2008
DOI: 10.1016/j.diin.2008.05.017
|View full text |Cite
|
Sign up to set email alerts
|

Limewire examinations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…In the case of Gnutella, finding a matching GUID is considered extremely strong evidence tying the computer to network traffic, as the probability of a randomly generated GUID on this computer d i g i t a l i n v e s t i g a t i o n 7 ( 2 0 1 0 ) S 9 5 eS 1 0 3 matching a specific GUID is 1=2 128 z2:94 Â 10 À39 . Recovering the GUID is a well understood (Lewthwaite and Smith, 2008) process. 4 Additionally, the investigator may look for a shared folder, and compare its contents against the recorded browse results.…”
Section: Evidence Use and Validationmentioning
confidence: 99%
“…In the case of Gnutella, finding a matching GUID is considered extremely strong evidence tying the computer to network traffic, as the probability of a randomly generated GUID on this computer d i g i t a l i n v e s t i g a t i o n 7 ( 2 0 1 0 ) S 9 5 eS 1 0 3 matching a specific GUID is 1=2 128 z2:94 Â 10 À39 . Recovering the GUID is a well understood (Lewthwaite and Smith, 2008) process. 4 Additionally, the investigator may look for a shared folder, and compare its contents against the recorded browse results.…”
Section: Evidence Use and Validationmentioning
confidence: 99%
“…Cybercrimes are the crimes that are done using a phone or a computer. Abhijeet Ramani [5] provided various details and artifacts to help on tracing the illegal access of files from a system using an external USB flash drive and Swasti Bhushan Deb [3] highlights the timestamps and artifacts left by insertion and removal of USB devices in the Windows 8 registry, and to the best of our knowledge, there are no existing papers about artifacts left by the insertion and removal of USB devices in Windows 10 registry.…”
Section: Problem Backgroundmentioning
confidence: 99%
“…A volume slack space can be defined as the unused space between the end of the file system and the end of the partition where the file resides. Faked bad clusters can also be used for data hiding (Lewthwaite & Smith, 2008). The NTFS file system identifies bad clusters ($BadClus) that have defects in it using the MAT (Master File Table).…”
Section: Data Hidingmentioning
confidence: 99%