Lesson
1 Lesson 2 Lesson 3 Lesson 4 Lesson 5 Lesson
6 Lesson 7 Lesson 8 Lesson 9 Lesson 10
Software engineering | Программная инженерия
Lesson 6
Read the text: Tactics of search of the computer information
Tactics of search of the computer information is chosen, from data security, functioning of the computer and its peripheral equipment conditions at the moment of investigatory action realization. It is necessary to define whether computer technique means is connected to local network or to the main computer - server where investigatory action is carried out. A casual computer, not the main one, may also contain information.
It is necessary to know that when you erase information from magnetic carriers, physically it doesn’t really get erased it changes its status. It becomes “invisible” and is stored until new information is recorded instead. Thus, there is a possibility to renew it completely using special utilities, and partially – when new information is recorded instead.
It is necessary to quit programs operations, which work at the moment of the examination, preliminary having written down all system messages on the status of the program at the moment of a halt. It is necessary to save active documents with new names, leaving their original versions unchanged. It is reasonable to take a picture of a monitor according to criminalistic photographs regulations, and to record it – if possible.
Computer manipulations on evidence information search should be given to an expert, if an investigator doesn’t possess necessary knowledge and skills. It is recorded in the minutes what actions are committed, their consequence and order, software used for information search. The goal and content of every action is explained. Most of the text and financial programs store a list of the lattest session operation and can render them immediately, if they are not erased or moved to another place. The user usually keeps documents in catalogues on the computer disk with standard names: MY DOCUMENTS, DOCUMENTS, DOCS, ARCHIVE and so forth. Document files have characteristic specification ("expansion"), that is a part of the name which stands after a dot in the file name: *.doc, *.txt and so forth. All computer files keep date of the last change or alteration, and after some programs - date of a file recording.
Popular software package Microsoft Office after installation on the computer conducts the private file - minutes where the date and time of all computer plugs in are recorded. Programs of connection and network operation store addresses of many Internets - contacts of the user, documents of email with addresses of the sender [3,15].
The results of the search are stored in electronic version on the variable magnetic carrier and are printed and are draw up like a supplement to the minutes.
There is no need to limit the search of information by computer. It is necessary to look through all the documentation including scraps of paper, as programmers don’t rely on their memory and make notes passwords, system configurations changes, peculiarities of making out a computer information database. Many of users keep file recordings on diskettes, in order to prevent their loss at computer failure. That is why any revealed data carriers should be withdrawn and studied.
In special cases at realization of the investigatory actions it is necessary to search for hiding places where variable computer data carriers may be stored; with the expert help open cases of hardware of computer engineering and techniques to reveal specially switched - off internal data carriers, for example, an additional hard disk.
1. Match the left part with the right:
1. Computer manipulation on evidence information search |
a) to save active documents with new names. |
2. There is no need to limit |
b) are stored in electronic version on the variable magnetic carrier. |
3. The results of the search |
c) the search of information by computer. |
4. It is necessary |
d) should be given to an expert. |
2. Complete the sentences with the suggested words: including, information, search, configurations
There is no need to limit the _______of information by computer. It is necessary to look through all the documentation _______scraps of paper, as programmers don’t rely on their memory and make notes passwords, system _______changes, peculiarities of making out a computer _______database.