Computer Forensics of Dcard Application on Windows 10
Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 10
Abstract
Nowadays, with the great popularity of social networking sites, many people have gradually changed their way of living habits. There are varied social networking sites coming out, such as Facebook, Twitter, Instagram, YouTube, Dcard and so on. Furthermore, social networking sites have already made people more convenient to make friends and communicate with each other much easier than before. However, there are some problems we should concern. Thanks to the cyber worlds are flourishing, there are several kinds of crimes emerge in endlessly in recent years.This paper focuses on the computer forensics of Dcard application by running on two different browsers, including Google Chrome and Microsoft Edge. They are running respectively under windows 10 operating systems. In this paper, we strive to search the digital evidence that user has been done on the computer. We make good use of authoritative computer forensic tools to obtain significant evidences and analyze the correlation between these evidences in detail. Besides, this paper finds that which behavior of suspect will leave what kind of evidence in the computer. These findings could be an important reference for law enforcement agency to investigate the computer crime. Keywords:social networking sites, computer forensics, crime investigation, Dcard
Authors and Affiliations
Ching-Yu Lin, Ming-Sang Chang
Design and Implementation of A Knowledge-Based Typhoid Fever Diagnosis Expert Advisor Using Forward Chaining Inference Mechanism
Abstract:The medical field is experiencing setbacks, medical cases almost always seems to outnumber the number of medical experts required to attend to them. This in part is due to lack of qualified doctors to handle spe...
A new non-monotone self-adaptive trust region method for unconstrained optimization
In this paper, we consider a novel non-monotone self-adaptive trust region method for solving unconstrained optimization problem. Unlike the usual trust region methods, our proposed the new algorithm does not only uses c...
Computation of Aerodynamic load on Protuberance over Satellite Launch Vehicle at Supersonic Speed
This paper presents numerical simulations to compute the aerodynamic load on protuberance for a typical launch vehicle. Surface pressure coefficients over the satellite launch vehicle are computed by solving axisymmetric...
Utilization of Waste Plastic Materials as Bitumen-Blends for Road Construction in Oman
Studies are reported in the present work to focus on blending of waste plastic materials (in the form of shredded polyethylene bags) being used as a binding agent in asphalt for road construction. This study compared the...
Global Solutions to Damped Fisher Equation by Renormalization Group Method Based on the Classical Theory of Envelope
By the Kunihiro's renormalization group method based on the classical theory of envelope, the global approximate solution to damped Fisher equation is obtained. Keywords: renormalization group; envelope theory; global ap...