Font Size: a A A

No Password To Log On To The Computer Forensics System

Posted on:2012-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q QianFull Text:PDF
GTID:2208330335997470Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of science and technology, and the growing popularity of Internet and computer, criminal activities by using networks and computers and other high-tech means are increasing, such as taking financial crimes by using computers to decipher the password with the purpose of spread, trafficking or extortion. using network to spread activities, infringing others'reputation, privacy, intellectual property, and so on, and even spreading reactionary speech, carrying out activities which will endanger nation's security and separate the nation. So how to get or restore the criminal evidence and useful information from criminals'computers has become the focus of safety departments.This thesis focus on computers with Windows operation system, studying on how to bypass the boot password directly into the suspect's computer, how to quickly collect sensitive electronic evidence, how to analyze evidence and how to display results, and how to revert site to eliminate any trace which will not let others notice their computer be entered for evidence collection. And then put the theory study into practice based on this study by writing a version of evidence collection system by logging in without passport, collecting and analyzing the computer system information, the Recycle Bin, the latest use records, browser history, auto completed forms, U disk plug record, sensitive documents, email and other communication tools, etc. This will reduce the time and work about original evidence collection method which information should be copied and under stimulant condition, decipher the passport and then collect evidence. The system will allow those who are not so excellent in operating computers collect and analyze evidence from computers on site.
Keywords/Search Tags:Computer, Computer Forensics, File Search, clean up traces, Analysis and Decryption
PDF Full Text Request
Related items