Cyber Unit 2
Cyber Unit 2
Unit VI
Information Technology Act (IT Act 2000)
Introduction :- Computer, device for processing, storing, and
displaying information.Computer once meant a person who did
computations, but now the term almost universally refers to
automated electronic machinery. The first section of this article
focuses on modern digital electronic computers and their design,
constituent parts, and applications. The second section covers
the history of computing. For details on computer architecture,
software, and theory, see computer science. Computers also
have limitations, some of which are theoretical. For example,
there are undecidable propositions whose truth cannot be
determined within a given set of rules, such as the logical
structure of a computer. Because no universal algorithmic
method can exist to identify such propositions, a computer asked
to obtain the truth of such a proposition will (unless forcibly
interrupted) continue indefinitely—a condition known as the
“halting problem.” (See Turing machine.) Other limitations reflect
current technology. Human minds are skilled at recognizing
spatial patterns—easily distinguishing among human faces, for
instance—but this is a difficult task for computers, which must
process information sequentially, rather than grasping details
overall at a glance. Another problematic area for computers
involves natural language interactions. Because so much
common knowledge and contextual information is assumed in
ordinary human communication, researchers have yet to solve
the problem of providing relevant information to general-purpose
natural language programs.
Definitions of computer :- A computer is a machine or
device that performs processes, calculations and operations
based on instructions provided by a software or hardware
program. It has the ability to accept data (input), process it, and
then produce outputs. Computers can also store data for later
uses in appropriate storage devices, and retrieve whenever it is
necessary. Modern computers are electronic devices used for a
variety of purposes ranging from browsing the web, writing
documents, editing videos, creating applications, playing video
games, etc. They are designed to execute applications and
provide a variety of solutions by combining integrated hardware
and software components.
Computer System:- A computer system is a basic, full-
featured hardware and software configuration with all the
components needed to perform computing operations. It enables
humans to input, process, and output data effectively and
systematically. A computer system comprises several connected,
integrated devices collaborating to carry out one or more tasks. It
often consists of software and hardware elements, including
operating systems, programs, and drivers, as well as memory,
input/output devices, storage devices, and a central processing
unit (CPU). Evolution of Computer systems The origins of
computer systems can be traced back to the early 19th century,
with the introduction of mechanical calculators. These machines
were created to conduct mathematical calculations. The
development of electronic computers, however, marked the start
of the real evolution of computer systems.
Components of Computer System Let us now understand the
following basic components of a computer system. • Hardware •
Software • Humanware • Firmware • Bridgeware Hardware The
physical components collectively form the hardware of a
computer system. Hardware comprises of the equipment that
helps in the working system of the computer.
Following are the different types of hardware components (which
have specific functions) − • Monitor − It displays (visual) the
result. • CPU − It is the Central Processing Unit that controls the
computer’s functions and transmits data. • Motherboard − It is
mainly accountable to establish communication between
components and transmission of information. • RAM − It is the
Random Access Memory and responsible for the storage of
programs that are currently running and also stores data
temporarily. • Hard Disk Drive − It is a permanent memory
storage device. • Floppy Disk Drive − It is hardly being used in
recent times. • Optical disks − It is a device that also store data.
For example, CD, DVD, etc.
Computer network:- A computer network is a set of devices
connected through links. A node can be computer, printer, or any
other device capable of sending or receiving the data. The links
connecting the nodes are known as communication channels.
Computer Network uses distributed processing in which task is
divided among several computers. Instead, a single computer
handles an entire task, each separate computer handles a s
Following are the advantages of Distributed processing: o
Security: It provides limited interaction that a user can have with
the entire system. For example, a bank allows the users to
access their own accounts through an ATM without allowing them
to access the bank's entire database. o Faster problem solving:
Multiple computers can solve the problem faster than a single
machine working alone. o Security through redundancy: Multiple
computers running the same program at the same time can
provide the security through redundancy. For example, if four
computers run the same program and any computer has a
hardware error, then other computers can override it Electronic
Record:- According to the World Bank, E-Governance is when
government agencies use information and communication
technologies to transform relations with citizens, businesses, and
other government agencies. One of the prime objectives of the IT
Act, 2000 is the promotion of electronic governance. In this
article, we will talk about electronic records and egovernance. In
the IT Act, 2000, there are special provisions under Chapter III to
grant legal recognition to electronic records, signature, and also
encourage the government and its agencies to use them.
Examples of electronic records include:
emails, websites, Word/Excel documents, digital purchase
receipts, databases, text messages, social media postings, and
information stored on SharePoint sites and content management
systems (Catalyst, Slack, DropBox, etc.). Electronic records must
be retained according to a legally approved records retention
schedule. Electronic records have the same record series (type of
record) and retention period as their paper equivalent. This
includes records stored in email, shared drives, the cloud, on
laptops and cell phones, even ones created on personally-owned
devices. If your office scans records with the intention of
destroying the original paper document (including Ariba
attachments), you must have a scanning policy on file with our
office. Click here to learn more. Managing Electronic Records
Every UW employee is individually responsible for maintaining
records they create and recieve in accordance with University
and Washington state policies - including electronic records and
email. Whether you just started at the University or have been
here for years, managing records is a fact of life. But don't worry -
you're not on your own! Records Management Services has
resources and training available to assist you.
Data :- In general, data is a distinct piece of information that is
gathered and translated for some purpose. If data is not
formatted in a specific way, it does not valuable to computers or
humans. Data can be available in terms of different forms, such
as bits and bytes stored in electronic memory, numbers or text on
pieces of paper, or facts stored in a person's mind. Since the
invention of computers, people have used the word data to mean
computer information, and this information is transmitted or
stored. There are different kinds of data; such are as follows: o
Sound o Video o Single character o Number (integer or floating-
point) o Picture o Boolean (true or false) o Text (string) In a
computer's storage, data is stored in the form of a series of binary
digits (bits) that contain the value 1 or 0. The information can be
in terms of pictures, text documents, software programs, audio or
video clips, or other kinds of data. The computer data may be
stored in files and folders on the computer's storage, and
processed by the computer's CPU, which utilizes logical
operations to generate output (new data) form input data. As the
data is stored on the computer in binary form (zero or one), which
can be processed, created, saved, and stored digitally. This
allows data to be sent from one computer to another with the help
of various media devices or a network connection. Furthermore, if
you use data multiple times, it does not deteriorate over time or
lose quality.
