scholarly journals A Forensic Evidence Recovery from Android Device Applications

Author(s):  
Axay Patel ◽  
Dr. Priyanka Sharma ◽  
Prof. Dharti Dholariya

In a computerized world, indeed unlawful conduct and/or violations may be named as advanced. This world is expanding. Getting to be versatile, where the fundamental computation and communication substances are Little Scale Computerized Gadgets (SSDDs) such as standard versatile phones, individual computerized collaborators, smartphones, and tablets. The ought to recoup information, which might refer to illegal and unethical exercises gave rise to the teaching of portable forensics, which has ended up a fundamental portion of computerized forensics. The literature relevant to Smartphone forensics, as explored in this paper, focuses on the architecture of Smartphone operating systems. It also addresses the digital evidence of Smartphone applications. in this paper undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system. In this research, I'll use open-source Tools that can recover deleted data from the application.

2020 ◽  
Author(s):  
Jeffrey Mendenhall ◽  
Benjamin Brown ◽  
Sandeepkumar Kothiwale ◽  
Jens Meiler

<div>This paper describes recent improvements made to the BCL::Conf rotamer generation algorithm and comparison of its performance against other freely available and commercial conformer generation software. We demonstrate that BCL::Conf, with the use of rotamers derived from the COD, more effectively recovers crystallographic ligand-binding conformations seen in the PDB than other commercial and freely available software. BCL::Conf is now distributed with the COD-derived rotamer library, free for academic use. The BCL can be downloaded at <a href="http://meilerlab.org/index.php/bclcommons/show/b_apps_id/1">http://meilerlab.org/ bclcommons</a> for Windows, Linux, or Apple operating systems.<br></div>


2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


2004 ◽  
Vol 51 (3) ◽  
pp. 476-481 ◽  
Author(s):  
C. Centioli ◽  
F. Iannone ◽  
G. Mazza ◽  
M. Panella ◽  
L. Pangione ◽  
...  

Author(s):  
Heidi Lee Schnackenberg

The phrase “open source” is not something often heard in everyday conversation. However, the idea of downloadable, free software, particularly mobile applications, or “apps,” has become quite commonplace. Individuals often download free products, grateful that they are available and will potentially work well, without thinking where they originate or why they even exist. Not so long ago, most things associated with computers available to the general population came at a cost and were available from only a few vendors. This is no longer the case thanks to the ever-increasing availability and popularity of open source software, operating systems, and applications.


Author(s):  
Chris Moya

Programming a rich Internet application (RIA) in any Web environment is the goal of Laszlo Systems. The open source software, OpenLaszlo Presentation Server, allows a user to run, on any device, applications that blend to perfection a user-centered design. It facilitates development from the basic levels such as creating forms, menus and other components for a website, up to high-level tasks like focusing on the attention of the user, to easily create, for example, an e-commerce website, a full management back office or a trip booking site, all this using animations comparable to those created with proprietary software.


Author(s):  
J. Baker

One of the significant advances in software design afforded by the internet has been the open source movement, an effort to collaboratively create software and make it widely and freely available to the online community. Although the open source movement started with Unix-like computer operating systems, it has expanded to include a wide variety of software programs, including tools to publish and analyze online surveys. This article introduces the open source movement and then profiles three leading open source survey programs: php Easy Survey Package (phpESP), PHP Surveyor, and the Moodle course management system.


Author(s):  
Chao Lee

In the previous chapter, we discussed client computers, desktop operating systems and desktop environments. A desktop environment is the platform where most of the online course materials will be developed. This chapter will focus on course material development with open source technologies. The first part of this chapter is a brief introduction of instructional design and instructional technology theories. We will discuss the development cycle of technology based course materials. The theories of instructional design and instructional technology will be used to guide the development process. After the introduction, we will look at some of the open source tools that can be used to develop online course materials. We will have some detailed discussion on the open source Web authoring, multimedia, and collaboration tools. We will explore the options we may have and the functionalities provided by these open source tools.


Sign in / Sign up

Export Citation Format

Share Document