Downloads: 115
Research Paper | Information Technology | Malaysia | Volume 2 Issue 6, June 2013
A Study: Volatility Forensic On Hidden Files
Abstract: More and more forensic researchers gain findings by live investigating memory volatility. Forensic research on volatile data is nowadays big area of interest. In the early days, investigators pulled the plug, but now it could be very interesting to capture the volatile data of the system. Memory forensics and data carving are among methods that are usually used during volatile investigation. Before pulled the plug, it is often desirable to capture volatile information that may not be recorded in a file system or image backup, such as processes and the contents of memory. This data may hold clues as to the attackers identity or the attack methods that were used. However, risks are associated with acquiring information from the live system. Any action performed on the host itself will alter the state of the machine to some extent. In paper, an analysis of hidden process on volatility is conducted.
Keywords: RAM, Forensic, Volatility, Hidden Files
Edition: Volume 2 Issue 6, June 2013,
Pages: 71 - 75
Similar Articles with Keyword 'RAM'
Downloads: 0
Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024
Pages: 658 - 660Systematic Selection of Antipsychotics in Schizophrenia: A Binary Search Approach Based on Efficacy and Side Effects
Kunal Dhanda [4] | Sweta Sehrawat [4]
Downloads: 0
Informative Article, Information Technology, India, Volume 10 Issue 11, November 2021
Pages: 1522 - 1525Optimizing Project Fund Tracking: Addressing the Challenges of Inaccurate Hour Reporting in Information Technology Projects
Vaijinath Susuruth Narayana Saker [9]