Around The Globe ATG.WORLD

Visit our sister website :

http://www.atg.world/

This is a social network for enthusiasts just like us. No Junk! Only meaningful conversations with the people who share the same enthusiasm as us.

Around The Globe ATG.WORLD

Visit our sister website :

http://www.atg.world/

This is a social network for enthusiasts just like us. No Junk! Only meaningful conversations with the people who share the same enthusiasm as us.

Tuesday, April 27, 2010

Message Digests (HASH)

Message digests or hashes are commonly 128 bits to 160 bits in length and provide a digital identifier for each digital file or document. Message digest functions also called hash functions, are used to produce digital summaries of information called message digests. Message digest functions are mathematical functions that process information to "produce a different message digest for each unique document". Identical documents have the same message digest; but if even one of the bits for the document changes, the message digest changes.

Figure. Example of the Message Digest Process

Because message digests are much shorter than the data from which the digests are generated and the digests have a finite length, duplicate message digests called collisions can exist for different data sets. However, good message digest functions use one-way functions to ensure that it is mathematically and computationally infeasible to reverse the message digest process and discover the original data.

Message digests are commonly used in conjunction with public key technology to create digital signatures or "digital thumbprints" that are used for authentication, integrity, and nonrepudiation. Message digests also are commonly used with digital signing technology to provide data integrity for electronic files and documents.

Saturday, November 21, 2009

SQL Injection

SQL Injection



SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered or user input is not strongly typed.


SQL Injection like this

Monday, August 31, 2009

Presentation of Digital Evidence

Documenting the Investigation.

Documenting is not a final step, but is essentially done throughout the investigation at all stages of investigation and processing digital evidence. Documentation showing evidence in its original state is regularly used to demonstrate that it is authentic and unaltered.

Documentation includes.
  • Software used and Version Numbers.
  • Collection tools.
  • Methods used.
  • Explanation of why this analysis.

Court Presentation.
  • The Discovery process
  • Checklists, notes, comments, email, etc.
  • Chain of Custody
  • Business Attire.
  • Ask for questions to be repeated.
  • Give your attorney a chance to object.
  • Review your notes before court
  • Always use your notes to answer questions.