Secure system :- Cyber security means protecting the [cyber
assets] from [threats]. • The cyber assets are: Information,
Equipment, Devices, Computer, Computer resource,
Communication device and Information stored therein • The
cyber threats are: Unauthorised access, use, disclosure,
disruption, modification or destruction Today, let’s understand
what is a Secure System? Secure System means computer
hardware, software, and procedure that- • are reasonably secure
from unauthorized access and misuse; • provide a reasonable
level of reliability and correct operation; • are reasonably suited to
performing the intended functions; and • adhere to generally
accepted security procedures
Digital Signature :-
A digital signature is a mathematical technique which validates
the authenticity and integrity of a message, software or digital
documents. It allows us to verify the author name, date and time
of signatures, and authenticate the message contents. The digital
signature offers far more inherent security and intended to solve
the problem of tampering and impersonation (Intentionally copy
another person's characteristics) in digital communications. The
computer-based business information authentication interrelates
both technology and the law. It also calls for cooperation between
the people of different professional backgrounds and areas of
expertise. The digital signatures are different from other
electronic signatures not only in terms of process and result, but
also it makes digital signatures more serviceable for legal
purposes. Some electronic signatures that legally recognizable as
signatures may not be secure as digital signatures and may lead
to uncertainty and disputes.
Application of Digital Signature
The important reason to implement digital signature to
communication is: o Authentication o Non-repudiation o Integrity
Authentication
is a process which verifies the identity of a user who wants to
access the system. In the digital signature, authentication helps
to authenticate the sources of messages.
Non-repudiation- Non-repudiation means assurance of
something that cannot be denied. It ensures that someone to a
contract or communication cannot later deny the authenticity of
their signature on a document or in a file or the sending of a
message that they originated.
Integrity
Integrity ensures that the message is real, accurate and
safeguards from unauthorized user modification during the
transmission. lgorithms in Digital Signature A digital signature
consists of three algorithms: 1. Key generation algorithm The key
generation algorithm selects private key randomly from a set of
possible private keys. This algorithm provides the private key and
its corresponding public key. 2. Signing algorithm A signing
algorithm produces a signature for the document. 3. Signature
verifying algorithm A signature verifying algorithm either accepts
or rejects the document's authenticity. The steps which are
followed in creating a digital signature are: 1.Select a file to be
digitally signed. 2.The hash value of the message or file content
is calculated. This message or file content is encrypted by using a
private key of a sender to form the digital signature. 3.Now, the
original message or file content along with the digital signature is
transmitted. 4.The receiver decrypts the digital signature by using
a public key of a sender. 5.The receiver now has the message or
file content and can compute it. 6.Comparing these computed
message or file content with the original computed message. The
comparison needs to be the same for ensuring integrity.
Certifying authority as per IT Act:-
The IT Act accommodates the Controller of Certifying
Authorities(CCA) to permit and direct the working of Certifying
Authorities. The Certifying Authorities (CAs) issue computerized
signature testaments for electronic confirmation of clients. The
Controller of Certifying Authorities (CCA) has been named by the
Central Government under Section 17 of the Act for reasons for
the IT Act.
The Office of the CCA appeared on November 1, 2000. It targets
advancing the development of ECommerce and E-Governance
through the wide utilization of computerized marks.
The Controller of Certifying Authorities (CCA) has set up the Root
Certifying Authority (RCAI) of India under segment 18(b) of the IT
Act to carefully sign the open keys of Certifying Authorities (CA)
in the nation. The RCAI is worked according to the gauges set
down under the Act. The CCA guarantees the open keys of CAs
utilizing its own private key, which empowers clients in the
internet to confirm that a given testament is given by an
authorized CA. For this reason it works, the Root Certifying
Authority of India (RCAI). The CCA likewise keeps up the
Repository of Digital Certificates, which contains all the
authentications gave to the CAs in the nation. Role of Certifying
Authorities: Certificate Authority (CA) is a confided in substance
that issues Digital Certificates and open private key sets. The job
of the Certificate Authority (CA) is to ensure that the individual
allowed the extraordinary authentication is, truth be told, who the
individual in question professes to be. The Certificate Authority
(CA) checks that the proprietor of the declaration is who he says
he is. A Certificate Authority (CA) can be a confided in outsider
which is answerable for genuinely confirming the authenticity of
the personality of an individual or association before giving an
advanced authentication. A Certificate Authority (CA) can be an
outer (open) Certificate Authority (CA) like verisign, thawte or
comodo, or an inward (private) Certificate Authority (CA)
arranged inside our system.
Certificate Authority (CA) is a basic security administration in a
system. A Certificate Authority (CA) plays out the accompanying
capacities. A Controller plays out a few or the entirety of the
following roles:
1.Administer the exercises of the Certifying Authorities and
furthermore confirm their open keys. 2.Set out the guidelines that
the Certifying Authorities follow. 3.Determine the accompanying
capabilities and furthermore experience necessities of the
workers of all Certifying Authorities conditions that the Certifying
Authorities must follow for directing business the substance of the
printed, composed, and furthermore visual materials and ads in
regard of the advanced mark and the open key the structure and
substance of an advanced mark declaration and the key the
structure and way where the Certifying Authorities look after
records terms and conditions for the arrangement of examiners
and their compensation. 4.Encourage the Certifying Authority to
set up an electronic framework, either exclusively or together with
other Certifying Authorities and its guideline. 5.Indicate the way
where the Certifying Authorities manage the endorsers.
6.Resolve any irreconcilable situation between the Certifying
Authorities and the endorsers. 7.Set out the obligations of the
Certifying Authorities. 8.Keep up a database containing the
revelation record of each Certifying Authority with all the
subtleties according to guidelines. Further, this database is open
to the general population. Certificate Authority (CA) Verifies the
personality:
The Certificate Authority (CA) must approve the character of
the element who mentioned a computerized authentication before
giving it. Certificate Authority (CA) issues computerized
testaments: Once the approval procedure is finished, the
Certificate Authority (CA) gives the advanced authentication to
the element who requested it. Computerized declarations can be
utilized for encryption (Example: Encrypting web traffic), code
marking, authentication and so on. Certificate Authority (CA)
keeps up Certificate Revocation List (CRL): The Certificate
Authority (CA) keeps up Certificate Revocation List (CRL). An
authentication repudiation list (CRL) is a rundown of
computerized testaments which are not, at this point legitimate
and have been disavowed and subsequently ought not be
depended by anybody. A Certificate Authority (CA) is a selective
element which issues and signs SSL endorsements, confirming
and guaranteeing the reliability of their proprietors. Conclusion:
An entity or individual who needs a digitalized testament can
demand one from an authentication authority; when the
endorsement authority confirms the candidate’s character, it
creates an advanced declaration for the candidate and carefully
signs that authentication with the endorsement authority’s private
key. The computerized endorsement would then be able to be
verified (for instance, by an internet browser) utilizing the
authentication authority’s open key.
