver

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Direct Memory Access

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Impact of social media on the human life

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

File Systems in OS.

Blog banner

Earth with no trees

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Booting Process In Operating System

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

File Management In OS

Blog banner

Ola

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Deadlock Prevention

Blog banner

Virtual Memory

Blog banner

File Organization and Access

Blog banner

Cybersecurity Standards for Automotive

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

The launch of UniMap by HERE

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Virtual Memory

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Online Education

Blog banner

Pipedrive

Blog banner

Network Forensics

Blog banner

Deadlock in operating system

Blog banner

Pink sauce pasta

Blog banner

Linux VServer Architecture

Blog banner

OS assignment 3

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Crypto tax evasion

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner