Study on Live analysis of Windows Physical Memory
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 4
Abstract
Memory forensics and data carving methods are usually used during volatile investigation and is nowadays a big area of interest. Volatile memory dump is used for offline analysis of live data. Live analysis of the running system gives the information of which events are going on. Volatile memory analysis can give the sensitive information such as User Ids, Passwords, Hidden Processes, Root kits, Sockets etc. which are not stored on the physical drive. This Paper represents various approaches and tools used to capture and analyse data from computer memory
Authors and Affiliations
Divyang Rahevar
Paralyzing Bioinformatics Applications Using Conducive Hadoop Cluster
Bioinformatics may be defined as the application of computer science to molecular biology in the form of statistics and analytics. The bioinformatics applications deal with bulk amount of data. Researchers are no...
Efficient and Accurate Target Sensor Tracking in Wireless Sensor Networks
Abstract: In the tracking scheme illustrated, where the sensors are deployed in a triangular fashion in a hexagonal mesh such that the hexagon is divided into a number of equilateral triangles. Where the technique is use...
Sox Compliance: Eleven Essential Controls for Sme
Abstract: Sarbanes-Oxley (SOX) act, was enacted in 2002, in the wake of large accounting scandals ENRON and WORLDCOM .Especially for SMEs (small to mid-sized enterprises) that can benefit from implementing the control ob...
A Review on Face Recognition and Video Databases
Abstract: Each And Every Face Databases Have Its Own Limitations And Description To Test The Performance Of Face Recognition Technique. Even Though, Current Machine Recognition Systems Have Approached To Certain Level Of...
Palm Vein Extraction and Matching For Personal Identification
Abstract : The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords a...