scholarly journals Computer Forensic Using Photorec for Secure Data Recovery Between Storage Media: a Proof of Concept

2021 ◽  
Vol 2 (4) ◽  
pp. 1189-1196
Author(s):  
I Putu Agus Eka Pratama

Data plays the important role, so that data recovery and data security be prioritized. Computer users often lose their data due to personal errors or by attacks. Digital forensics has one sub-field called computer forensic, which has an important role in the process of secure data recovery. USB Flashdisk as the most widely used storage media has a probability of data loss. It is necessary to do computer forensic actions, especially secure data recovery, on it so that it can restore data securely to other media while protecting it by giving privilege root. In this research, computer forensic testing the 2781 files of various data formats that were erased on a 32 GB USB flash drive using Photorec. The media for collecting data recovery results using an Intel computer, 2 GB RAM, 1.8 GHz processor, the Linux operating system Xubuntu 20.04. Testing is carried out following the test scenarios that have been designed, then observed, recorded, and analyzed. Photorec places recovery data in 6 recup_dir subdirectories. Test results and analysis of the test results show that Photorec is a reliable tool for computer forensic, especially secure data recovery because it can restore 100% of data, accompanied by privilege root for all data recovery results, so they cannot be changed and deleted by an end-user without granted access.

Author(s):  
Mohammad-Reza Ashory ◽  
Farhad Talebi ◽  
Heydar R Ghadikolaei ◽  
Morad Karimpour

This study investigated the vibrational behaviour of a rotating two-blade propeller at different rotational speeds by using self-tracking laser Doppler vibrometry. Given that a self-tracking method necessitates the accurate adjustment of test setups to reduce measurement errors, a test table with sufficient rigidity was designed and built to enable the adjustment and repair of test components. The results of the self-tracking test on the rotating propeller indicated an increase in natural frequency and a decrease in the amplitude of normalized mode shapes as rotational speed increases. To assess the test results, a numerical model created in ABAQUS was used. The model parameters were tuned in such a way that the natural frequency and associated mode shapes were in good agreement with those derived using a hammer test on a stationary propeller. The mode shapes obtained from the hammer test and the numerical (ABAQUS) modelling were compared using the modal assurance criterion. The examination indicated a strong resemblance between the hammer test results and the numerical findings. Hence, the model can be employed to determine the other mechanical properties of two-blade propellers in test scenarios.


2021 ◽  
Vol 6 (2) ◽  
pp. 93-104
Author(s):  
Aisyah Amini ◽  
Riri Okra

ALKI is an e-module that serves as a learning medium for grade X students majoring in MIA at SMAN 1 MAPAT TUNGGUL. E-module ALKI was created with the aim of assisting teachers in delivering materials and helping students understand more about chemical materials by repeating lessons, working on exercises, and strengthening memory by playing flashcards. The thing behind the design of alki e-module is the lack of motivation to learn students, difficulty and the absence of internet network in Mapat Tunggul area, students should not take home the package book, the smartphone owned by students is not used to study, and when doing homework with the help of the internet most students just copy the answer without understanding the origin of the answer. This research method is Research and Development (R&D) with a 4-D research model (four-D) that is with define, Design, Development, and Disseminate stages. In the Development stage, the development stage of ALKI e-module media is carried out. The media development model used in this study is MDLC(Multimedia Development Life Cycle) luther-sutopo version which consists of 6 stages, namely conception, design, material collection, manufacturing process, testing and distribution. The result of the research is a mobile-based ALKI e-module product. With 0.81 validity test results declared valid,0.93 Practicality test results are practiced very practically,and 0.80 effectiveness test results are declared very effective. So, it can be concluded that alki e-module based on mobile application as a learning medium has been valid, practical and effective.


2010 ◽  
Vol 14 (3) ◽  
pp. 747-758 ◽  
Author(s):  
Aleksandra Krkoleva ◽  
Verica Taseska ◽  
Natasa Markovska ◽  
Rubin Taleski ◽  
Vesna Borozan

The paper presents the pilot Microgrid in Macedonia, developed within the framework of the MOREMICROGRIDS (EU EP6 projecet, contract No. SES6-019864) project. This Microgrid is the first of its kind being developed in the Western Balkan region and serves as pilot site for introduction and examination of the Microgrids concept in non European Union conditions. The test network consists of a part of the low voltage grid, located on a pig farm. The main electricity source for the Microgrid is a small biogas plant, which uses the biogas produced by a waste water treatment process. The paper addresses the Microgrid design, development of test scenarios and test results from the pilot location.


Author(s):  
T. P. Kersten ◽  
H.-J. Przybilla ◽  
M. Lindstaedt ◽  
F. Tschirschwitz ◽  
M. Misgaiski-Hass

An increasing number of hand-held scanning systems by different manufacturers are becoming available on the market. However, their geometrical performance is little-known to many users. Therefore the Laboratory for Photogrammetry & Laser Scanning of the HafenCity University Hamburg has carried out geometrical accuracy tests with the following systems in co-operation with the Bochum University of Applied Sciences (Laboratory for Photogrammetry) as well as the Humboldt University in Berlin (Institute for Computer Science): DOTProduct DPI-7, Artec Spider, Mantis Vision F5 SR, Kinect v1 + v2, Structure Sensor and Google’s Project Tango. In the framework of these comparative investigations geometrically stable reference bodies were used. The appropriate reference data were acquired by measurement with two structured light projection systems (AICON smartSCAN and GOM ATOS I 2M). The comprehensive test results of the different test scenarios are presented and critically discussed in this contribution.


2020 ◽  
Vol 1 (2) ◽  
pp. 93-104
Author(s):  
Shabila Fitri Aulia ◽  
Siti Sauda

Technological advances have developed rapidly nowadays. These technological advances are also in line with the development of ways of communicating both orally and in writing. In terms of writing, maintaining aspects of data security and confidentiality is very important. Many technologies can be used to secure data such as cryptography and steganography. This research will use the First of File and End of File Steganography Algorithms to secure data. Steganography is the science of hiding messages or data in the media. The First of File and End of File methods are one of the many methods commonly used in the Steganography Algorithm. Generally, the First of File and End of File methods are not much different. The First of File method inserts a message at the beginning of the file, while End Of File inserts a message at the end of the file. This technology can also be applied again for the years to come. This research produces an overview after a review study of the application of the FOF and EOF steganographic algorithms, the speed of steganography and the differences in the image after steganography in terms of image size and pixel. Kemajuan teknologi sudah sangat berkembang dengan pesat pada era sekarang. Kemajuan teknologi ini juga seiring dengan berkembangnya cara berkomunikasi baik secara lisan maupun tulisan. Dalam hal tulisan, menjaga aspek keamanan dan kerahasiaan data sangatlah penting. Banyak teknologi yang bisa dipakai untuk mengamankan data seperti kriptografi dan steganografi. Penelitian ini akan menggunakan Algoritma Steganografi First Of File dan End Of File untuk mengamankan data. Steganografi merupakan ilmu menyembunyikan pesan atau data ke dalam media. Metode First Of File dan End Of File merupakan salah satu dari banyaknya metode yang biasa digunakan pada Algoritma Steganografi.Umumnya,metodeFirst Of File dan End Of File tidak jauh berbeda. Metode First Of File akan menyisipkan pesan diawal file sedangkan End Of File akan menyisipkan pesan di akhir file. Teknologi ini juga dapat diaplikasikan kembali untuk tahun-tahun kedepannya. Penelitian ini menghasilkan gambaran setalah studi review penerapan algoritma steganografi FOF dan EOF , kecepatan steganografi dan juga perbedaan gambar setelah di steganografi dalam hal ukuran dan pixel gambar.


2019 ◽  
Vol 4 (2) ◽  
Author(s):  
Rozali Toyib ◽  
Ardi Wijaya

Abstack: Data stored in storage media is often lost or opened by certain parties who are not responsible, so that it is very detrimental to the owner of the data, it is necessary to secure data so that the data can be locked so that it cannot be opened by irresponsible parties. The RC5 and RC6 algorithms are digestive massage algorithms or sometimes also known as the hash function which is an algorithm whose input is a message whose length is not certain, and produces an output message digest from its input message with exactly 128 bits in length. RC6 password is a protection for the user in securing data on a PC or computer. Based on the results of the conclusions taken: For the experiments carried out on the RC5 algorithm the execution time for the generation of keys (set-up key) is very fast, which is about 9-10 ns, a trial carried out on the RC6 algorithm execution time for the key generator (set up key ) faster than 10-11 ns. In the encryption and decryption process, the execution time depends on the size or size of the plaintext file. The larger the size of the plaintext file, the longer the execution time.Abstrak : Data yang tersimpan dalam media penyimpanan sering hilang atau dibuka oleh pihak-pihak tertentu yang tidak bertanggung jawab, sehinga merugikan sekali bagi pemilik data tersebut, untuk itu diperlukan suatu pengamanan data agar data tersebut dapat terkunci sehingga tidak dapat dibuka oleh pihak yang tidak bertanggung jawab.. Algoritma RC5 dan RC6 merupakan algoritma massage digest atau kadang juga dikenal dengan hash function yaitu suatu algoritma yang inputnya berupa sebuah pesan yang panjangnya tidak tertentu, dan menghasilkan keluaran sebuah message digest dari pesan inputnya dengan panjang tepat 128 bit. Password RC6 merupakan salah satu perlindungan kepada user dalam pengamanan data yang berada dalam sebuah Pc atau computer. Berdasarkan hasil pengujian diambil kesimpulan : Untuk uji coba yang dilakukan pada algoritma RC5 waktu eksekusi untuk pembangkitan kunci  (set up key) sangat cepat sekali yaitu sekitar  9-10 ns, uji coba yang dilakukan pada algoritma RC6 waktu eksekusi untuk pembangkit kunci (set up key) lebih cepat sekali yaitu 10-11 ns, Pada proses enkripsi dan dekripsi, waktu eksekusi tergantung dari besar atau kecilnya ukuran file plaintext.s emakin besar ukuran file plaintext maka semakin lama waktu eksekusinya.


Author(s):  
Rubén A. Mendoza ◽  
T. Ravichandran

XML-based vertical standards are an emerging compatibility standard for describing business processes and data formats in specific industries that have emerged in the past decade. Vertical standards, typically implemented using eXtensible Markup Language (XML), are incomplete products in constant evolution, continually adding functionality to reflect changing business needs. Vertical standards are public goods because they are freely obtained from sponsoring organizations without investing resources in their development, which gives rise to linked collective action dilemmas at the development and diffusion stages. Firms must be persuaded to invest in development without being able to profit from the output, and a commitment to ensure the diffusion of the standard must be secured from enough potential adopters to guarantee success. In this paper, the authors explore organizational drivers for participation in vertical standards development activities for supply- and demand-side organizations (i.e., vendors and end-user firms) in light of the restrictions imposed by these dilemmas.


2010 ◽  
Vol 6 (4) ◽  
pp. 20-37 ◽  
Author(s):  
Rubén A. Mendoza ◽  
T. Ravichandran

XML-based vertical standards are an emerging compatibility standard for describing business processes and data formats in specific industries that have emerged in the past decade. Vertical standards, typically implemented using eXtensible Markup Language (XML), are incomplete products in constant evolution, continually adding functionality to reflect changing business needs. Vertical standards are public goods because they are freely obtained from sponsoring organizations without investing resources in their development, which gives rise to linked collective action dilemmas at the development and diffusion stages. Firms must be persuaded to invest in development without being able to profit from the output, and a commitment to ensure the diffusion of the standard must be secured from enough potential adopters to guarantee success. In this paper, the authors explore organizational drivers for participation in vertical standards development activities for supply- and demand-side organizations (i.e., vendors and end-user firms) in light of the restrictions imposed by these dilemmas.


2016 ◽  
Vol 78 (6-3) ◽  
Author(s):  
Samsul Huda ◽  
Nurul Fahmi ◽  
Amang Sudarsono ◽  
M. Udin Harun Al Rasyid

In Internet of Things (IoT) era, The limitation storage on Wireless Sensor Network (WSN) can be solved by synchronized data sensors from the gateway node to the data center server. Data in the data center can be remotely accessed by the user at any time and anywhere from end user devices such as PCs, laptop PCs, and smart phones., and data should be accessed securely. The Only legitimated user can access the data sensor from an environmental health data center. CP-ABE (Ciphertext-Policy Attribute-Based Encryption) is becoming a robust cryptographic scheme solution to this issue. To enable a secure data sensor sharing and access on an environmental health data center, we propose a secure system model using CP-ABE which ensures confidentiality, integrity, and user privacy features. Experimental results prove that the implementation of CP-ABE does not overload the system.


Author(s):  
Michael E. Cope ◽  
Kevin C. Uliano

Human factors practitioners involved in designing graphical user interfaces (GUI) are constantly challenged with design compromises. These include the need to create an interface that contains maximum functionality and power, while striving to maintain sound human-computer interaction design principles. In a large client-server environment, subtle GUI changes to increase usability can have a significant impact on the bottom line. This paper describes a cost-benefit study comparing performance of two groups of test participants from a large wireless communication carrier. Each group performed test scenarios which isolated the effects of a single window both before and after it was redesigned. Results indicated that a single redesigned window will save an estimated $20,000 during the first year. These benefits were derived from estimating changes in end user productivity, errors, training time, and from savings obtained through decreased late design changes.


Sign in / Sign up

Export Citation Format

Share Document