搜索资源列表
jsjfqz
- 摘要:在计算机取证日益受到人们重视和关注的今天,人们对反取证技术的研究相对较少。本文主要介绍目前常 见的反取证技术和工具,并给出几个实现反取讧的具体实例。 关键词:计算机取证计算机反取证计算机安全计算机犯罪-Abstract : Computer Forensics increasing people's awareness of and concern today, People on the anti-Forensi
毕业论文_Windows下取证研究
- 论文从计算机取证角度出发,详细研究操作系统内核、入侵与反入侵策略、网络监测技术、系统分析技术等。用软件工程的方法,设计实现适合于Windows NT/2000/XP操作系统下的计算机取证软件-papers from the perspective of Computer Forensics, a detailed study operating system kernel, the invasion and the anti-invas
计算机取证概述
- 计算机取证概述-Overview of computer forensics
FU_Rootkit
- hide processes, elevate process privileges, fake out the Windows Event Viewer so that forensics is impossible, and even hide device drivers (NEW!) All this without any hooking.
dzqz
- 摘要 电子证据即为电子数据证据,通常指在计算机或计算机系统运行过程中产生的以其记录 内容来证明案件事实的电磁记录物。电子证据取证包括证据获取、证据分析和证据报告三个过 程。同时,电子证据作为诉讼证据必须具备客观性、关联性、合法性的特征。当前,以数字化形 式出现的电子证据对传统的证据形式提出了挑战。 关键词 电子证据;取证技术;分析探讨-summary of electronic evidence, namely, ele
anquan_mg
- 网络安全--取证与蜜罐(计算机取证技术部分).pdf-network security-- with the evidence Honeypot (Computer Forensics). Pdf
jsjfqz
- 摘要:在计算机取证日益受到人们重视和关注的今天,人们对反取证技术的研究相对较少。本文主要介绍目前常 见的反取证技术和工具,并给出几个实现反取讧的具体实例。 关键词:计算机取证计算机反取证计算机安全计算机犯罪-Abstract : Computer Forensics increasing people's awareness of and concern today, People on the anti-Forensi
03
- 关于 电子取证技术的三大方向 的电子文档-On e-Forensics three major directions of electronic documents
04
- 关于 计算机取证关键技术分析 的电子文档-Computer Forensics on the key technical analysis of electronic documents
05
- 一篇关于 计算机取证技术综述 的电子文档-An article on computer forensics technology for electronic documents
LogViewer
- 计算机取证系统,即利用WINDOWS的API,从系统中获取应用程序、安全和系统日志等信息,然后在表格中显示出来,利用了MFC的树型和列表控件-Computer forensics system, namely the use of WINDOWS-API, from the system access to applications, security and system log information, and then displ
winxpinvestigatetool
- 计算机取证工具源代码,用来取证当前系统的信息,包括注册表之类的。-Computer forensics tool for source code, used to evidence the current system, including registry like.
research_and_design_of_protocol_analysis_based_nid
- 论文,《基于协议分析的网络入侵取证系统的研究与设计》-Papers, based on protocol analysis of Network Intrusion Forensics System Research and Design
computerforensics
- 计算机取证方法关键问题研究 计算机取证方法关键问题研究-Key issues of computer forensics methods research key issues of computer forensics research methods
wangluoquzhengjishuyanjiu
- 网络取证技术研究,通过对其相关技术研究为广大研究者提供参考资料。-Network Forensics, through its relevant technical studies to provide reference materials for the general researcher.
wangluoquzhengfenbushiguanli
- 网络取证日志分布式安全管理,为从事网络犯罪取证方面研究的读者提供参考。-Log Distributed Network Forensics Security Management, in order to engage in cyber-crime research evidence to provide reference readers.
wangluoquzhengyufenxixitongfenxi
- 本文档关于网络取证与分析系统的设计与实现,通过介绍说明其功能实现。-This document on Network Forensics and Analysis System Design and Implementation, through the presentation of its functions.
wangluoquzhengzhongdewenti
- 网络取证中的若干问题研究,关于网络犯罪取证问题的研究。-Network Forensics Research in a number of issues, evidence on the issue of cyber-crime research.
fw
- 算机取证界的权威软件X-Ways forensics的中文使用帮助,在网上很难找到的,chm格式-Computer forensics software, an authority on X-Ways forensics Chinese use the help of the Internet is very difficult to find, chm format- forensics software, an authority
ssdeep-2.2
- 计算机文本进行hash计算,来判断文件间的相似性,用于计算机取证方向-Computer text hash calculation to determine the similarity between documents, for the direction of computer forensics