Create a c7prj03 folder on the usb or disk drive

Assignment Help Basic Computer Science
Reference no: EM131397312

In this project, you create a test drive by planting evidence in the file slack space on a USB drive or small disk partition. Then you use FTK and Hex Workshop (which you downloaded in a previous chapter from www.hexworkshop.com) to verify that the drive contains evidence. Follow these steps:

1. First, you format the drive in Windows Explorer. Right-click the drive icon and click Format, click to clear the Quick Format check box, if necessary, and then click Start. If you see a warning message, click OK to continue. You can also use SecureClean as described in Hands-On Project 7-2 to wipe the drive. When you're finished, exit Windows Explorer or SecureClean.

2. Create a C7Prj03 folder on the USB or disk drive. Warning: This drive should contain data you no longer need.

3. Start a new document in Word and type Testing for string Namibia. Save the file in the C7Prj03 folder as C7Prj03a.doc.

4. Close the file, start a new Word document, and type Testing for string XYZX. Save the file in the C7Prj03 folder as C7Prj03b.doc. Exit Word. Next, you use Hex Workshop to hide information in file slack space:

1. Start Hex Workshop. On a sheet of paper, create a chart with two columns. Label the columns Item and Sector.

2. In Hex Workshop, click Disk, Open Drive from the menu. Make sure the USB or disk drive is selected, and then click OK.

3. Click File, Open from the menu. Navigate to and double-click C7Prj03a.doc. Scroll down until you see "Testing for string Namibia."

4. Click the tab corresponding to your USB or disk drive, and then click at the beginning of the right column. Click Edit, Find from the menu. In the Find dialog box, make sure Text String is selected in the Type list box. Type Namibia in the Value text box, click the Either option button, and then click OK. (If Hex Workshop doesn't find "Namibia" the first time, repeat this step.)

5. In the Item column on your chart, write C7Prj03a.doc. In the Sector column, write the sector number containing the search text, as shown on the Hex Workshop title bar.

6. Scroll to the bottom of the sector, if necessary. Type Murder She Wrote near the end of the sector in the right pane, and then click the Save toolbar button. (Note: If you're asked to enable Insert mode, click OK, press Insert, click to select the Disable notification message check box, and click OK, if necessary.)

7. Click the C7Prj03a.doc tab. Click Edit, Find from the menu, type Murder in the Value text box, and then click OK. Hex Workshop can't find this text in C7Prj03a.doc. Click Edit, Find from the menu, and then click OK to verify that Hex Workshop doesn't find "Murder" in the document. Close the file by clicking the lower Close button in the upper-right corner.

8. Click File, Open from the menu. Navigate to and double-click C7Prj03b.doc. Scroll down, if needed, until you see the "Testing for string XYZX" text you entered earlier. (Hint: You might need to use the Find command more than once to find this text.)

9. Click the tab for your USB or disk drive, if necessary, and then click at the beginning of the right column. Click Edit, Find from the menu, type XYZX as the value you want to find, and then click OK. On your chart, write C7Prj03b.doc as the filename in the Item column, and in the Sector column, note the sector number containing the search text, as shown on the Hex Workshop title bar.

10. In the tab for your USB or disk drive, type I Spy near the end of the sector in the right pane, in the slack space, and then click the Save toolbar button.

11. Verify that "I Spy" doesn't appear as part of the file by clicking the C7Prj03b.doc tab and searching for this string twice.

12. Close the C7Prj03b.doc file, and exit Hex Workshop.

Reference no: EM131397312

Questions Cloud

Calculate the hash value with two different tools : Repeat the steps used to obtain the digital evidence, using the same tool, and recalculate the hash value to verify the results.
Kolmogorov smirnov test will have relatively low power : Verify that both the Wilcoxon-Mann-Whitney test and Cliff's method reject at the 0.05 level. Although the Kolmogorov-Smirnov test rejects with α = 0.05, why might you suspect that the Kolmogorov-Smirnov test will have relatively low power in this ..
Explain what this expression means : Explain what this expression means: (- 2, 3). You should have two answers. How will you know which of your answers is denoted, say, on an exam?
Explain the protection of human subjects and cultural : There are many sources of information available on the web and in journals relating to the nursing discipline. Therefore, it is of pivotal importance to understand the basic tenets of critical appraisal of research for its use in intraprofessional..
Create a c7prj03 folder on the usb or disk drive : In the Item column on your chart, write C7Prj03a.doc. In the Sector column, write the sector number containing the search text, as shown on the Hex Workshop title bar.
What would be the probability that randomly choosing : What would be the probability that randomly choosing 3 states from the top 6 murder states would actually be the top 3 states for murders in the exact correct decreasing order (1. CA, 2. TX, 3. NY)?
Equilibrium quantity and equilibrium price : How do I find the equilibrium quantity and equilibrium price for the commodity whose supply and demand functions are given. Supply: p=100q Demand: p=-q^2+7500
Do you believe the legislation is ethical why or why not : Do you believe the legislation is ethical? Why or why not? Your paper should be a minimum of 1500 words, written in APA format with a title page, abstract, in-text citations and references.
Create a chart outlining each tool’s current capabilities : Create a chart outlining each tool's current capabilities, and write a one- to two-page report on the features you found most beneficial for your lab.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Six types of information you would gather

If a company hired you as a consultant to provide them a general assessment of their IT challenges across the enterprise, what would be six types of information you would gather.

  Discussion focuses on optimization

Discussion focuses on optimization

  Difference between the nvl and nvl2 functions

Why are functions in this chapter referred to as "single-row" functions? What's the difference between the NVL and NVL2 functions?

  Large number of networks

The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available on line.

  Convenience of purchasing air tickets online

Online flight booking system is a popular way for purchasing air tickets. It offers convenience of purchasing air tickets online as well as information on flights availability, prices comparison, seat selection and in-flight dining.

  Determine the tail length for each stream element

Suppose our stream consists of the integers 3, 1, 4, 1, 5, 9, 2, 6, 5. Our hash functions will all be of the form h(x) = ax+ b mod 32 for some a and b. You should treat the result as a 5-bit binary integer.

  How long it will take matthew to ride down the hill

Bicycling Matthew is cycling at a speed of 4 meters per second. When he starts down a hill, the bike accelerates at a rate of 0.4 meter per second squared.

  Separation between design and implementation

Implement the wallet ADT that you defined in Assignment 1 using doubly linked list. A wallet is  we use to keep our money (paper notes). We want to develop an abstract data type called Wallet that can contain collection of Money.

  How the values of a, b and c are accessed in r''s print state

Consider the following C-like program that allows subprograms to nest. Show the sequence of frames, with static links, on the stack when r(16) is executed assuming we start execution (as usual) with a call to main(). Explain how the values of a, b..

  Does this improve locating two non-dc exponential components

Zero pad the signal from (a) to a total length of 500. Does this improve locating the two non-dc exponential components? Is the lower-frequency peak twice as large as the higherfrequency peak? Explain.

  Facebook business model

As explained in "Social Media: Why It Will Change the World," what is the problem with Facebook's business model?

  Differences between accuracy efficiency and robustness

Explain briefly why accumulation of round off errors is inevitable when arithmetic operations are performed in a floating point system. Under which circumstances is it tolerable in numerical computations?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd