Category: uncategorised

  • IT532 | Computer Forensics |Mid-Term – Mid-Term

    Summary:In this mid-term, we will be applying various techniques and tools to analyze digital data and extract hidden information. You will be using an exif extraction tool to extract metadata from an image, using steganography to hide a message in an image, using Wireshark or tcpdump to analyze network data, and finally performing a forensic analysis using a forensic image or a systems analysis using your own system.

    Exif Data Extraction

    1. Download and install an Exif extraction tool (such as or .

    2. Take any image taken by your phone, then run an Exif extraction tool on it to extract the metadata.

    Think critically about the data that was extracted and write a report. What kind of data has your phone been sharing every time you upload a picture to social media, send a picture through a wireless provider’s network? Who put it there and why? What purpose does it serve? Were you unaware or unconcerned? What implications does this have on privacy and security?


    Steganography

    As steganography is often used to conceal information, learning about it can be valuable for digital forensics professionals who need to detect and extract hidden information from digital media. Using an online tool or software such as and , hide a message within a picture and share it on your site. Create a situation where steganography could be of use and share it on your blog/site. Provide your own personal opinion on the offer of underrated skill.

    Network Analysis

    Download and install or tcpd.

    Use Wireshark or TCPDump to capture network traffic on your computer from your own network.
    Analyze the network traffic and write a brief report on what you were able to learn, including:
    The number and types of packets captured (know the types: TCP, UDP, IP, ICMP, & SNMP!)
    Information on the source and destination of the packets
    The type of network protocol used (Know what protocols are, it’s a crucial component in networking).
    Any relevant information or trends you noticed in the network traffic

    Choice of either A or B

    A: Forensic Analysis

    Obtain a forensic image (such as a .img or .dd file).
    Download and install a forensic analysis tool (such as Autopsy or Sleuth Kit).
    Use the forensic analysis tool to analyze the forensic image and write a brief report 1-page report on what you were able to learn, including:

    1. The file system used on the image
    2. A list of the files and directories on the image
    3. Any deleted files or artifacts you were able to recover
    4. Any other relevant information or trends you noticed during your analysis
    5. The learning process
    6. Insights gained. B: Systems Analysis (Alternative)
    Estimated Length 1+ pages

    Objective: To learn how to use the command line to obtain information about your MacOS/Windows PC system and identify potential areas for optimization.

    Instructions:

    1. Open the Terminal/Command application on your MacOS/Windows PC system.
    • On macOS This can be found in the Utilities folder within the Applications folder.
    • On Windows: This can be done by pressing the Windows key + X and selecting “Command Prompt” or by typing “cmd” in the Start menu search bar and selecting the Command Prompt application.

    2. Run the following command to generate a text file that contains information about your system:
    macOS:

    system_profiler > ~/Desktop/system_report.txt

    Windows PC:

    systeminfo > C:UsersYourUsernameDesktopsystem_report.tx

    3 . This will create a text file on your desktop named “system_report.txt”. Open the file and carefully review its contents to identify any areas where your system might be wasting resources, such as:

    • Large files that you no longer need
    • Unused applications that are taking up space on your hard drive
    • Outdated backups or system files that can be safely deleted

    Use the command line to delete any files or applications that you have identified as waste. For example, to delete a file named “large_file.txt”, you would run the following command:

    macOS
    rm ~/large_file.txt

    WindowsPC

    rm ~/large_file.txt

    5. Repeat this process until you have identified and eliminated all waste on your system.

    6. Write a report that summarizes your findings and the steps you took to optimize your MacOS system. The report should include:

    • A description of the steps you took to generate the system report
    • A summary of the results of your analysis, including the total amount of space saved by deleting waste from -your system
    • how it has impacted your understanding of using the command line

    Note: Before deleting any files or applications, make sure you have a backup of your important data, and only delete files or applications that you are certain you no longer need. This assignment is intended to be completed on a personal MacOS system, not on a system that is used for critical or sensitive purposes.

    7. Submit your report as a blog article by submitting it URL.

    Write 5-6 APA format paper with at least 3 peer reviewed resources for all the parts required above with any additional findings, learnings or screenshots if applicable.

  • CS350 Introduction to Database

    Please adhere to the terms and conditions upon acceptance and refrain from using any AI-sourced solutions due to scrutiny by the course instructor. There is also a summary of the material in case you need to know the language we use or any additional information.

  • How do rockets escape Earth’s gravity?

    Rockets escape Earths gravity by generating thrust greater than gravitational pull.

    They burn fuel to push exhaust gases downward (based on actionreaction), which pushes the rocket upward. As speed increases, they reach escape velocity and keep moving into space.

  • Chapter 4 and Coclusion

    I have uploaded chapter 3 now i want chapter 4 to be done + conclusion

    HARVARD STYLE

    3000 words

  • Mathematics Question

    Given H=70cm ,D=24cm,R=D/2=24/2= 12cm

    =T.S.A=2r(R+H)

    =222/712(12+7)

    =538/782

    =61851/7cm

  • Computer Science Question

    Summary:

    Requirements:

    1. Research free, open-source, digital forensics tools. Examples of some of these tools are discussed in this


    2. Create an online article blog that discusses and demonstrates the digital forensics tool. Your blog article should:

    1. Introduce the digital forensic tool;
    2. Provide a step-by-step, “Quick Start Guide” of you [or your team] demonstrating how to use the tool.
    3. In this section of the blog article, be sure to include:
      1. System requirements
      2. Text with hyperlinks to resources such as:
        • the tool’s downloads page
        • resources that you’ve used (similar to how online articles and Wikipedia hyperlink to other resources)
        • downloadable sample files (i.e. you can use Google Drive to link to the image file you used in your demonstration.
      3. Screenshots and images to go along with the step-by-step demonstration.
    4. Conclude the article with an appropriate conclusion.

    3. Present/demonstrate your digital forensic tool to the class at the next class meeting if in person otherwise record and include the video upload (YouTube to the paper submission).

    Examples

    Below are some examples of what I expect assignments to look like:

    1. Examples of solo student work:

    2. Examples of two-student teamwork:


    3. Examples of three-student teamwork:

    Submit the URL to your blog. If working in a team, each person submits the same URL on their own with some description of the work and overall insights about how the work on such a project improved your skills using Digital Forensic Tools

  • Computer Science Question

    Summary:

    For the Week 2 Assignment students must have Kali Linux installed on their laptops. This is in preparation for next week’s assignment where students will work have to use Kali Linux to research, report, and present a digital forensic tool of their choice.

    What to submit:

    Screenshot of list below. Showing that you are able to install and make it work on your device. Place 20 words in the document to allow to be turned in. All I want you to do is download and install VirtualBox and Kali Linux on to your laptops AND start exploring and learning about

    • virtualization
    • Linux operating system
    • digital forensic tools

    Submit your written assignments here. Similarity/Plagiarism Allowable threshold = 24%

  • “Complete Beginner Programming Notes (Easy Explanation)”

    This document provides comprehensive programming notes along with important questions and answers.

    Topics covered:

    – Introduction to Programming

    – Types of Programming Languages

    – Variables and Data Types

    – Control Structures (if-else, loops)

    – Functions and OOP concepts

    Additionally, important Q&A are included to help students with exams and practice.

    This resource is designed for beginners and is easy to understand.