Authentication of electronic records (Section3) :- (1)
Subject to the provisions of this section any subscriber may
authenticate an electronic record by affixing his digital signature.
(2) The authentication of the electronic record shall be effected
by the use of asymmetric crypto system and hash function which
envelop and transform the initial electronic record into another
electronic record. Explanation. -For the purposes of this sub-
section, "hash function" means an algorithm mapping or
translation of one sequence of bits into another, generally
smaller, set known as --hash result" such that an electronic
record yields the same hash result every time the algorithm is
executed with the same electronic record as its input making it
computationally infeasible-- (a) to derive or reconstruct the
original electronic record from the hash result produced by the
algorithm (b) that two electronic records can produce the same
hash result using the algorithm. (3) Any person by the use of a
public key of the subscriber can verify the electronic record. (4)
The private key and the public key are unique to the subscriber
and constitute a functioning key pair.]
legal recognition of electronic records and digital
signature (Se ction-4 and 5 ) :- Legal recognition of
[electronic signatures]. ( Section 5 ) --Where any law provides
that information or any other matter shall be authenticated by
affixing the signature or any document shall be signed or bear the
signature of any person, then, notwithstanding anything
contained in such law, such requirement shall be deemed to have
been satisfied, if such information or matter is authenticated by
means of 1 [electronic signature] affixed in such manner as may
be prescribed by the Central Government. Explanation.--For the
purposes of this section, "signed", with its grammatical variations
and cognate expressions, shall, with reference to a person, mean
affixing of his hand written signature or any mark on any
document and the expression "signature" shall be construed
accordingly. Legal Recognition of Electronic Records (Section 4)-
Let’s say that a certain law requires a matter written, typewritten,
or printed. Even in the case of such a law, the requirement is
satisfied if the information is rendered or made available in an
electronic form and also accessible for subsequent reference.
Certifying Authorities and Controller,
3. Evidence Collection:
Most evidence is collected electronically. In other words, the
process by which it is gathered is through the collection of
electromagnetic emanations. In order to trust evidence there
needs to be some basis for the manner in which it was collected.
A. Establishing Presence: Records of activity are often used to
establish presence. For example, users may have passwords that
are used to authenticate their identity. These may be stored
locally or remotely and will typically provide date and times
associated with the start of access, as well as with subsequent
accesses. The verification process provides evidence of the
presence of the individual at a time and place; however, such
validations can be forged, stolen and lent. In some environments
common passwords and user IDs are used, making these
identifications less reliable.
B. Chain of Custody: Digital forensic evidence comes in a wide
range of forms from a wide range of sources. For example, in a
recent terrorism case a computer asserted to be from a
defendant was provided to the FBI by someone who purchased
the computer at a swap meet. These are generally outdoor small
vender sales of used equipment of all sorts- from old guns to old
electronic equipment-sold over folding tables and from the backs
of cars. Some of it is stolen, some of it is resold by people who
nought new versions, some is wholesale, some are damaged
goods, and some is made by those who sell them. This computer
was asserted to contain especially, but establishing a chain of
custody was a very difficult proposition, especially considering
that the defendant claimed to never have had such a computer.
C. How the Evidence was Created: The information that
becomes evidence may be generated for various purposes, most
of which are not for the purpose of presentation in court. In most
cases when information is gathered from systems as they
operate, the systems under scrutiny are altered during the
gathering process.
D. Typical Audit Trails
Typical audit trails include the date and time of creation, last use,
and/or modification as well as identification information such as
program names, function performed, user names, owners,
groups, IP addresses, port numbers, protocol types, portions or
all of the content, and protection settings. If this sort of
information exists, it should be consistent to a reasonable extent
across different elements of the system under scrutiny.
E. Consistency of Evidence
For example, if a program is asserted to generate a file that was
not otherwise
altered, then the program must have been running at the time the
file was created, must have had the necessary permissions to
create the file, must have the capacity to create such a file in
such a format, and must have been invoked by a user or the
system using another program capable of invoking it. There is a
lot of information that should all link together cleanly, and if it
doesn’t, there are reasons to question it.
F. Proper Handling during Collection
In most police-driven investigations normal evidence-handling
requirements are used for digital forensic evidence, with a few
enhancements and exceptions. Photographs and labels are
commonly used, and an inventory sheet is typically made of all
seized evidence. Suspects and others at the location under
investigation are interviewed, passwords and similar information
are retrieved, and in some cases this is used on-site to gain
access to computer systems. If proper procedures are not
followed, then the evidence arising from this process may be
invalidated.
G. Selective Collection and Presentation
In some cases, prosecution teams have opted to not do a
thorough job of collecting or presenting evidence. They prefer to
seek out anything that makes the defendant look guilty and stop
as soon as they reach a threshold required to bring the case to
court. Many prosecution teams try to prevent the defence from
getting the evidence, provide only paper copies of digital
evidence, and so forth. Most defence teams fail to present
evidence that would tend to convict their clients, and they
certainly don’t try to help the prosecution find more evidence
against their clients. Defence teams also do everything they can
to limit discovery and make it as ineffective as possible for the
other side. But because the prosecution is the predominant
gatherer of digital forensic evidence in most criminal cases, it
ends up being the prosecution that conceals and the defence that
tries to reveal.
H. Forensic Imaging
In order to address decay and corruption of original evidence,
common practice is to image the contents of digital evidence and
work with the image instead of the original. Imaging must be done
in such a way as to accurately reflect the original content, and
there are now studies done by the United
States National Institute of Standards and Technology (NIST) to
understand the limitations of imaging hardware and software, as
well as standards for forensic imaging. If these standards are not
met, there may be a challenge to the evidence; however, such
challenges can often be defeated if proper experts are properly
applied.
I. Secret Science and Countermeasures
This is another similar line of pursuit that has been used to
prevent criminal defence teams from gaining access to key
evidence and methods of gathering and analysing evidence. In
essence, the prosecution says that they have an expert who used
a secret technique to determine that the defendant typed this or
that. The defence asks for access to the means and detailed
evidence
so that they can try to refute the evidence, and the prosecution
claims that this information is a government secret, classified at a
level so that the defence
team cannot see it.
IV. Seizure Errors
The evidence seizure process has the potential of producing a
wide range of
errors that may lead to challenges.
A. Warrant Scope Excess
In one case a warrant for a search for pornographic images was
found to be
exceeded when the officer making the search looked in
directories with names that were indicative of other legitimate
use.
B. Acting for Law Enforcement
Similar limitations exist for situations in which a non–law
enforcement person is acting on behalf of law enforcement or the
government.
