The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Numbers of companies are using AMS (Accounting Management System) to manage their accounting data. In the case of large corporations they tend to use ERP (Enterprise Resources Planning), but except them most of companies use AMS to manage their accounting information. In the other words, every company is using some sort of digital data format to manage their accounting data. Therefore, if there is...
The flash memory market has grown at an extremely fast rate, when compared with all other types of semiconductors. Much of this can be owed to the rabid use of flash memory in portable media players like Apple iPod, but also to the growth of the cellular phone market, where over 1.2 billion handsets are expected to be sold worldwide this year alone, as well as other electronic devices.[8] Lately,...
An embedded system is a special-purpose computer system designed to perform one or a few dedicated functions, for example, just portable devices such as MP3 players, cell phone, PDA, to telemetric system like car navigation system etc. The more embedded systems are diversifying various types, the more forensic community is concentrating on efforts of research correspond to all kinds of embedded systems...
When a digital investigation is carried out, the main goal of the forensic practitioner is to find out evidence related to a digital crime on the computer under examination. To make the situation more severe, the perpetrator might have destroyed the evidence, for instance, by deleting the software which has been used to commit illicit actions. Moreover, he/she might have used sophisticated anti-forensic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.