Wednesday, December 18, 2013

What Is Digital Forensics?

In the not too distant past, computers were monolithic devices which required a separate and specific climate controlled environment, and technicians with a specialized skill set to maintain them and make use of them. Only governments and large corporations could own them and pay the professionals who could communicate with them.

Now, computers are an ubiquitous part of life, and calculators and gaming systems have more computing power and data storage capacity than the early, giant computers.

Because computers are so prevalent, the amount of personal, corporate and government data stored on various devices increases with every passing minute. Security measures don't always keep up with the latest technology, and digital media is often part of crime investigations. The critical nature of much of this data has created the need for a new science called digital forensics or sometimes, computer forensics.

Digital forensics is a branch of forensic science that includes the recovery, investigation and analysis of data found on digital devices such as computers, smart phones and media storage devices in such a manner that the results will be allowed to be entered as evidence in a court of law. In the private sector, it can be used to discover the nature and extent of an unauthorized network intrusion.

One goal is to preserve evidence in its most original form while performing a structured investigation. The process often includes the seizure, forensic imaging, and analysis of digital media, and the production of a report on the findings. This structured investigation needs to maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. There also needs to be a clear chain of custody for confidence that the data has not been tampered with or compromised. Data gathering incorrectly done can alter or corrupt the data being collected, rendering it useless to the investigation.

The first step is to preserve the crime scene by making a copy of all memory and hard disks. This preserves the state of the device, and allows it to be put back into use. After the data is preserved, the investigation for evidence can commence.

A computer forensics expert must show skills and experience by earning at least one of the major certifications in computer forensics. A competent examiner can recover deleted files, analyze Internet data to determine websites that were visited from a certain computer even in when the browser history and cache may have been deleted.

A computer forensics expert is also able to recover communications sent via chat or instant messenger. While performing the analysis, the expert can also recover deleted images and email messages. In the modern world of mobile Internet devices, a competent computer forensics expert will also be able to recover deleted data from mobile phones, including deleted text messages, call logs, emails, and the like.

During Digital Forensic investigations, specific steps and procedures requiring an added level of technical expertise must be followed to access, preserve, and analyze the data and to eliminate any risk of spoliation. Only trained professionals, who also possess IT knowledge, should be trusted to handle this process. This ensures that the data can be admitted by a legal team as evidence in a court of law.

Wednesday, December 11, 2013

Process Of E-Waste Recycling

E-waste collection

Electronics are usually collected from individuals and organizations. To make collection easy, the individuals are supplied with bins where they are supposed to put the wastes. To further make collection easy, each of the waste is supposed to be placed in its own bin.For example,end of life computers are placed in their own bins and fluorescent bulbs in their own bins. Once the bins are full,the individuals or organization notify the recycling company which picks the waste.

Shredding

Once the items to be shredded have been delivered from the collection points, they are removed from the trucks and put in the store.If the items need to be shredded immediately, they are removed by hand and put in the conveyor line. Common electronics that need to be shred include: end of life batteries, toner cartridges, UPS battery, computers and fluorescent lights.

Once the e-waste has been picked by hand and placed in the conveyor line, the waste flows into the shredding line. If there are hard drives in the materials, secure hard drive shredding is done. There are two main shredders that are used in shredding: main shredder and final shredder. The main shredder breaks the material into 4" by 10" fragments. Once the materials have been fragmented, they flow to the final shredder that further reduces them into poker chip-sized fragments.

Separation

Once all the materials have been shredded in minute fragments, they enter separation lines. Here the materials are segregated depending on their nature. Sophisticated technologies are used to separate the materials. Some of the technologies used include: magnetic separation, optical identification and eddy currents. At the initial stages of separation plastics and metals are separated from the waste. In the second stage the different metal varieties are separated.

Output

Common commodities recovered from e-waste are plastics,steel,PC board, aluminum,and CRT glass.All these commodities are usually of varying grades and types.Once all the materials have been adequately shredded and separated,they are usually sold to manufacturers and producers who use them for various purposes.For example,you computer's steel may be used in manufacturing a car.