C. Wiretap Limitations and Title 3
In some cases where a wiretap or network tap is used, there may
also be issues associated with the legality of such a wiretap. The
expertise of the person gathering the evidence is important to
examine. In addition, if minimization is done, then an argument
can sometimes be made that the exculpatory evidence was
excluded in the gathering phase.
D. Collection Limits
Because all collection methods are physical, there are inherent
physical limits in the collection of digital evidence. The challenge
evidence collected based on signals approaching these limits is
typically based on the inability of the mechanism used to gather
the evidence to accurately represent and collect the underlying
reality it is intended to reflect.
V. Transport of Evidence
When digital evidence is taken into custody, appropriate
measures should be
taken to assure that it is not damaged or destroyed.
A. Possession and Chain of Custody
It is common practice in some venues to videotape the evidence
collection
process, and this has been invaluable in meeting subsequent
challenges in many cases. In one example, a challenge was
made based on the presence of a floppy disk in a floppy disk
drive; however, the videotape clearly showed that no floppy disk
was present, and this defeated the assertion.
B. Packaging for Transport
Packaging for transport of digital forensic evidence has
requirements similar to those of other evidence. Chain-of-custody
requirements must be met throughout the process, and the
evidence has to be kept in a suitable environment to the
preservation of
its contents.
C. Due Care Takes Time
Based on the requirement for a speedy trial and high workloads
in most forensic laboratories, time constraints are often placed on
storage and analysis of evidence. The more time spent, the more
detailed an examination can be made and the more of the overall
mosaic will be pieced together.
D. Good Practice
Transportation should be done with the following good practice
elements.
Handle everything with care; keep it away from magnetic sources
such as loudspeakers, heated seats, and radios; place boards
and disks in antistatic
bags; transport monitors face down buckled into seats; place
organizers and palmtops in envelopes; and place keyboards,
leads, mouse, and modems in aerated bags.
VI. Storage of Evidence
Evidence must be stored in a safe, secure environment to assure
that it is safe
from alteration. Access must be controlled and logged in most
cases. Special precautions are needed to protect this evidence,
just as special precautions are needed for some sorts of
biological and chemical evidence.
A. Decay with Time
All media decays with time. Decay of media produces errors.
Typically, tapes,
CDs, and disks last 1 to 3 years if kept well but can fail in minutes
from excessive heat.
An audit trail is another thing that tends to decay with time. Some
are never stored, whereas others last minutes, hours, days,
weeks, months, or years.
B. Evidence of Integrity
Evidence of integrity is normally used to assert that digital
forensic evidence
is what it should be. This is generally assured by using a
combination of notes
taken while the data was extracted; using a well-understood and
well-tested process of collection; being able to reproduce results,
which is a scientific validity requirement in any case; using chain-
of-custody records and procedures; and applying proper imaging
techniques associated with the specific media under examination.
Keeping the original pure by only using it to generate an initial
image and working only from images from then on is a wise move
when
feasible. Just because evidence is not perfect, that doesn’t mean
it is not good enough.
C. Principles of Best Practices
Principle 1: No action should change data held on a computer or
other media.
Principle 2: In exceptional circumstances where examination of
original evidence is required, the examiner must be competent to
examine it and explain its relevance and implications.
Principle 3: Audit records or other records of all processes
applied to digital evidence should be created and preserved. An
independent third party should be able to reproduce those
actions with similar results.
Principle 4: Some individual person should be responsible for
adhering
to these principles.
VII. Evidence Analysis
Evidence analysis is perhaps the most complex and error-prone
aspect of digital evidence.
A. Content
Making content typically involves processing errors. If originals
are present and checksums can be shown to match, then such
challenges will only succeed in the presence of actual and
material error because the validity of the evidence can be
properly established. Missing content typically results from limited
time or excessive focus of attention.
B. Contextual Information
Information has meaning only in context. Analysis can make
context by
making assumptions that are invalid or cannot be demonstrated.
Context is
missed when assumptions that are valid and can be
demonstrated are not made. The challenge to context that has
been made starts with questioning the basis for assumptions. If
assumptions cannot be adequately demonstrated, the context
becomes dubious, the assumptions fall away, and the
conclusions are not demonstrable.
C. Meaning
The meaning of things that are found is obviously the basis for
interpretation.
Meaning that is missed leads to a failure to interpret, and
meaning that is made is an interpretation without adequate
support.
D. Process Elements
Content does not come to exist through magic. It comes to exist
through a process. The notion that a sequence of bits appears on
a system without the notion of how that sequence came to exist
there makes for a very weak case.
E. Relationships
Just as sequences of events produce content, relationships
between event
sequences and content produce content. The presence or
absence of related
content causes differences in the content generated by related
processes.
F. Unreliable Sources
There are a lot of unreliable sources of digital content. For
example, the
Internet is full of the widest possible range of different content,
only a small portion of which is really accurate and a significant
portion of which is just plain false.
G. Reconstructing Elements of Digital Crime Scenes
Digital crime scenes can also be reconstructed, and this is a
critical area for
scientific evidence. But even reconstruction of a digital crime
scene has its limits. Although similar circumstances can be
created, identical ones often cannot. As a rule of thumb, simple
questions can often be answered by digital reconstructions, but
complex sequences of events are far harder to confirm or refute.
DIGITAL EVIDENCE:
Digital Evidence on Operating Systems: An OS (OS) is that
the software component of a computing system that’s liable for
the management and coordination of activities and therefore the
sharing of the resources of the pc. The OS acts as a number for
application programs that are run on the machine. Operating
System Forensics is that the process of retrieving useful
information from the OS (OS) of the pc or mobile device in
question. The aim of collecting this information is to accumulate
empirical evidence against the perpetrator. “OS Forensics”
involves forensic examination of the OS of the pc. The foremost
commonly used operating systems are Windows, Mac, and Linux.
It’s highly likely that the forensic investigators may encounter one
among these operating systems during any crime investigation.
It’s imperative that they need thorough knowledge about these
operating systems, their features, methods of processing, data
storage and retrieval also as other characteristics.
What are the types of Operating systems?
The most popular types of Operating Systems are Windows,
Linux, Mac, iOS, and Android.
Windows
Windows is a widely used OS designed by Microsoft. The file
systems used by Windows include FAT, exFAT, NTFS, and
ReFS. Investigators can search out evidence by analyzing the
following important locations of the Windows:
Recycle Bin: This holds files that have been discarded by the
user. When a user deletes files, a copy of them is stored in
recycle bin. This process is called “Soft Deletion.” Recovering
files from recycle bin can be a good source of evidence.
Registry: Windows Registry holds a database of values and keys
that give useful pieces of information to forensic analysts. For
example, see the table below that provides registry keys and
associated files that encompasses user activities on the
system. Thumbs.db Files: These have images’ thumbnails that
can provide relevant information.
