SlideShare a Scribd company logo
Understanding
Memory in
Computing
Pravash Chandra Das
Digital Forensic Specialist
Disclaimer
:
This tutorial is for educational purposes only,
showcasing digital forensics principles.
Ensure legal compliance, ethical use and
obtain proper authorization before applying
these techniques. The creator is not
responsible for any misuse or legal
consequences resulting from the information
provided. Always handle digital evidence with
care to prevent data loss.
Introduction
Memory in the context of
computing generally refers to
storage, where data and
programs are stored for the
computer to access.
Types of Memory
There are different types of
memory in a computer
system. RAM, or Random
Access Memory, is volatile
and temporary. On the other
hand, storage devices like
hard drives and solid-state
drives are non-volatile and
retain data even when the
power is off.
File Deletion
When you delete a file from
storage, it is not immediately
erased. Instead, the
operating system marks the
space occupied by the file as
'available' or 'free,' allowing
it to be overwritten by new
data.
Recovery Tools
Until that space is
overwritten, the original data
may still be recoverable using
specialized tools. Forensic
tools like Foremost and
Autopsy are designed for this
purpose.
How Recovery Tools Work ?
These tools operate by
scanning the storage medium
for data that is not
associated with any file or
directory entry. They can
identify and reconstruct data
based on patterns and
structures, even if the file
system has removed the
reference to that data.
File Recovery Process
• Let's break down how file recovery works:
• - Deletion: When you delete a file, the OS
marks the space as available for new data.
• - File Recovery Tools: Tools like Foremost and
Autopsy search for data not linked to any file
system entries.
• - Data Reconstruction: The tools identify
patterns and structures in the data.
• - Overwriting Risk: If the space is overwritten
by new data, recovery becomes challenging.
Factors Affecting Recovery
The effectiveness of file
recovery depends on factors
like how much new data has
been written to the storage
device since the file was
deleted.
Enhancing Data Security
To enhance data security, consider
using secure deletion methods or
encryption tools when disposing of
sensitive information permanently.
Some file systems may also have
features like 'trim' or 'secure erase'
to help securely delete data.
Conclusion
In conclusion, understanding
how memory works and the
risks associated with file
deletion is crucial for
maintaining data security in
computing
Ad

More Related Content

Similar to Understanding Memory in Computing part 1.pptx (20)

ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
Manuel Garza
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Presentation1
Presentation1Presentation1
Presentation1
aterodz
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
ziway
 
Operating zSYtemterfrom Presentationform
Operating zSYtemterfrom PresentationformOperating zSYtemterfrom Presentationform
Operating zSYtemterfrom Presentationform
NylHarias
 
2 opreating system
2 opreating system2 opreating system
2 opreating system
HekmatFaisal
 
Chapter 8 system soft ware
Chapter 8 system soft wareChapter 8 system soft ware
Chapter 8 system soft ware
MrSaem
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
ijsrd.com
 
The purpose of operating systems 2
The purpose of operating systems 2The purpose of operating systems 2
The purpose of operating systems 2
93DragonNinja
 
Operating system
Operating systemOperating system
Operating system
Hussain Ahmady
 
File Carving
File CarvingFile Carving
File Carving
Aakarsh Raj
 
ppt of features of operating system.pptx
ppt of features of operating system.pptxppt of features of operating system.pptx
ppt of features of operating system.pptx
NehaAnand998175
 
operating system structure
operating system structureoperating system structure
operating system structure
Waseem Ud Din Farooqui
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
 
Database management systems notes for unit 1
Database management systems notes for unit 1Database management systems notes for unit 1
Database management systems notes for unit 1
Priyadarshini803769
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
Rahul Nagda
 
DBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational databaseDBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational database
walaahuluu
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It Architecture
UMaine
 
When disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issuesWhen disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issues
datarecovery osx
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
Manuel Garza
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Presentation1
Presentation1Presentation1
Presentation1
aterodz
 
installing and optimizing operating system software
installing and optimizing operating system software   installing and optimizing operating system software
installing and optimizing operating system software
ziway
 
