Computer Forensics emerged in the 1960s.
计算机取证诞生于上世纪60年代。
Study on Relevant Law and Technology Issues about Computer Forensics;
在大型计算机上采用了若干存取方法。
Computer Forensics System includes two sections: evidence search and evidence analysis.
计算机取证系统包括证据搜索和证据分析两部分。
Imagine being able to easily acquire the skills of a seasoned computer forensics expert from a bootable Linux CD.
设想一下,我们可以通过一张可引导的Linux CD直接学到经验丰富的计算机取证专家的技能。
Collecting evidence from compromised systems is the job of computer forensics experts, the Sherlock Holmes of the digital age.
从遭遇安全威胁的系统中搜集证据是计算机“取证”专家(数字时代的福尔摩斯)的工作。
The basic knowledge and application features about computer forensics and LZW lossless compression algorithm are introduced.
介绍了计算机取证和LZW无损压缩算法的基本概念和应用特点。
An integrity scheme based on computer forensics and DSA signature is proposed to testify to the integrity of computer evidence.
该文在计算机取证的基础上,运用DS A签名机制,提出了一种证明计算机证据完整性的一致性方案。
In fact, with thousands of investigations under our belt, we cover the entire spectrum of computer forensics and digital crime.
事实上,通过在我们的地带进行上千次的调查研究,我们已经掌握了所有电脑取证和数字犯罪的特征。
Therefore, how to study the information on the storage medium access and analysis of computer forensics becomes an important issue.
因而研讨如何对存储介质上的信息停止获取和剖析成为计算机取证学的重要议题。
Collecting and securing evidence is the core content of the computer forensics technology, and it is the research hot spot currently.
电子证据的获取是计算机取证技术中的核心内容,是计算机取证研究的的热点。
Computer Forensics is a technology to provide thorough effective and safety evidence about how to investigate computer-related crime.
计算机取证是一种如何为调查计算机犯罪提供彻底有效、安全的证据的技术。
Based on this knowledge, the search time cost problem of computer forensics is discussed, and a solution to reduce time cost is offered.
在此基础上,详细分析了计算机取证技术的搜索时间成本问题,并提出了一种降低时间成本的解决方案。
Computer Forensics hardware devices are mainly the following: Forensic Drive Duplicator and Computer Forensics Investigation Bin, and so on.
计算机取证的硬件设备主要有:取证硬盘拷贝机和计算机取证勘查箱等。
But the biggest problem, says Ross Anderson, also of Cambridge university, is that police computer forensics departments are chronically under-resourced.
同样来自剑桥大学的RossAnderson表示,最大的问题是警方的计算机取证部门长期缺乏资源。
First, the paper introduced the research statuses of computer forensics and movable devices, and then gave the purpose and significance of the subject.
本文开篇对计算机取证、移动存储技术的研究现状进行介绍,给出本课题的研究目的和意义。
Sean Morrissey, a security expert, said on Thursday that the tracking on Apple devices isn't new, or a surprise, to those in the computer forensics community.
安全专家Sean Morrissey周四说,苹果追踪器设备对那些计算机取证团体而言,不是新的设备,或者一个惊奇。
The research results of this thesis for further study search and analysis of computer evidence, perfect computer forensics system have guiding significance.
本文的研究成果对进一步研究计算机证据的搜索和分析、完善取证系统具有一定的指导意义。
Combining the computer forensics to the intrusion defense system, this system is not only a technology, it can do a lot for the law to strike to the hackers.
对计算机取证技术进行了研究,并与黑客防范体系结合,使黑客防范体系从技术上辅助法律在实际中担当起打击黑客行为的重要责任。
The experiment shows that it is able to insure the authenticity, integrality and validity of the digital evidence, and it is a new method for dynamic computer forensics.
实验表明,它能够保证数字证据的真实性,完整性和有效性,这是一个新的动态计算机取证的方法。
When I say computer forensics, I'm referring to your own investigation using bootable media -not necessarily to forensics needed as evidence in a court case or to obtain a subpoena.
对于法庭判案所需的证据或是为了获得一个传票,这种计算机调查取证并不是必须的。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
Then the printing data can be acquired efficiently. The testing results prove that this system has a good performance and is useful in information protection and computer forensics.
性能测试显示,该系统能快速有效地获取打印内容,适用于信息保护、电子取证等环境,具有较高的实用价值。
Derived there from, the research of computer forensics as a computer science and law of a cross-disciplinary research — computer forensics research is becoming the focus of research.
由此衍生出的计算机取证学作为计算机科学和法学的一门交叉学科——计算机取证学正成为人们研究与关注的焦点。
Computer forensics are now attracted by researchers and developers abroad, but studied little in our nation, and the products of computer forensics are primarily those based on host.
计算机取证目前在国外正逐步成为研究与开发的热点,但在国内仅有少量研究文章。
In view of computer Forensics involved in the knowledge of computer science, law and criminal investigation, the author started this article from technical, procedural and legal point.
鉴于计算机取证涉及计算机科学、法学、刑事侦查学等学科知识,笔者在撰写本文时从技术、程序和法律角度出发。
Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.
取证工具包3是目前最先进的计算机取证的软件,提供的功能,能与数千美元买的设备使用。
The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.
美国等西方发达国家于上世纪80年代就已着手开始研究计算机取证,在取证思想、理论、技术、方法等方面现已取得不少成果。
The United States and other developed Western countries began to study Computer Forensics in the 1980s and achieved many results in evidence-collecting ideology, theory, technique and method.
美国等西方发达国家于上世纪80年代就已着手开始研究计算机取证,在取证思想、理论、技术、方法等方面现已取得不少成果。
应用推荐