User Datagram Protocol (UDP)a nonreliable protocol that implements a best-effort set of rules that allow for network communication where exact delivery of each packet is not critical, such as for streaming video Transmission Control Protocol (TCP)a protocol that implements a core set of rules that allow reliable connection-oriented connections between host computers over a network Sparse data copya copy that an investigator makes of only part of a large set of data in which only the data pertinent to the investigation is included, in order to reduce the overall size of the evidence file this technique is often used when copying data from RAID arrays, when dealing with terabytes or petabytes of information, or when only specific evidence is needed
Ftk imager download mirror windows#
■Select Windows Securityfrom the Utilities (Figure 1-52).įigure 1-52Select Windows Securityfrom the Utilities.Īfter completing this chapter, you should be able to:ĭetermine the best data acquisition methodsĭata acquisitionthe act of taking possession of or obtaining control of data and adding it to a collection of evidenceĭata duplicationthe act of making a copy of data already acquired to preserve the original evidence in pristine condition Browse the image file and message file, and click the Encryptbutton (Figure 1-51).įigure 1-51Browse the image and message files, and click the Encryptbutton. ■Select Steganography 2.8from the Utilities menu. ■Install and launch the FortKnox program.įigure 1-50Explore the various options in FortKnox.
■To embed emb.txt in cvr.jpg, use the following command: steghide embed -cf cvr.jpg -ef emb.txt. ■Open the StegHide program in the command shell (Figure 1-49).įigure 1-49Open the StegHide program in the command shell. Use the StegHide program to hide text in images.■Right-click the hidden datawindow and select Save(Figure 1-48).įigure 1-48Right-click the hidden datawindow and save the file. ■Select a file to be hidden and drag that file inside the window of the WAV file ■Drag a WAV file from Windows Explorer to the Actionswindow (Figure 1-45).įigure 1-45Drag a WAV file to the Actionswindow. ■Install and launch the S-Tools program (Figure 1-44).įigure 1-44Install and launch the S-Tools program. ■Navigate to Chapter 1 of the Student Resource Center. Use the S-Tools program to hide a file inside a WAV file.