- #Prodiscover basic verify image checksum how to#
- #Prodiscover basic verify image checksum verification#
- #Prodiscover basic verify image checksum software#
In the following table, EnCase features and supported operating systems are illustrated:ĮnCase 6.11.2 – Forensic Edition (Law Enforcement) EnCase is bundled with numerous features which aid in all the four phases of forensic investigation.
#Prodiscover basic verify image checksum software#
This phase is most crucial in order to avoid questioning of the integrity of the investigation and investigation in the court of law.ĮnCase Forensics is a very popular software and is widely accepted in the court of law in forensic investigation.
#Prodiscover basic verify image checksum verification#
Presenting – It is the process which starts from beginning of the crime scene and is most crucial as every step undertaken by the investigator has to be recorded for verification purposes. It is the process where the evidence (data) is filtered and only the evidence (data) related to the crime is analysed and rest of the data is not considered for further investigation.Ĥ.
Filtering – It can also be called “Analysing”. This phase includes imaging of hard disks (or other media), labeling the gathered evidence, then to securely store the evidence in a well protected (safe and secure) environment.ģ. Preservation – Preservation of evidence related to the crime scene. The evidence includes hard disks, laptops, books, flash drives and other accessories.Ģ. Collection – Collection of evidence from the crime scene. The different and distinct phases of a computer forensic investigation comprise of:ġ.
#Prodiscover basic verify image checksum how to#
The assignment will be approached logically detailing the phases of computerįorensic investigation, brief of EnCase and FTK, how to use the two tools (including features) and then finally the comparison and evaluation of the two forensic tools.įorensic Computing is the “process of collecting, identifying, preserving, analysing and presenting digital evidence in a manner that is legally acceptable”
This report has been compiled in order to accomplish the objective that is to critically compare and evaluate the two popular computer forensic tools, EnCase and Forensic Toolkit (FTK) based on the four distinct phases of a computer forensic investigation.Ī detailed background about EnCase, FTK and their features will be specified. 1.3 Phases of Computer Forensic InvestigationĬ) Filtering and Searching (Analysing Evidence) Hashing, Searching and using FiltersĬ) Filtering and Searching (Analysing Evidence)