Note-18

Note-18 - CSE 494/598 Forensic Computing: Computer and...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 494/598 Forensic Computing: Computer and Network Forensics Prof. Gail-Joon Ahn Project: Due April 23 ! Challenge 1 ! Need to analyze VBR (Volume Boot Record) not MBR ! Challenge 2 ! Use FTK’s email analysis features that we discussed in class ! Challenge 3 ! Metadata analysis is needed ! At least 6 questions
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cyber Gazette ! Conficker: updates ! After a week, computers infected with the worm began downloading new commands to modify how the Conficker functions. The latest modifications to the program reactivates the worm's ability to spread using a flaw in Microsoft Windows and redirects most communications through the program's peer-to- peer network . ! The mainstream media had focused that the previous version of Conficker would start searching through 50,000 random domains daily. Instead, the authors waited a week and never even used the Internet drop, or rendezvous, point system on which remediation efforts had focused. Understanding Bitmap, Raster and Vector Images Bitmap Grid of pixels Vector images Uses geometric primitives 4
Background image of page 2
Understanding Digital Camera File Formats ! Examining the raw file format ! Raw file format ! Referred to as a digital negative ! Typically found on many higher-end digital cameras ! The process of converting raw picture data to another format is referred to as demosaicing ! Examining EXIF format ! Exchangeable Image File (EXIF) format ! Commonly used to store digital pictures ! EXIF format collects metadata ! EXIF file stores metadata at the beginning of the file 5 6 Understanding Data Compression ! Some image formats compress their data !
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

Note-18 - CSE 494/598 Forensic Computing: Computer and...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online