Browser History: Every Web Browser generates history files that
contain significant information. Microsoft Windows Explorer is the
default web browser for Windows OSs.
Linux
Linux is an open source, Unix-like, and elegantly designed
operating system that is compatible with personal computers,
supercomputers, servers, mobile devices, netbooks, and laptops.
Unlike other OSs, Linux holds many file systems of the ext family,
including ext2, ext3, and ext4. Linux can provide an empirical
evidence if the Linux-embedded machine is recovered from a
crime scene.
/etc [%SystemRoot%/System32/config]
This contains system configurations directory that holds separate
configuration files for each application.
/var/log
This directory contains application logs and security logs. They
are kept for 4-5 weeks.
/home/$USER
This directory holds user data and configuration information.
/etc/passwd
This directory has user account information.
Data Acquisition Methods for OS Forensics
There are four Data Acquisition methods for OS forensics which
will be performed on both Static Acquisition and Live Acquisition.
These methods are:
Disk-to-image file: A forensic examiner can make a 1 or quite
one copy of a drive under the OS in question. The tools used for
these methods are iLookIX, X-Ways, FTK, EnCase, or
ProDiscover.
Disk-to-disk copy: This works best when the disk-to-image
method isn’t possible. Tools for this approach include SnapCopy,
EnCase, or SafeBack.
Disk-to-Data File: This method creates a disk-to-data or disk-to-
disk file.
The Sparse copy of a file: this is often a preferable method if time
is restricted and therefore the disk features a large volume of
knowledge storage.
For both Linux and Windows Operating Systems, write-blocking
utilities with Graphical interface (GUI) tools must be utilized in to
realize access to switch the files. A Linux Live CD offers many
useful tools for digital forensics acquisition.
Data Analysis for OS Forensics
Forensic examiners perform data analysis to look at artifacts left
by perpetrators, hackers, viruses, and spyware. They scan
deleted entries, swap or page files, spool files, and RAM during
this process. These collected artifacts can provide a wealth of
data with reference to how malicious actors tried to hide their
tracks and what they were doing to a system.
DATA RECOVERY:
Disk geometry
Hard disk drives are composed of one or more disks or platters
on which data is stored. The geometry of a hard drive is the
organization of data on these platters. Geometry determines how
and where data is stored on the surface of each platter, and thus
the maximum storage capacity of the drive. There are five
numerical values that describe geometry:
Heads
Cylinders
Sectors per track
Write precompensation
Landing zone
Write precompensation and landing zone are obsolete, but often
seen on older drives.
Heads
The number of heads is relative to the total number of sides of all
the platters used to store data. If a hard disk drive has four
platters, it can have up to eight heads. The maximum number of
heads is limited by BIOS to 16. Hard disk drives that control the
actuator arms using voice coil motors reserve a head or two for
accuracy of the arm position. Therefore, it is not uncommon for a
hard disk drive to have an odd number of heads.
Some hard disk drive manufacturers use a technology called
sector translation. This allows some hard drives to have more
than two heads per platter. It is possible for a drive to have up to
12 heads but only one platter. Regardless of the methods used to
manufacture a hard drive, the maximum number of heads a hard
drive can contain is 16.
Cylinders
Data is stored in circular paths on the surface of each head. Each
path is called a track. There are hundreds of tracks on the
surface of each head. A set of tracks (all of the same diameter)
through each head is called a cylinder. The number of cylinders is
a measurement of drive geometry; the number of tracks is not a
measurement of drive geometry. BIOS limitations set the
maximum number of cylinders at 1024.
Sectors per Track
A hard disk drive is cut (figuratively) into tens of thousands of
small arcs, like a pie. Each arc is called a sector and
holds 512 bytes of data. The number of sectors is not important
and is not part of the geometry; the important value is the number
of sectors per track. BIOS limitations set the number of sectors
per track at 63.
Write Precompensation
All sectors store the same number of bytes: 512; however, the
sectors toward the outside of the platter are physically longer
than those closer to the center. Early drives experienced difficulty
with the varying physical sizes of the sectors. Therefore, a
method of compensation was needed-the write precompensation
value defines the cylinder where write precompensation begins.
Landing Zone
A landing zone defines an unused cylinder as a "parking place"
for the R/W heads. This is found in older hard disk drives that use
stepper motors. It is important to park the heads on these drives
to avoid accidental damage when moving hard disk drives.
CHS Values
Cylinders, heads, and sectors per track are known collectively as
the CHS values. The capacity of any hard disk drive can be
determined from these three values.
The maximum CHS values are:
1024 cylinders.
16 heads.
63 sectors per track.
512 bytes per sector.
Therefore, the largest hard disk drive size recognized directly by
the BIOS is 504 MB. Larger drive sizes can be attained by using
either hardware or software translation that manages access to
the expanded capacity without direct control by the system BIOS.
Recovery of cache files
Google Chrome uses a cache that it stores images, scripts and
other parts of downloaded Web pages in. Google Chrome loads
these files from the cache on your computer the next time you
load the page, speeding up page loads and reducing the amount
of downloaded data. You can view and search through a list of
cached files using the special About:cache page in Google
Chrome. After identifying the exact path of the file, you can
recover it from the cache and save it to your computer.
1. Click the address bar at the top of your Google Chrome
window, type “About:cache” into the box and press “Enter.” A
page appears with a list of cached files and their addresses.
2. Press the “Ctrl” and “F” keys on your keyboard at the same
time to open the find bar.
3. Type part of the name or address of a cached file into the find
box and press “Enter” to find it. Continue pressing “Enter” to page
through any matching results.
4. Select the full address of the cached file on the page with your
mouse and press “Ctrl” and “C” at the same time to copy the
address.
5. Click the address bar, press “Ctrl” and “V” at the same time to
paste the address and press “Enter” to load the file. Chrome
loads the file from the cache.
6. Right-click the image, page or script and select “Save As” to
save the cached file to your computer.
Computer Ethics
Ethics: Ethics are a structure of standards and practices that
influence how people lead their lives. It is not strictly
implemented to follow these ethics, but it is basically for the
benefit of everyone that we do.
Ethics are unlike laws that legally mandate what is right or
wrong. Ethics illustrate society’s views about what is right and
what is wrong.
Computer Ethics
Computer ethics are a set of moral standards that govern the use
of computers. It is society’s views about the use of computers,
both hardware and software. Privacy concerns, intellectual
property rights and effects on society are some of the common
issues of computer ethics. It primarily imposes the ethical use of
computing resources. It includes methods to avoid violating the
unauthorized distribution of digital content. The Internet has
changed our lifestyle. It has become a part of our life. It allows us
to communicate with a person from another part of the world.
collecting information on any topic, social meets, and many other
activities. But at the same time, some peoples are always trying
to cheat or harm others.
