Computer Forensic Investigation on Hard Drive Data Recovery: A Review Study
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Computer Forensics is a science of seeking evidence found in computers and digital storage media. The main challenge before computer forensic investigatorsis to examine digital media with the aim of finding, collecting, preserving, recovering, analyzing and presenting facts about digital information and guaranteeingits accuracy and reliability.It is said that, “Once it is has been deleted it is gone forever!” This statement is not true. Deleted files can actually be recovered if effort to do so is made shortly after deletion. There are several tools and methods by which we can easily recover our data and get our data as it is back. This paper includesthe various methods and tools to recover data from Hard Disk Drive (HDD), how data recovery tools works, in what situation you can lost your data permanently and in what conditions you can recover your data back. You can know about types of damages and techniques by which data can be recovered by this paper. This paper gives a glance of various methods used to recover data from Hard Disk Drive (HDD) and their corresponding forensic approach done by the computer forensic experts in the perspective of recovery.
Authors and Affiliations
Anmol bansal , Aastha Agrawal , Mahipal Singh Sankhla , Dr. Rajeev Kumar
Web Based Solution for Thermal Printing of Bar Code
A barcode is an optical machine-readable representation of data, which shows the relevant data about the material to which it is attached or fixed. With the help of bar code, the information can be assessed automatical...
PIDF Auto Tuning Control System (AVR) In Power System Stability Analysis
Abstract:This work aims to develop a controller based on auto tuning 0f PIDF to simulate an automatic voltage regulator (AVR) in transient stability power system analysis. AVR is an essential part of the synchronous gene...
Comparative Study of Clustering Algorithms Used in CounterTerrorism
Abstract: Data mining can be used to model crime detection problems, detect unusual patterns, terroristactivities and fraudulent behaviour. We will look at k-means clustering with some enhancements to aid in thepro...
An Autonomous Self-Assessment Application to Track theEfficiency of a System in Runtime Environment
Abstract: In this paper we are proposing a system which will intelligently determine the running time of aprocess according to the current processor state and the priority of the process. Moreover, given a pool ofp...
Motion-Based Foreground Image Segmentation
Abstract: A variety of useful applications demonstrate the need for precise motion-based segmentation ofimage data. Video compression techniques rely heavily on accurate and efficient representation of spatiotempor...