Robin Verma News Archive
Summary: Digital forensic investigation requires the investigator to examine the forensic image of the seized storage media or device. The investigator gets full access to all the data contained in the forensic image including the suspect’s private or sensitive data that may be entirely unrelated to the given case. The unrestricted access to the forensic
Summary: The search providers track the user’s browsing behavior to construct his or her activity profile. The tracking helps the search engines to fine-tune the results and presenting user-specific advertising. When a search input matches with some commercial product or service offering, ads based on the previously saved interests, likes, and dislikes are displayed. The
Summary: Digital forensic investigators can take advantage of tools and techniques that have the capability of finding similar files out of thousands of files up for investigation in a particular case. Finding similar files could significantly reduce the volume of data that needs to be investigated. Sdhash is a well-known fuzzy hashing scheme used for
Summary: Apple iOS is one of the most popular smartphone operating systems, but it restricts the installation of apps that are not from the Apple App Store. As a result, users often jailbreak their iPhones to defeat this restriction. Jailbroken iPhones are making their way into enterprises that have a Bring Your Own Device (BYOD)
Summary: Microsoft Windows 8 introduced lightweight sandboxed applications called “apps” that provide a full range of functionality on top of touch enabled displays. Apps offer a wide range of functionality, including media editing, file sharing, Internet surfing, cloud service usage, online social media activities and audio/video streaming for the Windows 8 and 8.1 operating systems.
Summary: Present-day smartphones act as mobile offices, entertainment hubs, and social tools, all packed into one compact device. A smartphone’s processing and data storage capability are comparable to a typical personal computer or laptop of the last decade. Important information commonly found in most smart phones include call logs, contacts lists, text messages, emails, photos,
Summary: Counterfeit currency varies from a low-quality color scanner/printer-based notes to high-quality counterfeits whose production is sponsored by hostile states. Due to their harmful effect on the economy, detecting counterfeit currency notes is a task of national importance. However, automated approaches for counterfeit currency detection are practical only for low-quality counterfeits; manual examination is required