The document discusses iPod and iPhone forensics. It provides an overview of iPods, iPhones, and the iPhone OS. It describes how criminals can use iPods and iPhones for illegal activities. The document outlines the forensic process, including proper collection and preservation of iPod/iPhone evidence, imaging the device, and analyzing the system and data partitions to retrieve potential evidence.
This document provides instructions for booting a virtual machine from a forensic image using VirtualBox and FTK Imager. It involves mounting the forensic image using FTK Imager to access it as a physical drive, creating a virtual disk file pointing to the mounted image, and configuring a new virtual machine in VirtualBox to use the virtual disk file. The process allows examining the forensic image content in a virtual machine but may corrupt the original evidence. Issues like startup repair errors can be fixed by deleting the VirtualBox user folder and repeating the procedure.
The document provides information on analyzing Macintosh computers for digital forensics purposes. It discusses the file systems, operating systems, and applications used by Macs and how to acquire disk images and examine key artifacts. Specific topics covered include acquiring memory using Target Disk Mode, disabling disk arbitration, analyzing browser data from Safari, Firefox, Internet Explorer, and AOL, and examining email from applications like Mail, Entourage and AOL. Forensic tools mentioned include dd, dcfldd, Emailchemy, and the Safari Tools browser analyzer.
This document provides an overview of Windows 8 forensics and anti-forensics techniques. It discusses new features in Windows 8 like pagefile and swapfile functions, Windows 8 to Go, Bitlocker updates, cloud integration, thumbnail caching, and PC refresh. It also covers Internet Explorer 10 changes and analyzes the pagefile, swapfile, thumbcache, file history artifacts, and new registry hives introduced in Windows 8. Anti-forensics techniques like encryption, time tampering, disk wiping, and disk destruction are also briefly mentioned. The document promotes an upcoming security conference and provides contact information for the author.
Linux is well-suited for forensic investigations due to its free and open-source tools, flexible environment, and ability to access low-level interfaces. However, its tools are more complicated to use than commercial packages and typically lack technical support. Linux distributions use a directory tree with essential directories like /bin, /etc, /home, and /var. Important commands provide information on processes, network connections, and disk usage. The Linux boot process involves the BIOS, boot loader, kernel initialization, and starting of processes at designated run levels.
The document discusses iPod and iPhone forensics. It provides an overview of iPods, iPhones, and the iPhone OS. It describes how criminals can use iPods and iPhones for illegal activities. The document outlines the forensic process, including proper collection and preservation of iPod/iPhone evidence, imaging the device, and analyzing the system and data partitions to retrieve potential evidence.
This document provides instructions for booting a virtual machine from a forensic image using VirtualBox and FTK Imager. It involves mounting the forensic image using FTK Imager to access it as a physical drive, creating a virtual disk file pointing to the mounted image, and configuring a new virtual machine in VirtualBox to use the virtual disk file. The process allows examining the forensic image content in a virtual machine but may corrupt the original evidence. Issues like startup repair errors can be fixed by deleting the VirtualBox user folder and repeating the procedure.
The document provides information on analyzing Macintosh computers for digital forensics purposes. It discusses the file systems, operating systems, and applications used by Macs and how to acquire disk images and examine key artifacts. Specific topics covered include acquiring memory using Target Disk Mode, disabling disk arbitration, analyzing browser data from Safari, Firefox, Internet Explorer, and AOL, and examining email from applications like Mail, Entourage and AOL. Forensic tools mentioned include dd, dcfldd, Emailchemy, and the Safari Tools browser analyzer.
This document provides an overview of Windows 8 forensics and anti-forensics techniques. It discusses new features in Windows 8 like pagefile and swapfile functions, Windows 8 to Go, Bitlocker updates, cloud integration, thumbnail caching, and PC refresh. It also covers Internet Explorer 10 changes and analyzes the pagefile, swapfile, thumbcache, file history artifacts, and new registry hives introduced in Windows 8. Anti-forensics techniques like encryption, time tampering, disk wiping, and disk destruction are also briefly mentioned. The document promotes an upcoming security conference and provides contact information for the author.
Linux is well-suited for forensic investigations due to its free and open-source tools, flexible environment, and ability to access low-level interfaces. However, its tools are more complicated to use than commercial packages and typically lack technical support. Linux distributions use a directory tree with essential directories like /bin, /etc, /home, and /var. Important commands provide information on processes, network connections, and disk usage. The Linux boot process involves the BIOS, boot loader, kernel initialization, and starting of processes at designated run levels.
Робота присвячена мобільним операційним системам. Розглянуто найбільш поширені мобільні операційні системи. Розглянуто розвиток вільного програмного забезпечення на мобільних пристроях.
Автор: Курдаєв Олег Сергійович.
Робота підготовлена для показу на Міжнародній науково практичній конференції FOSS LVIV 2013.
Робота викладена лише для ознайомлення.
The first .NET meetup by DOU: .NET and peopleAndrew Gubskiy
.NET Meetup in Kiev on February 27th: An offline opportunity to network and deepen .NET knowledge. The event includes talks by industry leaders, with a special presentation on modern .NET technologies.
Робота присвячена мобільним операційним системам. Розглянуто найбільш поширені мобільні операційні системи. Розглянуто розвиток вільного програмного забезпечення на мобільних пристроях.
Автор: Курдаєв Олег Сергійович.
Робота підготовлена для показу на Міжнародній науково практичній конференції FOSS LVIV 2013.
Робота викладена лише для ознайомлення.
The first .NET meetup by DOU: .NET and peopleAndrew Gubskiy
.NET Meetup in Kiev on February 27th: An offline opportunity to network and deepen .NET knowledge. The event includes talks by industry leaders, with a special presentation on modern .NET technologies.
3. Смартфони,
КПК
За цільовим пристроєм
За кількістю програм,
що виконуються
одночасно
За типом інтерфейсу
Основи інформаційних технологій
Багатозадачні
Графічний
інтерфейс
Текстовий
інтерфейс
Однозадачні
Графічний
інтерфейс
Текстовий
інтерфейс
3
6. Програмне забезпечення мобільних операційних систем
•
- створена компанією Google на базі ядра Linux
ПЗ: Google Maps, Google Talk, WhatsApp, Viber, Skype, Play Market
•
- це власницька мобільна операційна система від Apple, iOS є похідною від Mac
OS X
ПЗ: WhatsApp, Viber, Skype, Google Maps, AppStore
- друге покоління операційної системи Windows Phone від Microsoft
ПЗ: WhatsApp, IM+, GooglePlaces, Skype, WindowsPhoneStore
•
Bada - розроблялася консорціумом Symbian, пізніше — компанією Nokia.
ПЗ: WhatsApp, Viber, Skype, Google Maps, Opera mini
•
- мобільна операційна система та платформа виробництва Samsung
Electronics
ПЗ: Facebook, Foursquare, ICQ
•
•
- що працюють на власній базі, була розроблена канадською компанією RIM
ПЗ: Google Maps, Google Talk, WhatsApp, Viber, Skype, ChatON
Основи інформаційних технологій
6