Reference no: EM1326058
Computer Forensics - Analysing hostile code
In this week, you need to analyze software. In your forensics practice, you often need to analyze hostile codes. In order to be safe, we do not recommend you take the risk of analyzing a real hostile code. However, if you could set up a secure environment and you decide to get some real experience on analyzing a real hostile code, you can do so. You need to select the software (e.g., WinWord, notepad, etc.) to investigate as soon as possible. Then you may use software such as pslist, PMDump, handle or Holodeck to find out what kind of external resources it is using. To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.
Some Hints:
For Linux systems, the following is a list of commands that you may use to analyze binaries:
md5sum, file, strings (e.g., strings -a xxx|more), hexdump (e.g, hexdump -C -v xxx|more), nm, ldd, readelf, objdump, strace (e.g., strace -o strace.txt -x -e write=all -ff ./xxx), gdb,
For windows, you may use systeminternals.com tools and also the following commands:
edit, cl, type, and cygwin based linux commands as above.
Explaining the contracts
: Is this contract legal and enforceable? Why or why not? If the agreement is not enforceable, how might Jan and Amy restructure it to increase its chances of being legal? Discussion on the legality of contracts
|
Thadvantages and disadvantages of using pass by reference
: Discuss the pros and cons of static and dynamic allocation of memory in embedded applications. Be certain to address the circumstances under which there might be potential problems.
|
Important task about conflict of interest
: Explain the kinds of conflicts of interest and how these problems may have devastating consequences. Explain why integrity is important to maintain regardless of the field/business.
|
Describe what degree of concentration it exhibits
: Describe what degree of concentration it exhibits. Would it be considered an oligopoly.
|
Analysing hostile code
: Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.
|
Business ethics-corporate responsiblity
: How would you balance your decision making between social ethics and responsibility to your employer? Explain
|
Legally enforceable contract
: Do they have a binding contract? Must Jack buy the car from Rudy, even though it doesn't have an engine? What factors determine if a contract exists and if it is legally enforceable on both parties?
|
Business person influencing business in future
: Please identify a business person (profit or non-profit) who you admire and articulate: How this person may influence you for your future in business.
|
Describe the idea of trade offs cost also benefit analysis
: Describe the idea of trade offs cost also benefit analysis when answering the above question.
|