D-E


dd
Copy and convert utility. Originally included with most versions of Unix and Linux, versions now exist for Windows as well.
decrypt
Translate an encrypted message back into the original unencrypted message.
desktop
A PC designed to be set up in a permanent location because the components are too large to easily transport.
dictionary attack
An attack that tries different passwords defined in a list, or database, of password candidates.
direct examination
Initial questions asked to a witness to extract testimony.
disaster recovery
The ability of a company to recover from an occurrence inflicting widespread destruction and distress.
disk imaging
A process used to copy an entire hard drive into a single file by copying the drive's sectors and bytes to a variety of media types.
distributed denial of service (DDoS) attack
An attack that uses one or more systems to flood another system with so much traffic the targeted system is unable to respond to legitimate requests .
deoxyribonucleic acid (DNA)
A code used within cells of living organisms. Its uniqueness is useful in investigations to link individuals with substances found in specific locations.
documentary evidence
Written evidence, such as printed reports or data in log files. Such evidence cannot stand on its own and must be authenticated.
dual-boot system
A system that has the ability to boot, or start, and run more than one operating system.
electromagnetic fields
Produced by the local build-up of electric charges in the atmosphere and can be damaging to computer components. They are present everywhere in our environment but are invisible to the human eye.
electronic discovery
The process whereby electronic documents are collected, prepared, reviewed, and distributed in association with legal and government proceedings .
electrostatic discharge (ESD)
Buildup of electrical charge on one surface that is suddenly transferred to another surface when it is touched.
e-mail header
Data contained at the beginning of an electronic message that contains information about the message.
encrypt
Obscure a message to make it unreadable.
expert witness
A person called to testify in a court of law who possesses special knowledge or skill in a specific area that applies to a case.
Extended Binary Coded Decimal Interchange Code (EBCDIC)
A character encoding set used by IBM mainframes. Most computer systems uses a variant of ASCII, but IBM mainframes and midrange systems such as the AS/400 use this character set primarily designed for ease of use on punched cards.
extension checker
A utility that compares a file's extension to its header. If the two do not match, the discrepancy is reported .



Computer Forensics JumpStart
Computer Forensics JumpStart
ISBN: 0470931663
EAN: 2147483647
Year: 2004
Pages: 153

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net