![]() A computer or computer network) without altering the data on that system. Again, the nature of the forensic examination and the goal of the investigation will determine the most appropriate tools to be used.Before examining the tools themselves, a short discussion of some key concepts of computer forensic examination may be beneficial for readers new to this field:In general, a computer forensic investigator will use a tool in order to gather data from a system (e.g. ![]() Some of the market-leading commercial products cost thousands of dollars while other tools are completely free. ![]() The unique nature of every investigation will determine which tool from the investigator's toolkit is the most appropriate for the task in hand.As well as differing in functionality and complexity, computer forensic tools also differ in cost. Similarly some computer forensic tools are designed with only one purpose in mind whereas others may offer a whole range of functionality. This article describes some of the most commonly used software 'tools' and explains how and why they are used.Although most real world tools are designed to carry out a specific task (the hammer to hammer nails, the screwdriver to turn a screw, etc.) some tools are designed to be multi-functional. In common with many other professions, the field of computer forensic investigation makes use of tools to allow practitioners to carry out their tasks effectively and efficiently.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |