Latest Entries »

Skype on Wednesday announced the much anticipated launch of its Instant Messaging (IM)on Facebook.

The exciting partnership makes available Skype’s voice and video calling products to more than 750 million active Facebook users. One more exciting thing about the partnership is the possibility to video chat with your friends right from within Facebook.

How to get started?

According to Skype blogpost, to get started connecting face to face using Facebook video calling, one has to just ensure his/her Facebook chat status is set to “online”.

One can initiate a Facebook video call right from the chat box or you can click on your friend’s profile and if they are online, a “Call” button will appear at the top right of their profile page.

Video messages

If a friend or receiver does not answer your video call, you can leave them a video message, the Skype blogpost said adding that such recorded video message will be waiting in the receiver’s Inbox till they check their messages.

courtesy:CIOL Bureau

Scott Forstall has just taken the WWDC 2011 stage and details about the changes and improvements in iOS 5 are flowing thick and fast. Keep one tab in your browser locked to this post as we update it with all the new features, and throw another one open for our liveblog where you’ll get to see and read the very latest as it happens.

We’ve now put together the full list of highlights from the WWDC presentation, which you’ll find after the break. iOS 5 will be made available this fall, with compatibility promised for the iPhone 4 and 3GS, iPad 1 and 2, and iPod touch 3rd and 4th generation.

Firstly, stats. Scott notes that Apple has so far sold 200 million iOS devices, with more than 25 million of those being iPads. There have been 14 billion downloads from the App Store, tallying over $2.5 billion paid out in revenue to app developers. The iTunes Store isn’t doing badly, either, with 15 billion songs sold.

apple_ios_5

APPLE_IOS_5

And the first new feature: an overhaul of notifications. At last! A new Notification Center aggregates all your, well, notifications into one and is accessible by swiping down a menu from the top of the screen. Yes, just like Android. Small X buttons alongside each note allow you to dismiss it, though there’s no “clear all” option for the more decisive among us. Notifications are also making their way onto the lockscreen, where swiping across a text message takes you right into it. A little something like Samsung’s TouchWiz implementation.
Newsstand is a new place to house all your magazine and newspaper subscriptions.
Twitter integration is also coming to iOS 5, with a single sign-in allowing a multitude of apps to make use of your Twitter credentials. That includes the Camera and Photos programs, finally letting you tweet images out directly from your galleries.
Safari Reader is a new browser feature that will strip out distractions and present the text of a webpage with no other excess content. Accessible via a button next to the address bar. Also added to the iOS browser is a Reading List, which does what the name suggests by accumulating a list of pages you want to read later. Accessible on multiple devices. Tabbed browsing is making a debut in v5.0 as well, which is sure to be a boon for iPad

users.
Reminders is another self-descriptive feature. This one’s intelligent enough to remind you to do things based on your location. It’ll sync across devices and with your calendar.
Yay, there’s now a camera button right on your lockscreen! The volume-up button is also doubling up as a physical shutter release key when you’re in the camera app. Pinch-to-zoom is said to be available right in the app, while holding your finger down on a particular area will loc

k down exposure to optimize the shot for its particular lighting. Some new in-device editing options have also been added, including cropping, rotation, red-eye reduction, and a one-click enhance option.
A new split keyboard has also been shown off in iOS 5.
Headline feature: PC Free! No more cables required for syncing. Now we’re talking. Setting up and activating a new iOS device can be done right on the device itself, and syncing will be wireless too — there’ll be no need to tether to a computer anymore. Over-the-air updates are also par

t of the new deal, and in better news still, they’ll contain only the data that’s changed, meaning you won’t have to re-download the entire OS every time Apple opts to make a minor tweak.
Another pretty significant novelty: iMessage. It’s a messaging service exclusively for iOS users (irrespective of which device they’re rocking), which comes with delivery and read receipts, an indicator for when the other party is typing, and the ability to push messages to all your devices. Kinda, sorta like BBM. You’ll be able to send messages, photos, videos, and c

ontacts. Group messaging will also be available. It works over either

WiFi or 3G and looks to be making good use of Apple’s new push notifications.
Perhaps the biggest innovation of all in iOS 5, however, will be the way iCloud affects the use of your mobile device. Hit up our overview post of the company’s new cloud-syncing solution to learn all about it.
iOS 5 will ship in the fall to the following devices: iPhone 3GS and iPhone 4, iPad 1 and 2, and iPod touch 3rd and 4th generation.

INTERNET SOCIETY MEMBERSHIP

Dear READERS,

As a member of the Internet Society, I am supporting an organization that believes the Internet is for everyone. I strongly recommend that you join the Internet Society as well and help shape the future of the Internet. join it and be the member of such reputed society. You can sign up by clicking on this link:

https://porta…l.isoc.org/EBusiness/NewMemberStepOne.aspx?refid=xd1363738hf

Microsoft India today announced the availability of WebMatrix, a free Web development tool designed to help website developers of all skill levels easily create, customize and publish websites to the Internet.

Microsoft has also made available a set of video tutorials, how-to tips and other resources for helping new Web developers get started.

“At Microsoft we believe that the Web is a vital growth engine for any economy and empowering developers is critical to drive this growth. We are constantly investing in tools and technologies aimed at helping developers succeed on the web,” said Moorthy Uppaluri, general manager, Developer Partner Evangelism, Microsoft India.

He added, “WebMatrix is designed to provide a simple yet powerful set of tools that developers of all backgrounds and skill sets need to build, customize and deploy Websites on Windows.”

WebMatrix is available today in nine languages and includes tools to create new websites, using code provided through a variety of available templates or using existing free open source Web applications, such as WordPress, Joomla DotNetNuke and Umbraco.

The ecosystem of nearly 40 open source application partners supporting WebMatrix is essential for development success on the Web.

Designed for ease of use

According to the press release, Microsoft designed WebMatrix for anyone wanting to create a website. For students and new developers, WebMatrix provides a quick way to learn how to build websites and for the professional developer, it’s another option for quick and easy data-driven website development.

Professional developers can also contribute to a directory of code published through NuGet, a free open source package management system, so others can benefit from their expertise.

WebMatrix provides the tools needed to run a website, including the Web server, database and Web frameworks.

Coming week could turn out to be a remarkable one for Google and Chrome OS lovers. According to reports, the Internet search giant is looking forward to launching its netbook, by December 12 or next year.While there is no official comment from the company, attributing to multiple sources, a report on engadget.com states, “Multiple sources have told us that Google will be holding some sort of event on Tuesday, December 7th — we’re not sure if it’ll be a live event, a webcast, or something else entirely — and that the shindig will see the launch of that Google-branded Chrome OS netbook we’ve been hearing about.

whatever announcement comes out of the event, one thing is sure that Google needs to be careful with the new products seeing the criticism and resulting death of first hardware product, Nexus One, smartphone.

The term cloud has been used as a metaphor for the Internet. The cloud has been used in the networks diagram to represent the transport of data across carrier backbones to an endpoint on the other side of the cloud. As the cloud has no borders and is global in nature same way the Internet has made the world a smaller place in which everyone can reach anyone anytime and resources available can be shared among all those who need them at any time and at any place. A cloud is more than a collection of computer resources because a cloud provides a mechanism to manage those resources. So cloud can be thought of as a pool of virtualized computer resources.  A cloud can:

  • Host a variety of different workloads, including batch-style back-end jobs and interactive, user-facing applications .
  • Allow workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or physical machines.
  • Support redundant, self-recovering, highly scalable programming models that allow workloads to recover from many unavoidable hardware/software failures.
  • Monitor resource use in real time to enable rebalancing of allocations when needed.

Cloud Computing is a computing that provides an abstraction between the resources and its structure like where they are stored,in which network are they and where the servers are located thus providing convenient ,on –demand  shared computing resources without much efforts and cost having interaction with the service providers. Cloud computing also describes applications that are extended to be accessible through the Internet.  These cloud applications use large data centers and powerful servers that host Web applications and Web services. Anyone with a suitable Internet connection and a standard  browser can access a cloud application. Cloud computing uses the model of utility computing which means that users will be charged for what services they use and how much rather than being charged for all the services just like the subscription utilities and other public utilities like electricity and telephone, the users are charged for the amount of electricity they consume and the total amount of call time they use.

The cloud computing has two sections front end and back end. Front end is basically the client’s computer and the application that is used to connect to the network to access the cloud resources through cloud computing systems. The common example of one of the cloud computing is the web based mails, the user uses various mail services like Gmail, Yahoo mail for communication and the mails are not stored on client side so client is not to bother about the storage rather they are stored somewhere else on the servers of email providers so the users can access their mails whenever they want. The front end ie interface software required in this case is the web browser. SaaS (Software- a-s a- Service) is a type of cloud computing that delivers applications through a browser to thousands of customers using a multiuser architecture. The focus for SaaS is on the end user as opposed to managed services. For the customer, there are no up-front investment costs in servers or software licensing. For the service provider, with just one product to maintain, costs are relatively low compared to the costs incurred with a conventional hosting model.

cloud computing-layers and architecture

Amazon S3 storage service is the example of SaaS designed to use across the Internet. Amazon S3 provides a simple web services interface that can be used to store and retrieve any amount of data, at any time, from anywhere on the web. It gives any developer access to the same highly scalable, reliable, fast, inexpensive data storage infrastructure that Amazon uses to run its own global network of web sites. The service aims to maximize benefits of scale and to pass those benefits on to developers. SaaS is also commonly used for enterprise resource planning and human resource applications. Another example is Google Apps, which provides online access via a web browser to the most common office and business applications used today, all the while keeping the software and user data stored on Google servers. Google App Engine environment includes the following features

  • Dynamic web serving, with full support for common web technologies.
  • Persistent storage with queries, sorting, and transactions.
  • Automatic scaling and load balancing .
  • APIs for authenticating users and sending email using Google Accounts.
  • A fully featured local development environment that simulates Google App Engine on your computer.

CaaS (Commuincation–as-a-Service)is an outsourced enterprise communications solution. Providers of this type of cloud-based solution (known as CaaS vendors) are responsible for the management of hardware and software required for delivering Voice over IP (VoIP) services, Instant Messaging (IM), and video conferencing capabilities to their customers. This model began its evolutionary process from within the telecommunications (Telco) industry, not unlike how the SaaS model arose from the software delivery services sector. CaaS vendors are responsible for all of the hardware and software management consumed by their user base. CaaS vendors typically offer guaranteed quality of service (QoS) under a service-level agreement (SLA). A CaaS model allows a CaaS providerís business customers to selectivelydeploy communications features and services throughout their company ona pay-as-you-go basis for service(s) used. CaaS is designed on a utility-like pricing model that provides users with comprehensive, flexible, and (usually) simple-to-understand service plans. CaaS service offerings are often bundled and may include integrated access to traditional voice (or VoIP) and data, advanced unified communications functionality such as video calling, web collaboration, chat, real-time presence and unified messaging, a handset, local and long-distance voice services, voice mail, advanced calling features (such as caller ID, three-way and conference calling, etc.)CaaS offers flexibility and scalability that small and medium-sized business might not otherwise be able to afford.

Cloud computing has evolved to include platforms for building and running custom web-based applications, a concept known as Platform-as-a-Service. PaaS is an outgrowth of the SaaS application delivery model. The PaaS model makes all of the facilities required to support the complete life cycle of building and delivering web applications and services entirely available from the Internet, all with no software downloads or installation for developers, IT managers, or end users. PaaS developers are concerned only with web-based development and generally do not care what operating system is used. PaaS services allow users to focus on innovation rather than complex infrastructure. Organizations can redirect a significant portion of their budgets to creating applications that provide real business value instead of worrying about all the infrastructure issues in a roll-your-own delivery model.

Infrastructure-as-a-Service (IaaS) is the delivery of computer infrastructure (typically a platform virtualization environment) as a service. IaaS is centered around a model of service delivery that provisions a predefined, standardized infrastructure speci?cally optimized for the customer’s applications. IaaS providers manage the transition and hosting of selected applications on their infrastructure. Customers maintain ownership and management of their application(s) while off-loading hosting operations and infrastructure management to the IaaS provider. Provider-owned imple-

mentations typically include the following layered components:

  • Computer hardware (typically set up as a grid for massive horizontal scalability)
  • Computer network (including routers, firewalls, load balancing,etc.)
  • Internet connectivity (often on OC 192 backbones )
  • Platform virtualization environment for running client-specified virtual machines
  • Service-level agreements
  • Utility computing billing

Rather than purchasing data center space, servers, software, network equipment, etc., IaaS customers essentially rent those resources as a fully outsourced service. Usually, the service is billed on a monthly basis, just like a utility company bills customers. The customer is charged only for resources consumed.

A lot of IT organization can’t afford to invest in supercomputer-class infrastructure. Yet, the business could benefit from access to some pretty compute-intensive analytic applications. An interesting example of how one of these services might work is WolframAlpha, a query service based on a new model for doing sophisticated searches and calculations. WolframAlpha counts a company called Xignite, a provider of financial information via standard Web services protocols, as one of its partners. User of the WolframAlpha system are able to leverage the Xignite data alongside other data to query the WolframAlpha system about any calculation they can think of.

One of the advantages of cloud computing is that both small and medium sized businesses can instantly obtain the benefits of the enormous infrastructure without having to implement and administer it directly. This also permits accessibility to multiple data centers anywhere on the globe. It also means that as the need for resources increases, companies can add additional service as and when needed from the cloud computing vendor without having to pay for additional hardware.The other benefits are:

A low cost alternative to access technology:

With cloud computing coming into play, technology admission is no more a principal outlay. It more like how you utilize traditional utilities like electricity; pay for what you use and pay till you use it. This in order to enable companies to save their money on important business activities. Moreover it gives small and medium businesses an opportunity to access technology as a resource.

Optimum utilization and dispersion of cost:

While incorporating infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) cloud computing brings economies of costs and resources. Pooling of resources additionally guides to superior performance, load balancing (as the load capacity is centrally managed) and complete use of server capacity. In this way cloud computing results in enhanced resource consumption, which is exceptional from sustainability viewpoint.

Greater independence and remote access:

In cloud computing the infrastructure is maintained by a intermediary provider and accessed by customers by way of internet using web browser. In this way users can access the utility independent of place and infrastructure from a PC, laptop or a handheld device. This has also simplified the idea of offshore software development through the places offering relatively low cost IT outsourcing.

Enhanced monitoring and simplified usage:

On one hand where the model improve security and monitoring within a centralized data access, it simplifies usability by providing self service system interfaces on the other. The user need not be worried about back end engineering and parameters. Besides this, user does not need to install the application on his system, saving him from the trouble of software maintenance, ongoing operation, and support.

Monitoring benefits: central storage is easier to control and monitor. The flipside is the nightmare scenario of comprehensive data theft. However, I would rather spend my time as a security professional figuring out smart ways to protect and monitor access to data stored in one place (with the benefit of situational advantage) than trying to figure out all the places where the company data resides across a myriad of thick clients! You can get the benefits of Thin Clients today but Cloud Storage provides a way to centralise the data faster and potentially cheaper. The logistical challenge today is getting Terabytes of data to the Cloud in the first place.

Microsoft has introduced “The Azure Services Platform”, built from the ground up to be consistent with Microsoft’s commitment to openness and interoperability, promises to transform the way businesses operate and how consumers access their information and experience the Web. Most important, it gives our customers the power of choice to deploy applications in cloud-based Internet services or through on-premises servers, or to combine them in any way that makes the most sense for the needs of their business.
According to Microsoft the Azure Services Platform is an industry-leading move by Microsoft to help developers build the next generation of applications that will span from the cloud to the enterprise datacenter and deliver compelling new experiences across the PC, Web and phone.

The biggest challenges the companies face are secure data storage, high-speed access to the Internet, and standardization. Storing large amounts of data that is oriented around user privacy, identity, and application-specific preferences in centralized locations raises many concerns about data protection. These concerns, in turn, give rise to questions regarding the legal framework that should be implemented for a cloud-oriented environment. Another challenge to the cloud computing model is the fact that broadband

penetration in the United States remains far behind that of many other countries in Europe and Asia. Cloud computing is untenable without high-speed connections (both wired and wireless). Unless broadband speeds are available, cloud computing services cannot be made widely accessible.Finally, technical standards used for implementation of the various computer systems and applications necessary to make cloud computing work have still not been completely defined, publicly reviewed, and ratified by an oversight body. Even the consortiums that are forming need to get past that hurdle at some point, and until that happens, progress on new products will likely move at a snail’s pace.

The reliability of cloud computing has recently been a controversial topic in technology circles. Because of the public availability of a cloud environment, problems that occur in the cloud tend to receive lots of public exposure. Despite claims of reliablity, few cloud vendors have tight SLAs (service level agreements) that promise controlled downtime or offer rebates for excess downtime. Amazon goes the opposite direction and doesn’t offer any uptime guarantees, even cautioning users that their instance (or server) can disappear at any time and that they should plan accordingly. AppLogic-based clouds, provided by companies such as ENKI, are capable of offering better guarantees of uptime because of its inherent self-healing capabilities that can enable 3-4 nines of uptime.

Inorder to solve the various security issues and other challenges of cloud computing various research projects are being taken care of. Amidst the hype surrounding cloud computing, security issues are often raised, such as those involved with multiple customers having their data and applications sharing the same cloud resources. But researchers at the University of Washington also see lots of opportunity in the fact that Web services and applications will be so closely situated. CloudViews is a Hadoop HBase-supported common storage system being developed by the researchers “to facilitate collaboration through protected inter-service data sharing.” Researchers at the Max Planck Institute for Software Systems have outlined a Trusted Cloud Computing Platform that “enables Infrastructure as a Service (IaaS) providers such as Amazon EC2 to provide a closed box execution environment that guarantees confidential execution of guest virtual machines.” Such a platform would assure customers that service providers haven’t been messing with their data and would enable service providers to secure data even across many VMs. University of Maryland, Baltimore County researcher John Krautheim whose  proposal is aimed at better sharing the risk responsibility between the cloud provider and customer, giving the customer much more control than is typically the case. “A method of combining the requirements of the user and provider is to let the clients control the security posture of their applications and virtual machines while letting the service provider control the security of the fabric. This provides a symbiotic security stance that can be very powerful provided both parties hold up their end of the agreement,”. Components of this approach will include having a method for shutting down VMs if necessary and monitoring/auditing from within and outside the PVI(Private Virtual Infrastructure).

Despite of all the challenges, cloud computing is emerging as a solution for many small to large organizations that cannot manage the storage of their data and cannot afford to have costly hardware and software for carrying out their work Like any evolving technology, cloud computing will see its fair share of growing pains. However, its one of those disruptive technologies that come once in a while that can radically change how we build, manage and consume software.

–   Rohit Verma

With technologies changing very fast, it has become an increasingly difficult task to choose a notebook that suits you the best. Read on to find out how to strike the best deal

Are you planning to get a notebook for the first timeor considering to do away with the outdated note-book you already have? Well, as you know it, thereis a slew of notebooks out there to choose from. Here weguide you on how to find out the best one for your need.

The Processor: There is an array of processors you canlook out for depending upon your needs. If you want a note-book for basic home use like Web surfing, then a netbookwith Intel Atom would do. If you want a larger size in dis-play then you can opt for a notebook with Intel Pentium dualCore processor that can be picked up on a modest budget.For users who want to run a lot of programs and gaming,an Intel Core i3/i5 is the best bet. For people who want thebest in performance, then Intel Core i7 is the way to go interms of processor.

 

Memory: One very important aspect to look out for in anotebook is how much memory (RAM) it has and what thegraphic capabilities are. If you are a light user and use fewapplications and software then you should be comfortablewith 2GB of RAM. However, most notebooks now comewith a minimum 3GB RAM if you spend over Rs 35,000.Whereas if you use applications like 3D MAX or playgraphic hungry games then go for a notebook with 4GB ofRAM.

 

Graphics: Graphics have slowly taken up a significantfactor in performance of a notebook. With HD content andgraphic intensive user interfaces, the GPU plays a signifi-cant part in a notebook. If you don’t need image editing orgaming then we suggest a notebook with Intel onboardgraphics.

 

Hard disk: As we step into an era of Blu-Ray disks, ourhard disks requirements keep on increasing. The morehard disk we have the better it will be in the long run. Mostbasic laptops now come with 160GB of drive which is morethan enough for general requirment. However, if space is apriority, then you should look for laptops with at least 320GB of storage space. If performance is what you seek,then we suggest that you go for an SSD based storage as itprovides much better performance than a standard drive.

 

Screen Size: The bigger screen size you have on yournotebook the better it will be to view; besides it will be funto show these gigantic screen sizes off to your neighbors orto your boss in the office. You can choose from a range of 14-inch to 17-inch screen but if you have a small working spaceand like to pack it light then you can think of buying a 10-inch netbook to save on the space.

 

Portability: Notebooks are meant to be portable. If youare a frequent traveler then you would need an extremelylightweight notebook which canbe carried aroundeasily and yet pro-vides good batterylife. There are a vari-ety of netbooks thatweigh from 1kg on-wards depending onthe screen size. In caseyou want a laptop forhome use, then theweight factor is not of im-portance and you can gofor a heavier notebook.These notebooks usually have a larger screen and bettermultimedia capabilities, but suffer from poor battery life.

