Computer Forensics & Data Recovery has articles on a wide variety of subjects relating to Computer Forensics - Data Recovery, Computer Crime, Cryptography, Freeware Computer Forensic Toolkit.


Fresh Advice:

The most important part of your PC is your data. In the event of a serious system crash, you can usually restore the operating system and programs that you use, but your personal data may be lost. Although emergency data recovery options are available, these will tend to be costly and there is no guarantee that everything you want can be recovered. A better approach is to start a regular routine of backing up your important data.


Your data should be backed up as often as possible, It isn't necessary to back up your whole hard drive. Identify the folders that hold your important files and only back those folders up to save on storage space. To find out where your files are being stored, use "Save As" instead of just hitting "Save" when you create or update your files, and note the location the program is using to write your data.

What's new?

Compuer Crime & Computer Forensics Essay

Exclamation markComputer crime has become a very large issue in society today; computer criminals cost companies across the world billions of pounds every year. This essay will discuss many of the main cyber crimes and the principles and practises associated with investigating computer crime in general. Computers are ever-present with modern organizations and it is inevitable that illegal activities will involve computers. Threatening letters, fraud, and theft of intellectual property are all crimes that leave digital tracks... (read more)


Is your data encrypted?

Question markThe Caesar Cipher is a very simple cipher. It works by taking a message and incrementing each letter by a given amount. This amount is known as a shift. The advantage of this cipher is that the coded message is unreadable. However, if someone was to guess the shift value then the message would easily be decrypted.
Considering the Caesar Cipher, with shift 6, each letter is replaced by the letter 6 further on in the alphabet. A substitution cipher has a different shift for each letter. The advantage of this cipher is that there are potentially 26! (26 x 25 x 24 ...) possible substitution ciphers. The disadvantage of the substitution cipher is that every letter is encrypted to the same letter, making it easy to pick out patterns in an encrypted message... (read more)


Cryptographic Methods - Posted on 10/1/2008

Computer Crime and Computer Forensics - Posted on 2/1/2008

The Freeware Forenic Toolkit - Posted on 6/12/2007