Computer Forensics of Dcard Application on Windows 10

Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 10

Abstract

Nowadays, with the great popularity of social networking sites, many people have gradually changed their way of living habits. There are varied social networking sites coming out, such as Facebook, Twitter, Instagram, YouTube, Dcard and so on. Furthermore, social networking sites have already made people more convenient to make friends and communicate with each other much easier than before. However, there are some problems we should concern. Thanks to the cyber worlds are flourishing, there are several kinds of crimes emerge in endlessly in recent years.This paper focuses on the computer forensics of Dcard application by running on two different browsers, including Google Chrome and Microsoft Edge. They are running respectively under windows 10 operating systems. In this paper, we strive to search the digital evidence that user has been done on the computer. We make good use of authoritative computer forensic tools to obtain significant evidences and analyze the correlation between these evidences in detail. Besides, this paper finds that which behavior of suspect will leave what kind of evidence in the computer. These findings could be an important reference for law enforcement agency to investigate the computer crime. Keywords:social networking sites, computer forensics, crime investigation, Dcard

Authors and Affiliations

Ching-Yu Lin, Ming-Sang Chang

Keywords

Related Articles

Design and Implementation of A Knowledge-Based Typhoid Fever Diagnosis Expert Advisor Using Forward Chaining Inference Mechanism

Abstract:The medical field is experiencing setbacks, medical cases almost always seems to outnumber the number of medical experts required to attend to them. This in part is due to lack of qualified doctors to handle spe...

A new non-monotone self-adaptive trust region method for unconstrained optimization

In this paper, we consider a novel non-monotone self-adaptive trust region method for solving unconstrained optimization problem. Unlike the usual trust region methods, our proposed the new algorithm does not only uses c...

Computation of Aerodynamic load on Protuberance over Satellite Launch Vehicle at Supersonic Speed

This paper presents numerical simulations to compute the aerodynamic load on protuberance for a typical launch vehicle. Surface pressure coefficients over the satellite launch vehicle are computed by solving axisymmetric...

Utilization of Waste Plastic Materials as Bitumen-Blends for Road Construction in Oman

Studies are reported in the present work to focus on blending of waste plastic materials (in the form of shredded polyethylene bags) being used as a binding agent in asphalt for road construction. This study compared the...

Global Solutions to Damped Fisher Equation by Renormalization Group Method Based on the Classical Theory of Envelope

By the Kunihiro's renormalization group method based on the classical theory of envelope, the global approximate solution to damped Fisher equation is obtained. Keywords: renormalization group; envelope theory; global ap...

Download PDF file
  • EP ID EP386622
  • DOI -
  • Views 144
  • Downloads 0

How To Cite

Ching-Yu Lin, Ming-Sang Chang (2017). Computer Forensics of Dcard Application on Windows 10. Scholars Journal of Engineering and Technology, 5(10), 561-570. https://europub.co.uk/articles/-A-386622