Ten Commandments of computer Ethics:
The commandments of computer ethics are as follows:
Commandment 1: Do not use the computer to harm other
people’s data.
Commandment 2: Do not use a computer to cause interference in
other people’s work.
Commandment 3: Do not spy on another person’s personal data.
Commandment 4: Do not use technology to steal personal
information.
Commandment 5: Do not spread misinformation using computer
technology.
Commandment 6: Do not use the software unless you pay for this
software.
Commandment 7: Do not use someone else’s computer
resources unless he authorized to use them.
Commandment 8: It is wrong to claim ownership of a work that is
the output of someone else’s intellect.
Commandment 9: Before developing software, think about the
social impact it can of that software.
Commandment 10: While computers for communication, always
respectful with fellow members.
Categories of Computer Ethics Issues:=
Privacy: i) Computers create a false sense of security ii)
People do not realize how vulnerable information stored
on computers are.
Property: i) Physical property ii) Intellectual property (in both
copyright and patent) iii)Data as property
Access: i) Access to computing technology
ii) Access to data
Accuracy: i) Accuracy of information stored.
Chain of Custody: As forensic investigators collect media
from the client and transfer it, they should document all the steps
conducted during the transfer of media and the evidence on the
Chain of Custody (CoC) forms and capture signatures, date, and
time upon the media handoff. It is essential to conduct CoC
paperwork due to the following reasons
: • CoC demonstrates that the image has been under known
possession since the time the image was created. • Any lapse in
the CoC nullifies the legal value of the image, and thus the
analysis. • Any gaps in the procession record like any time the
evidence was left unattended in an open space or an unsecured
location are problematic.
Evidence Analysis :- Digital evidence is any significant
information stored or transmitted in digital form that a party to a
court case may use at trial. Learn more in A Comprehensive
Perspective on Mobile Forensics: Process, Tools, and Future
Trends. Digital evidence is information stored or transmitted in
binary form that may be relied on in court. It can be found on a
computer hard drive, a mobile phone, among other place s.
Digital evidence is commonly associated with electronic crime, or
e-crime, such as child pornography or credit card fraud. However,
digital evidence is now used to prosecute all types of crimes, not
just e-crime. For example, suspects' e-mail or mobile phone files
might contain critical evidence regarding their intent, their
whereabouts at the time of a crime and their relationship with
other suspects. In an effort to fight e-crime and to collect relevant
digital evidence for all crimes, law enforcement agencies are
incorporating the collection and analysis of digital evidence, also
known as computer forensics, into their infrastructure. Law
enforcement agencies are challenged by the need to train officers
to collect digital evidence and keep up with rapidly evolving
technologies such as computer operating systems.
Processing of evidences and preparations of report :-
Digital evidence is volatile and fragile and the improper handling
of this evidence can alter it. Because of its volatility and fragility,
protocols need to be followed to ensure that data is not modified
during its handling. These protocols delineate the steps to be
followed when handling digital evidence. There are four phases
involved in the initial handling of digital evidence:
identification, collection, acquisition, and preservation. There
are protocols for the collecting volatile evidence. Volatile
evidence should be collected based on the order of volatility; that
is, the most volatile evidence should be collected first, and the
least volatile should be collected last.
Identification
In the identification phase, preliminary information is obtained
about the cybercrime case prior to collecting digital evidence.
This preliminary information is similar to that which is sought
during a traditional criminal investigation. The answers to these
questions will provide investigators with guidance on how to
proceed with the case. For example, the answer to the question
"where did this crime occur?" - that is, within or outside of a
country's borders - will inform the investigator on how to proceed
with the case. In the identification phase, cybercrime investigators
use many traditional investigative Before digital evidence
collection begins, the investigator must define the types of
evidence sought. Digital evidence can be found on digital
devices, such as computers, external hard drives, flash drives,
routers, smartphones, tablets, cameras, smart televisions,
Internet-enabled home appliances (e.g., refrigerators and
washing machines), and gaming consoles (to name a few), as
well as public resources (e.g., social media platforms, websites,
and discussion forums) and private resources (e.g. Internet
service providers logs of user activity; communication service
providers business records; and cloud storage providers records
of user activity and content).
Collection
With respect to cybercrime, the crime scene is not limited to the
physical location of digital devices used in the commissions of the
cybercrime and/or that were the target of the cybercrime. The
cybercrime crime scene also includes the digital devices that
potentially hold digital evidence, and spans multiple digital
devices, systems, and servers. The crime scene is secured when
a cybercrime is observed, reported, and/or suspected. The first
responder identifies and protects the crime scene from
contamination and preserves volatile evidence by isolating the
users of all digital devices found at the crime scene (e.g., holding
them in a separate room or location In addition to digital devices,
other relevant items should be collected as well. The actions
taken by the investigator during the collection of evidence should
be documented. Each device should be labelled (along with its
connecting cables and power cords), packaged, and transported
back to a digital forensics laboratory .Once the items are
transported to the laboratory, they are "inventoried, recorded, and
secured in a locked room…away from extreme temperatures,
humidity, dust, and other possible contaminants". Acquisition
Different approaches to performing acquisition exist. The
approach taken depends on the type of digital device. For
example, the procedure for acquiring evidence from a computer
hard drive is different from the procedure required to obtain digital
evidence from mobile devices, such as smartphones. Unless live
acquisition is performed, evidence is extracted from the seized
digital devices at the forensic laboratory (i.e., static acquisition).
At the forensics laboratory, digital evidence should be acquired in
a manner that preserves the integrity of the evidence (i.e.,
ensuring that the data is unaltered); that is, in a forensically
sound manner. Preservation Evidence preservation seeks to
protect digital evidence from modification. The integrity of digital
evidence should be maintained in each phase of the handling of
digital evidence (ISO/IEC 27037). First responders, investigators,
crime scene technicians, and/or digital forensics experts must
demonstrate, wherever possible, that digital evidence was not
modified during the identification, collection, and acquisition
phase; the ability to do so, of course, depends on the digital
device (e.g., computer and mobile phones) and circumstances
encountered by them (e.g., need to quickly preserve data). To
demonstrate this, a chain of custody must be maintained. The
chain of custody is "the process by which investigators preserve
the crime (or incident) scene and evidence throughout the life
cycle of a case. It includes information about who collected the
evidence, where and how the evidence was collected, which
individuals took possession of the evidence, and when they took
possession of it". In the chain of custody, the names, titles, and
contact information of the individuals who identified, collected,
and acquired the evidence should be documented, as well as any
other individuals the evidence was transferred to, details about
the evidence that was transferred, the time and date of transfer,
and the purpose of the transfer. Analysis and Reporting In
addition to the handling of digital evidence, the digital forensics
process also involves the examination and interpretation of digital
evidence ( analysis phase), and the communication of the
findings of the analysis ( reporting phase). During the analysis
phase, digital evidence is extracted from the device, data is
analysed, and events are reconstructed. Before the analysis of
the digital evidence, the digital forensics analyst in the laboratory
must be informed of the objectives of the search, and provided
with some background knowledge of the case and any other
information that was obtained during the investigation that can
assist the forensics analyst in this phase (e.g., IP address or
MAC addresses).
