Calculate the hash value again to compare the files

Assignment Help Computer Engineering
Reference no: EM133244706

Case :

In this project, you create a file on a USB drive and calculate its hash value in FTK Imager Lite. Then you change the file and calculate the hash value again to compare the files. You need a Windows computer and a USB drive.

1. Create a folder called C4Prj04 on your USB drive, and then start Notepad.

2. In a new text file, type This is a test of hash values. One definition of a forensic hash is that if the file changes, the hash value changes.

3. Save the file as hash1.txt in the C4Prj04 folder on your USB drive, and then exit Notepad.

4. Start FTK Imager Lite (clicking OK or Yes in the UAC message box, if necessary), and click File, Add Evidence Item from the menu. In the Select Source dialog box, click the Logical Drive option button, and then click Next.

5. In the Select Drive dialog box, click the Source Drive Selection list arrow, click to select your USB drive, and then click Finish.

6. In the upper-left pane, click to expand the USB drive and continue expanding until you can click the C4Prj04 folder. In the upper-right pane, you should see the hash1.txt file you created. 7. Right-click the file and click Export File Hash List. Save the file as original hash in the C4Prj04 folder on your USB drive. FTK Imager Lite saves it as a .csv file. Exit FTK Imager Lite, and start Notepad.

8. Open hash1.txt in Notepad. Add one letter to the end of the file, save it, and exit Notepad.

9. Start FTK Imager Lite again. Repeat Steps 4 to 7 (but without starting Notepad), but this time when you export the file hash list, save the file as changed hash. 10. Open the original hash and changed hash files on your USB drive in Excel or another spreadsheet program.

Reference no: EM133244706

Questions Cloud

Discuss common characteristics of successful interventions : Discuss the common characteristics of successful interventions. Briefly discuss the elements of successful change management
Explain udp pots, how to see the statistics : CI E-45A Harvard University Explain UDP pots, how to see the statistics, display the service name with PID, promiscuous mode, how to find anon supportive
Suggestions in breaking the silence about racism : Beverly Daniel Tatum offers suggestions in breaking the silence about racism. Provide 3-4 examples from the reading. In your opinion, are Tutum's suggestions fe
Provide a section in the business continuity plan : provide a section in the Business Continuity Plan that covers all potential security layers and steps to rectify the problems if they occur
Calculate the hash value again to compare the files : How lessons learned from the State of California can be applied to your organization or industry - create a file on a USB drive and calculate its hash value
Define the different knowledge types : Define the different Knowledge types and explain how they are addressed by knowledge management in different business environments
Compare digital signature generated using the senders : MIS 6330 University of Texas, compare digital signature (DS) generated using the sender's privatewith message authentication code (MAC) generated
Brief background on the critical infrastructure : Brief background on the Critical Infrastructure as it relates to National Security. Consider how to Minimize Disruption that improves First Responder Safety
The role of data analytics in process : BUSI 300 Howard Community College How lessons learned from the State of California can be applied to your organization or industry.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd