The computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.
计算机取证技术分为静态取证和动态取证两种。
Absrtact: the computer forensic mainly consists of two techniques: the static forensic and dynamic forensic.
摘要:计算机取证技术分为静态取证和动态取证两种。
The paper proposes the model of IDS and computer forensic system. It connects intrusion detection and computer forensic.
文中提出了一种入侵检测取证系统模型,它考虑把入侵检测和计算机取证技术结合在一起。
Therefore the limitation of static computer forensic is overcome, such as non-real-time, non-continuity and non-sufficiency.
从而克服静态取证的缺乏及时性、不连续性和不充分性等缺陷。
Computer Forensics hardware devices are mainly the following: Forensic Drive Duplicator and Computer Forensics Investigation Bin, and so on.
计算机取证的硬件设备主要有:取证硬盘拷贝机和计算机取证勘查箱等。
Their Columbia, Maryland, company, Jones, Dykstra &Associates, supplies computer forensic, e-discovery and litigation support and computer security training services.
他们的公司Jones,Dykstra &Associates位于马里兰州哥伦比亚市,提供电脑诊断、数据恢复、诉讼支持和电脑安全培训服务。
Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.
取证工具包3是目前最先进的计算机取证的软件,提供的功能,能与数千美元买的设备使用。
Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.
计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。
And Mary Manhein, director of the Forensic Anthropology and Computer Enhancement Services Laboratory at Louisiana State University, and a professional in residence in the Department of Anthropology.
另一位是玛丽-曼海因,路易斯安那州立大学,法医人类学和计算机增强服务实验室的主任,人类学系的常驻专家。
A computer system for geolocating photos could be useful in finding family photos from a specific trip and in some forensic applications.
在从一堆旅行照片中找出家人的照片或者在一些法院审理过程中,一个确定照片拍摄地的电脑系统会非常有用。
Despite China's progress, it lags in guidance and control, turbine engines, machine tools, diagnostic and forensic equipment and computer-aided design and manufacturing.
尽管中国取得了长足的进步,但在引导与控制系统、涡轮发动机、机床、医疗诊断与司法鉴定设备和计算机辅助设计与制造等方面还很落后。
As an example, IDS monitors and records significant events on a specific computer or from the network examining data and providing an "after the fact" forensic ability to identify suspect activity.
比如说,IDS监视并记录某一特定计算机或来自具有调查数据并能提供识别可疑活动“犯罪之后”的侦破能力的网络上的重要事件。
In the U. s., electronic evidence has become a kind of important evidence in lawsuits, and the function of forensic computer science is becoming increasingly obvious.
在美国,电子证据已成为重要的诉讼证据,法庭计算机科学的作用日益凸显。
Temporary data would clear away when computer was shut down, and the encrypted hardware would add difficulties to forensic personnel.
由于现阶段的计算机取证,大部分是将嫌疑硬盘取下带回实验室,由法政人员进行全盘拷贝。
Redesigned and re-implemented the Log Analysis subsystem of Computer Log Forensic system.
重新设计并实现了计算机日志勘察取证系统日志分析平台。
The paper describes the basic equipment, application software, data acquisition and image output of Computer Crime Digital Imaging System. The forensic application of this system was summarized.
本文详细阐述图像处理系统的概况,包括图像处理应用软件、系统的图像采集和图像处理系统处理后的图像输出,并介绍了其在刑侦领域内的应用。
The paper describes the basic equipment, application software, data acquisition and image output of Computer Crime Digital Imaging System. The forensic application of this system was summarized.
本文详细阐述图像处理系统的概况,包括图像处理应用软件、系统的图像采集和图像处理系统处理后的图像输出,并介绍了其在刑侦领域内的应用。
应用推荐