The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Few data are available on the determinants and characteristics of post-caesarean section (CS) surgical site infections (SSIs) in resource-limited settings. We conducted a prospective observational cohort study to evaluate the rates, determinants, and microbiological characteristics of post-CS SSI at the Dodoma Regional Referral Hospital (DRRH) Gynaecology and Obstetrics Department in Tanzania. Spanning...
ObjectivesThe aim of this study was to evaluate the clinical impact of including lateral spine X‐ray in the screening of bone diseases in HIV‐positive patients.
MethodsA total of 194 HIV‐positive patients underwent dual‐energy X‐ray absorptiometry (DEXA), lateral spine X‐ray and bone biochemical analysis. Vertebral fractures were identified using a morphometric analysis of X‐rays and classified using...
Digital forensics focuses on the collection of evidence from the volatile and non-volatile memory of a computer based system, such as the hard disk and the RAM content. Needless to say, hard disk data are crucial in the investigation, but whether hard disk data collection is possible or not depends on the features of the case, and whether the forensics practitioners have a suitable legal permission...
The pervasiveness of communication devices, such as modern state-of-the-art smartphones, poses new challenges from a forensic standpoint. The differences between hardware and software mobile architectures create difficulties in the determination of reliable and general purpose procedures, which can be easily applied onto a general group of such devices. Therefore, we would like to present a general...
When dealing with live forensics cases, we should modify the volatile memory of the investigated system as little as possible, since it may contain plenty of evidential data. Usually, state-of-the-art live forensics best practices mention very little about how much the volatile memory is affected during a live investigation. As a result, there are only vague and imprecise ideas regarding the uncertainty...
Accounting frauds of a company have direct and indirect effects on financial institutions. For instance, the well-known cases of Enron and WorldCom became a major scandal with worldwide repercussions in 2002. As a result, we began to pay attention to accounting transparency. Since then, many countries have established a law, a principle or a guide of accounting and accounting audit like Sarbanes-Oxley...
This paper aims at unveiling the real and complete structure of the Symbian S60 v3 (third edition) platform filesystem, which is considered one of the most secure and armored systems issued by Symbian Ltd. in the last two years. By analyzing the unique features of security, which have been applied at the filesystem level, it will become clear how to develop applications for digital forensic purposes...
When a digital investigation is carried out, the main goal of the forensic practitioner is to find out evidence related to a digital crime on the computer under examination. To make the situation more severe, the perpetrator might have destroyed the evidence, for instance, by deleting the software which has been used to commit illicit actions. Moreover, he/she might have used sophisticated anti-forensic...
When a live digital forensic investigation is performed, a measure of integrity leakage related to the collection phase should be mandatory, by stating clearly the grade of blurredness of the acquired data object, such as the RAM memory. Current software approaches, which are often used for data acquisition, have not been able to quantify the dependency of the integrity leakage of factors observed...
Forensic accounting has recently gained great attention in the accounting and computer forensic fields since government regulations such as Health Insurance Portability and accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), sarbanes-oxley Act~\cite{b1} (SOX) were introduced in the United States. Although these regulations force corporations to provide financial transparency, they still commit...
The aim of this paper is to demonstrate the usefulness of the pagefile in a live forensic context. The forensic science is striving to find new methodologies to analyze the massive quantity of data normally present in a medium-sized workstation, which can have up to several terabytes of storage devices. As a result, the live forensic approach seems to be the only one which can guarantee promptness...
The Linux operating system has been used as a server system in plenty of business services worldwide. Nowadays, a lot of incident response approaches on such kind of platform have been established by many researchers active in the computer forensic discipline. Interestingly, many frameworks about how to deal with a live digital investigation on a Linux systems have been illustrated in the forensic...
Nowadays compressed files are very widespread and can be considered, without any doubt, with regard to the Digital Forensic realm, an important and precious source of probatory data. This is especially true when in a digital investigation the examiner has to deal with corrupted compressed files, which have been gathered in the collection phase of the investigative process. Therefore, in the computer...
The aim of this paper is to present a new tool, the Page-file Collection Tool (PCT), which can be used to obtain a pagefile on a live Windows based system. It is a known fact that a pagefile on a live system is protected by the operating system, which uses it in the virtual memory context. By using the NTFS filesystem specifications we were able to reconstruct the full pagefile, which can be used...
The aim of this paper is to present an effective multi-class steganalysis system, based on high-order wavelet statistics, capable of attributing stego images to four popular stenographically algorithms, namely F5 [15], Outguess [11], JP Hide&Seek [9], and Steghide [6]. The proposed method, based on a clustering approach, provides significantly reliable results.
In this paper we propose a methodology used to analyse collected pagefiles belonging to public computers using a pagefile collection tool (PCT), which is suitable to be used in a live forensics context. After that, we investigated how to gather sensitive information such as passwords and usernames, which we found in half of the analysed pagefiles. Undoubtedly, this fact can be used by a forensics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.