 

Multimedia: Earlier laptops were meant only for busi-ness use, but now laptops are available that work as a multi-media centre. Laptop with antiglare widescreen displays, inbuilt TV Tuner cards, memory card readers, web camerasand built in mic along with Blu-Ray readers are easily avail-able. Coupled with software such as Power cinema, AudioDJand Power DVD these laptops provide for an enriched mul-timedia experience.

 

Security: Security is one issue that cannot be overlooked-be it a desktop or a laptop. To overcome security issues, lap-tops with integrated fingerprint reader were launched andnow laptops with face recognition are available which makethe laptops extremely secure. To counter other threats suchas viruses and spyware, manufacturer provide antivirus andanti spyware software preinstalled with Windows on note-books. Shock mounted hard drives are installed in the note-books to keep the hardware secure in case notebook falls down.

 

Connectivity and ports:Notebooks incorporate wirelessconnectivity such as Infrared, Bluetooth and Wi-Fi to trans-fer data and access Internet. Almost all laptops now comewith Wi-Fi and Bluetooth integrated. However, when itcomes to ports you need to be careful. Make sure that thenotebook has atleast 2 USB ports and USB is standard portused for data transfer and even charging devices now-a-days.The notebook should have audio in/out jacks, ethernet portas well as a display out port.

 

Price: Budget is one important factor you look out for.This solely depends on the type of work you’re going to doon your notebook: from home usage to watch your favoriteDVDs, to basic office use for working on documents or forpure gaming action. Netbooks start from as low as Rs 18,000,whereas notebooks starts from as low as Rs 26,000 and goup to Rs 1, 50,000 depending upon the screen size, features,etc it has.

 

Brand: Brand is not really a major factor that should beon the top of the list as such. There are various options avail-able from Dell, Lenovo, HP, Compaq, Acer, Asus,MSI,Toshiba, etc across the price range. However, the ba-sic performance offered by each of them is almost the same.What matters is the battery life and how comfortable is thenotebook for you to use. Stick to these two points first andthen look at the brand name.

COMPUTER FORENSICS

The word FORENSICS means “to bring to the court “. Forensic deals with the recovery & analysis of evidence. Hence, computer forensics is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications and storage devices in a way that is admissible as evidence in a court of law.

Computer forensics goal is to do the investigation and find out exactly what happened on the suspect system and who was responsible for it. Generally results of a forensic investigation are used in criminal proceedings.
Computer forensic investigators should look for:-
1. Who are the attackers?
2. What harm they have done to the organizations.
3. How they have done i.e. the methods, tools and techniques they have used for carrying out the attack.
But the main challenges faced by computer forensic investigators is how to find the attacker if he has attacked the suspect system by using anonymous service through proxy server, internet cafes or common use system.
A computer forensic investigator should:-
1. Not use the suspect system because using the suspect system may destroy some/all evidence.
2. Check the HDD, FDD of the suspect system properly for any kind of virus, threats etc.before copying the data on a removable disk for analysis.
3. Look for the DEAD FILES and LIVE FILES on the suspect computer. Live files are those files which can be read by the operating system from the hard disk, dead files are deleted files but are there on the hard disk of the system but cannot be used by operating system.
Various tools can be used for carrying out computer forensic investigation:-
1. ACCESSDATA FORENSIC TOOLKIT (FTK): – It has customized filters that allows investigator to sort through thousands of files to quickly find the evidence you need.
2. ENCASE FORENSIC EDITION: – It provides investigators tools to conduct large-scale & complex investigations with accuracy & efficiency and allows viewing all relevant files including deleted files, and unallocated space.
3. HELIX3: – a live Linux forensic tool, can be used to examine disk safety to see what has been changed i.e. what the attackers have done to the system.
4. FIRE (FORENSIC & INCIDENT RESPONSE ENVIRONMENT): – It is a portable bootable CD-ROM based distribution for forensic analysis, incident response, data recovery, and virus scanning and vulnerability assessment.
Computer forensic can be used effectively for tracking the criminals who attack the computer networks for stealing the important information like secret information of the company, credit card and bank account information. By using the various tools available the evidences can be produced and can be used in law of court.