Computer Forensics & Data Recovery has articles on a wide variety of subjects relating to Computer Forensics - Data Recovery, Computer Crime, Cryptography, Freeware Computer Forensic Toolkit.


Fresh Advice:

The most important part of your PC is your data. In the event of a serious system crash, you can usually restore the operating system and programs that you use, but your personal data may be lost. Although emergency data recovery options are available, these will tend to be costly and there is no guarantee that everything you want can be recovered. A better approach is to start a regular routine of backing up your important data.


Your data should be backed up as often as possible, It isn't necessary to back up your whole hard drive. Identify the folders that hold your important files and only back those folders up to save on storage space. To find out where your files are being stored, use "Save As" instead of just hitting "Save" when you create or update your files, and note the location the program is using to write your data.



Cryptography is the practise and study of encryption and decryption - encoding data so that it can only be decoded by specific individuals.  A system for encrypting and decrypting data is a cryptosystem.  These usually involve an algorithm for combining the original data "plaintext" with one or more "keys" - numbers or strings of characters known only to the sender and/or recipient.  The resulting output is known as "ciphertext".

The security of a cryptosystem usually depends on the secrecy of some of the keys rather than with the supposed secrecy of the algorithm.  A strong cryptosystem has a large range of possible keys so that it is not possible to just try all possible keys a "brute force" approach.  A strong cryptosystem will produce ciphertext which appears random to all standard statistical tests.  A strong cryptosystem will resist all known previous methods for breaking codes "cryptanalysis".


Cryptographic Methods


The Caesar Cipher is a very simple cipher. It works by taking a message and incrementing each letter by a given amount. This amount is known as a shift. The advantage of this cipher is that the coded message is unreadable. However, if someone was to guess the shift value then the message would easily be decrypted. Considering the Caesar Cipher, with shift 6... (read more)

Secret Vs Public Keys


Secret key cryptography and public key cryptography are the two major cryptographic architectures. Secret keys are only known by the sender and reciever of a message, whereas a public key can be know by anyone. This article discussed the benefits of both.... (read more)


Cryptographic Methods - Posted on 10/1/2008

Computer Crime and Computer Forensics - Posted on 2/1/2008

The Freeware Forenic Toolkit - Posted on 6/12/2007