Operating zSYtemterfrom Presentationform
Operating zSYtemterfrom PresentationformOperating zSYtemterfrom Presentationform
Operating zSYtemterfrom Presentationform
NylHarias
 
2 opreating system
2 opreating system2 opreating system
2 opreating system
HekmatFaisal
 
Chapter 8 system soft ware
Chapter 8 system soft wareChapter 8 system soft ware
Chapter 8 system soft ware
MrSaem
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
ijsrd.com
 
The purpose of operating systems 2
The purpose of operating systems 2The purpose of operating systems 2
The purpose of operating systems 2
93DragonNinja
 
ppt of features of operating system.pptx
ppt of features of operating system.pptxppt of features of operating system.pptx
ppt of features of operating system.pptx
NehaAnand998175
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
 
Database management systems notes for unit 1
Database management systems notes for unit 1Database management systems notes for unit 1
Database management systems notes for unit 1
Priyadarshini803769
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
Rahul Nagda
 
DBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational databaseDBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational database
walaahuluu
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It Architecture
UMaine
 
When disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issuesWhen disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issues
datarecovery osx
 

Recently uploaded (20)

Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentSecure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Shubham Joshi
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentSecure Test Infrastructure: The Backbone of Trustworthy Software Development
Secure Test Infrastructure: The Backbone of Trustworthy Software Development
Shubham Joshi
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Requirements in Engineering AI- Enabled Systems: Open Problems and Safe AI Sy...
Lionel Briand
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)Who Watches the Watchmen (SciFiDevCon 2025)
Who Watches the Watchmen (SciFiDevCon 2025)
Allon Mureinik
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
How to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud PerformanceHow to Optimize Your AWS Environment for Improved Cloud Performance
How to Optimize Your AWS Environment for Improved Cloud Performance
ThousandEyes
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Ad

Understanding Memory in Computing part 1.pptx

  • 1. Understanding Memory in Computing Pravash Chandra Das Digital Forensic Specialist
  • 2. Disclaimer : This tutorial is for educational purposes only, showcasing digital forensics principles. Ensure legal compliance, ethical use and obtain proper authorization before applying these techniques. The creator is not responsible for any misuse or legal consequences resulting from the information provided. Always handle digital evidence with care to prevent data loss.
  • 3. Introduction Memory in the context of computing generally refers to storage, where data and programs are stored for the computer to access.
  • 4. Types of Memory There are different types of memory in a computer system. RAM, or Random Access Memory, is volatile and temporary. On the other hand, storage devices like hard drives and solid-state drives are non-volatile and retain data even when the power is off.
  • 5. File Deletion When you delete a file from storage, it is not immediately erased. Instead, the operating system marks the space occupied by the file as 'available' or 'free,' allowing it to be overwritten by new data.
  • 6. Recovery Tools Until that space is overwritten, the original data may still be recoverable using specialized tools. Forensic tools like Foremost and Autopsy are designed for this purpose.
  • 7. How Recovery Tools Work ? These tools operate by scanning the storage medium for data that is not associated with any file or directory entry. They can identify and reconstruct data based on patterns and structures, even if the file system has removed the reference to that data.
  • 8. File Recovery Process • Let's break down how file recovery works: • - Deletion: When you delete a file, the OS marks the space as available for new data. • - File Recovery Tools: Tools like Foremost and Autopsy search for data not linked to any file system entries. • - Data Reconstruction: The tools identify patterns and structures in the data. • - Overwriting Risk: If the space is overwritten by new data, recovery becomes challenging.
  • 9. Factors Affecting Recovery The effectiveness of file recovery depends on factors like how much new data has been written to the storage device since the file was deleted.
  • 10. Enhancing Data Security To enhance data security, consider using secure deletion methods or encryption tools when disposing of sensitive information permanently. Some file systems may also have features like 'trim' or 'secure erase' to help securely delete data.
  • 11. Conclusion In conclusion, understanding how memory works and the risks associated with file deletion is crucial for maintaining data security in computing