Font Size: a A A

The Research And Implementation Of Computer Information Retrieval System

Posted on:2011-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:X X WeiFull Text:PDF
GTID:2178360308968333Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Computer forensics has been the focus of people'research and study because of the increasing computer crime. As a interdiscipline of computer and forensic field, computer forensic is often used to solve mass computer crimes and safety accidents, including internet intrusion, internet fraud etc.First, the paper introduced the research statuses of computer forensics and movable devices, and then gave the purpose and significance of the subject. The author studied knowledge about computer forensics seriously, including the definition of computer forensics, the principle of computer forensics and the process of computer forensics and so on. On the basis of present tool, the paper proposed the shortcoming of them. And then, the paper introduced technology about movable equipment, including U3 technology, how windows supervises the USB equipment and the safe problem of movable equipment and so on.On the basis of theory of preceding, the paper proposed a new method of computer forensics. The new method made the movable device as the hardware vector and combines with the new developing software. The tool could search some often used files in windows such as PDF and Word. It also could search some software often used at home, such as foxmail as email and QQ as instant message.The computer forensics at the present stage, suspectable hardware was taken to the laboratory and computer forensics personnel would copy all the data on the hardware. Temporary data would clear away when computer was shut down, and the encrypted hardware would add difficulties to forensic personnel. The paper stated the research status and introduced the method of information extraction based on a movable storage media. The new tool will extract data according to predestinate, and it will stay no marks in computer system. It can also attract no attention of administrator.On the basis of Digital Evidence Search Kit, the subject did research on fast invisible system. The system integrated movable storage, information collecting, information encryption etc. The paper would discuss on the theory research and system realizing, and had an analysis on data identification of Hash algorithm.
Keywords/Search Tags:computer forensics, movable storage technology, data identification, information certification
PDF Full Text Request
Related items