Computer Forensics & Data Recovery has articles on a wide variety of subjects relating to Computer Forensics - Data Recovery, Computer Crime, Cryptography, Freeware Computer Forensic Toolkit.


Fresh Advice:

The most important part of your PC is your data. In the event of a serious system crash, you can usually restore the operating system and programs that you use, but your personal data may be lost. Although emergency data recovery options are available, these will tend to be costly and there is no guarantee that everything you want can be recovered. A better approach is to start a regular routine of backing up your important data.


Your data should be backed up as often as possible, It isn't necessary to back up your whole hard drive. Identify the folders that hold your important files and only back those folders up to save on storage space. To find out where your files are being stored, use "Save As" instead of just hitting "Save" when you create or update your files, and note the location the program is using to write your data.

Articles & Essays


Computer Crime & Computer Forensics Essay


Computer crime has become a very large issue in society today; computer criminals cost companies across the world billions of pounds every year. This essay will discuss many of the main cyber crimes and the principles and practises associated with investigating computer crime in general. Computers are ever-present with modern organizations and it is inevitable that illegal activities will involve computers. Threatening letters, fraud, and theft of intellectual property are all crimes that leave digital tracks... (read more)

The Venona Project


The Venona Project was a highly secretive assignment given to the best cryptographers the National Security Agency could find. Originally created to intercept Nazi-Soviet peace talks at the end of World War II VENONA was upgraded to complete the objective of deciphering any Soviet messages coming from Moscow into the United States.... (read more)

Cyptographic Methods


The Caesar Cipher is a very simple cipher. It works by taking a message and incrementing each letter by a given amount. This amount is known as a shift. The advantage of this cipher is that the coded message is unreadable. However, if someone was to guess the shift value then the message would easily be decrypted. Considering the Caesar Cipher, with shift 6... (read more)

Bit Torrent Essay


Bit Torrent is a peer-to-peer file distribution protocol. Bram Cohen designed the protocol in April 2001 and implemented it in summer 2002. Bit Torrent was designed to be a simple way of file sharing amongst multiple peers and across unreadable networks. The service works by a Bit Torrent client downloading the desired file(s) via a tracker on the internet. A tracker is a server which assists in the communication between peers using the Bit Torrent protocol... (read more)

Data Recovery from USB Drives


There are two ways of recovering data from a USB drive. In the first method, you could do it yourself by using data recovery software that you can purchase online. In the latter method, you could avail the services of data recovery experts who would perform data recovery on your behalf... (read more)

How to Safely Destroy Data from Old Disks


Whenever a person has to dispose of his financial statements or other sensitive personal information, he makes sure he shreds it before throwing it away. However, when it comes to disposing of his storage devices such as used hard drives or CDs, he does not seem to show the same care in erasing the details contained on them before throwing them away... (read more)


Cryptographic Methods - Posted on 10/1/2008

Computer Crime and Computer Forensics - Posted on 2/1/2008

The Freeware Forenic Toolkit - Posted on 6/12/2007