Data Recovery:
Disk Geometry:- If you’re planning an Exchange infra-structure
or even if you have already implemented it, one of the must-reads
is undoubtably Optimizing Storage for Exchange Server 2003. In
this fine document you can read:
“Disk subsystem bottlenecks cause more performance problems
than server-side CPU or RAM deficiencies, and a poorly
designed disk subsystem can leave your organization vulnerable
to hardware malfunctions.
“ This is so true! As memory chips become cheaper and
consolidation dictates more users per server, the disk subsystem
turns into the main cause of performance problems.
The key to a system without problems is proper planning and
design. Of course there’s always some tweaking you can do,
preferably before going live with the system.
Realigning the hard disk is one of these things, which can lead to
a significant performance improvement. Hard Disk Basics Hard
disks are organized as a concentric stack of platters. The data is
stored on concentric circles on the surfaces known as tracks.
Sections within each track are called sectors. A sector is the
smallest physical storage unit on a disk and typically it will hold
512 bytes of data.
The disk itself can’t handle smaller amounts of data than one
sector. Electromagnetic read/write heads are positioned above
and below each platter. As the platters spin, the drive heads
move in toward the center surface and out toward the edge. In
this way, the drive heads can reach the entire surface of each
platter.
Reading from 2 tracks implies a realignment of the reading
heads, thus it takes longer than reading a single track. The
Theory Microsoft provides a tool, DiskPar, which allows aligning
the disk tracks with sector tracks.
For partitions created by Windows 2000 and Windows Server
2003, the default starting sector for disks that have more than 63
sectors per track is the 64th sector.
Because Windows will read blocks of 4 KB (8 sectors), one out of
every eight blocks of data written to your disk will span two disk
tracks (assuming 64 sectors per track).
DiskPar can increase disk performance as much as 20 percent,
but you should always consult your hardware vendor before
using this tool (I’ll discuss why next).
Some disk configurations will have no benefit from the tool. The
Real World If you imagine the surface of a disk platter,
considering a constant number of sectors per track and knowing
that track lengths increase the farther a track resides from the
center of the disk (they are concentric circles), it’s not hard to
conclude that the outer data sectors are longer than the inner
data sectors.
This means that the outer tracks are greatly underutilized,
because in theory they can hold many more sectors given the
same linear bit density.
In order to increase capacity and eliminate this wasted space, a
technique called zone bit recording (ZBR) is employed on modern
hard disks. With this technique, tracks are grouped into zones
based on their distance from the center of the disk, and each
zone is assigned a number of sectors per track.
Data Recovery Procedures :-
1. Stop using all affected devices The moment you realize that
you’ve suffered a data loss incident, you need to stop using all
affected devices. In some cases, it’s possible to restore lost data
from your hard drive before it’s overwritten — but the risk of
overwriting is high if you keep using the disk. If your data loss has
been caused by an incident like fire or flooding, you’ll need to
stop using the equipment until it’s been inspected and declared
safe by a professional. Never attempt a DIY job after serious
damage — you’ll only risk your own safety and reduce the
chance of successful data recovery.
2. Record details on what happened Knowing exactly what
caused your data loss is essential if you want to choose the right
recovery method. As much knowledge as possible will also make
it easier to prevent the same thing from happening in the future.
Make notes on the circumstances surrounding the incident,
including as much detail as you can.
Consider things such as:
• Have you recently made changes to your IT system? • Is there a
new employee accessing your data? • Was your building affected
by extreme weather, as is common in Florida? • Is there any
building work taking place in your office? The most insignificant
details might provide important clues, so don’t leave anything out.
3. Decide which data recovery method to use Once you’ve
ascertained exactly what caused the data loss, it’s time to work
on getting your data back. If you’ve been creating regular
backups, the easiest solution is to restore your data from these
backups. However, if you don’t have a backup solution in place,
you’ll need to look at alternative methods like disk recovery. You
can attempt disk recovery on your own by downloading specialist
software, or you can get help from a professional. For equipment
that’s been damaged by water, fire, or other environmental
factors, you’ll need help from a recovery specialist. The details
you collected in the previous step will come in handy at this point.
4. Contact an IT professional for support Once you know what
caused your data loss and which recovery method is most
appropriate, you may decide to contact an IT professional for
support. Even in cases where you could attempt recovery
yourself, it’s always safer to get expert help — particularly if
you’ve lost large amounts of important data. A failed attempt at
recovery could do more harm, which means extra costs further
down the line.
5. Prevent future data incidents Once you’ve recovered as much
data as you can, it’s important to think about lessons learned.
Look at the factors that caused the loss and take steps to prevent
the same thing from happening again. If there’s a vulnerability in
your system, bring in experts to increase your security. If your
equipment was damaged by environmental factors, look into
backing your data up offsite (perhaps in another state altogether).
If you’re struggling to protect your data, consider investing in
managed IT services. Recovery of Internet Usage Data:-
Enterprise data recovery is the process of restoring lost,
corrupted, accidentally deleted, or otherwise inaccessible data to
its server, computer, mobile device, or storage device (or to a
new device if the original device no longer works). Typically, the
data is restored from a backup copy that is stored in another
location. The more recent the backup copy, the more completely
the data can be recovered in the event of loss or damage. For
any business, successful data recovery—data recovery that
prevents a greater-than-tolerable loss of data or discontinuity of
business due to loss of data— requires the business to have a
backup and restore plan that meets specific data recovery
objectives, usually as part of a larger disaster recovery plan. The
term ‘data recovery’ can also refer to the following:
• Software designed to ‘undelete’ files a user may have
accidentally deleted by restoring system formatting to those files.
• Specialized services for physically recovering data from
damaged disks.
• Restoring data to a mobile device from a cloudbased backup,
such as iCloud. This article, however, will focus on enterprise
data recovery. Backup plan Data loss due to human error
remains more prevalent than data destruction due to natural or
man-made disasters or criminal activities such as ransomware
attacks. Your enterprise should, however, be prepared for any
data loss that can disrupt critical business applications or
operations, no matter what the cause. A comprehensive backup
and recovery solution should be in place to protect every piece of
data worth saving, wherever it resides.
Backups may cover the following:
• Servers: Both on-premises physical servers and virtual or
cloud-hosted servers may need to be backed up regularly or
continuously.
• Storage area networks (SANs) and other shared storage
resources: This can include block, object, and file storage.
• Endpoint devices: These may include desktop and laptop
computers, workstations, and tablet and mobile devices. For
these device types, individual hard drives will have to be restored.
In addition to files, there are certain of types of data you need to
back up:
• Applications and their associated data
• Databases and any associated data structures, formats, tags,
or metadata
• System data, including operating system (OS) and application
configurations
• Runtimes, including virtual machines (VMs) and containers
Recovery point objective and recovery time objective Recovery
point objective, or RPO, is essentially the age of the oldest
backup you can tolerate. RPOs will vary depending on the data,
the application, the industry, or a combination of these and other
factors.
For example, the email system at a coffee shop might be able to
tolerate a 24-hour RPO, whereas the email system at a hospital,
a bank, or some other highly regulated business may require
RPOs measured in minutes. At a brokerage, where each trade
could be worth millions, a trading system might have an RPO
measured in seconds—or less. Recovery time objective, or RTO,
is the longest amount of downtime you can afford. The checkout
at your local bookstore might have an RTO of hours or days,
because downtime might cost USD 100 per hour.
An online store might have an RTO measured in seconds,
because each second of downtime might mean hundreds of
thousands of dollars in lost business. RPO and RTO will
determine the frequency, method, and even the location of your
backups
. An application with an RPO and RTO measured in hours might
be able to get by with nightly backups to any third-party cloud
provider. An application with an RPO and RTO measured in
seconds (or less) might require continuous data replication or
even fully redundant systems hosted at a nearby location that
can take over immediately and seamless in the event of any data
loss or system problems. Any data recovery service provider you
work with should provide a service level agreement (SLA)
detailing the RPOs and RTOs they are able to achieve, the
security controls they have in place, and the safeguards against
data loss they they’ve established.
Your contract should specify the site or sites where your backups
will be stored and should indicate how the provider will comply
with any regulations in your industry
Cloud data recovery solutions Cloud backup and recovery
solutions are increasingly popular among consumers and
enterprises alike, but they’re especially useful when businesses
have to back up large amounts of data (such as the contents of
an entire data center) and want to reduce their infrastructure
expense and administrative burden.
Cloud backup and recovery preserves copies of data in a
secondary, offsite storage location. The cloud provider offers
access to the storage—and, possibly, additional managed
backup and recovery services— on a subscription basis with
pricing based on storage volume and/or bandwidth usage.
Secure data recovery The security of your data backups depends
on two major things:
• Encryption of backup files in transit and at the backup storage
site.
• Physical security, user authentication, and access controls at
the backup storage site. If your industry has regulations
governing data privacy and security, you’ll want to make sure
your backup tools, processes, or service providers comply with
those regulations (if you work with a service provider, ask for
certification of compliance).
Recovery of Swap Files/Temporary Files/Cache Files :-
Even when such files have been deleted, they can be recovered
months or years later using readily available forensics tools.
When a person “deletes” a file on a home computer, the data
contained in the file does not actually disappear; rather, that data
remains on the hard drive until it is overwritten by new data.
Therefore, deleted files, or remnants of deleted files, may reside
in free space or slack space — that is, in space on the hard drive
that is not allocated to an active file or that is unused after a file
has been allocated to a set block of storage space — for long
periods of time before they are overwritten. In addition, a
computer’s operating system may also keep a record of deleted
data in a swap or recovery file. Similarly, files that have been
viewed via the Internet are automatically downloaded into a
temporary Internet directory or cache. would be frustrating if you
mistakenly deleted a temp file. It is very easy to get it back if you
haven't erased it from the recycle bin or trash. What if you have
already emptied the recycle bin? Don't worry, you can still
recover permanently deleted temporary files using data recovery
software like Wondershare Recoverit.
Recover lost or deleted document files, photos, videos, music,
emails from any storage device effectively, safely and completely.
Restore files from all kinds of storage media like emptied recycle
bin, USB Drive, SD cards, SSDs, HDDs, Floppy Disks, Pen Drive,
etc. Supports recovering data for sudden deletion, formatting,
hard drive corruption, virus attack, and system crash under
different situations. Preview files before you recover them. No
payment is required if the files are unrecoverable.
Step1 Select the File Location Launch Recoverit on your
computer. Select the location where you have deleted the files
under the Hard Drives and Locations tab.
Step2 Scan the Location Recoverit will start an all-around scan
automatically. You only need to wait for seconds or minutes
depending on the file size in total. Meanwhile, you can see the
real-time scanning results on the interface, by which you can
check the result at any time. The different ways to filter, select,
and pinpoint the files help you find the desired files easily. Step3
Preview and Recover After reviewing the files and confirming
they are what you want, you can now get them all back by hitting
on the Recover button.
A temporary file, temp file, or a foo file is the one that is created
by the operating system or program while the program is running
or being created or modified. These temporary files are usually
deleted once the program is ended. However, if the temp file is
not deleted automatically, you can delete them for freeing some
space on your device.
Recovery Cache Files :-
Most devices have some form of cache cleanup. New data
comes in, and older information is removed. This system ensures
that your device isn't bogged down by so much storage that it
can't tackle anything new. But you might choose to clear cache
too. Common reasons for doing so include:
• Speed and performance. A full cache needs memory, and if
you're full, a bogged down memory doesn't work very quickly.
Clearing the backlog could make your device work quicker. •
Hacking cleanup. After an attack, developers can restore a
website to working order. If you have a cached version of the
broken site in your device, launching it again could mean still
launching the attack. A compromised site cache like this can be
very dangerous.
• Protecting privacy. Someone logging into your device can see
where you've gone and what you've done by looking over your
cached data. If you're using a public device, like a computer in a
library, your cache could be the gateway to an attack.
Recovery-Formatted Partition Recovery :- Circumstances
leading to corruption of partition information (tables) include faulty
disk sectors, a component failure on the disk logic board,
attempts to edit the partition tables by unskilled users and
reformatting procedures. As always in data recovery procedures,
no attempt should ever be made to repair or recover partition
information from the disk in question. An exact electronic replica
of all content on the disk must be made, and all work performed
on that. If you’ve experienced a computer disaster and deleted or
lost critical data, chances are we can recover it. We are data
recovery specialists and regularly recover deleted files following
computer disasters such as:
• Files have been accidentally or maliciously deleted, or files are
corrupted.
• Hard disk has failed due to power supply spike or head crash.