Benefits of recycling

Recycling of raw material from end-of-life electronics aids in solving the growing e-waste problem. This is because the materials are not stacked in dust bins thus polluting the environment.The other benefit is that it aids in conserving natural resources.This is because once the materials are recycled,they provide the necessary raw materials for industries therefore there is no need for mining.Recycling also reduces greenhouse gas emissions that are usually produced during the manufacture of new products.This further plays a role in minimizing pollution.

Conclusion

Although, most of end-of-life materials are shredded to provide the required raw materials,there are some materials that are usually in good conditions and they can't be destroyed. These materials are usually donated to people who might be in need of them. Common donations are laptop and computer donations.Cell phone donations are also made although to a small extent.

Monday, December 9, 2013

Golden Tips To Increase Your Laptop Life

Laptops, like any other machines experience wear and tear, and thus need replacement every few years. The craving for fancier, improved and newer hardware and software always lingers among users. Users to get closer to the new technology often throw the older one, even before it's needed. So, if you are among those who are looking to keep their lappy for longer, here are few tips that can add to your machine's expectancy greatly. So, add to your PCs life by following this simple tips and the list of do's and don'ts.
  • Liquids are a complete no-no: Drinking coffee, tea and other liquids is very common while working on the computer, but keeping these too close can prove hazardous. Spilling over can cause a lot of internal damage to the micro-components installed inside the machine and can even cause circuitry damage. So, keep liquids away, if feeling the urge to drink, just drink and keep that glass/bottle away.

  • Food; keep it away, it's not your table: Eating over your laptop can make the small particles and crumbs fall between the keys of the keyboards, which is like giving invitation to small bugs. These crumbs can also cause harm to the circuitry and can even deteriorate the look of your stylish machine.

  • Clean hands are a must when using your laptops: Cleaner hands can make using the laptop a lot easier and can also prevent the stain on your hand from transferring onto the same. This way the coating of the machine can be kept as it is for longer.

  • Antivirus software is a must: An antivirus is like the defense system of a laptop, which must be always installed and updated at the earliest, in case the license has expired. As issues and viruses never ask for permission before entering, so stay equipped always.

  • LCD display monitor needs proper care: The screen of the laptop should be protected and the same must be gently closed when not in use. Lifting the laptop with its screen is a complete no and when trying to carry it, always lift the laptop from its base.

  • Take proper care of the power cord: Prevent pulling the power cord from the power socket to ensure protection and also avoid rolling the chair over the cord as it can lead to its early damage.

  • Be careful with accessory devices and removable drives: When inserting any device make sure it's being plugged in at the right port. Also, handle these disks carefully as leaving these at any place can lead to breakage or scratches on the same. If inserting any CDs or DVDs, make sure there are no labels which can cause jamming of the same.

  • Rapid temperature changes are a complete no: Avoid turning your laptop immediately if you move from indoors to outdoors or when there is a good difference of temperature between the two places, in which it has been shifted.

  • Keep your laptop clean always: Having the laptop cleaned can help in keeping out dust that on accumulation can cause impairment in the functioning of the internal parts. The area around the exhaust fan must be carefully cleaned with a thin brush, which can otherwise lead to diminished air flow and then overheating.

  • Proper storage is required: A laptop case that can hold the machine ideally and while ensuring complete protection must be opted. This can help in keeping away scratches and other sorts of damages. Always keep your lappy on a surface that is flat and clean to minimize damages.

  • Try not using your laptop on the bed: Using the laptop for long hours repeatedly on the bed can cause the fans to obstruct by sucking the dust and debris on the bed. So, refrain from practicing this, it's not good for your machine.
Above mentioned are just some golden tips, which if followed without failure can help in keeping your laptop as good as new for longer. So, practice it to delay your new laptop buying expenditure for later.

Sunday, December 8, 2013

How to Avoid Online Fraud the Easy Way

You must have heard of the movie "How The Grinch stole the Christmas," it is not Christmas already but festive season where cyber criminals who are out to steal your financial data and privacy online. It is the time when many online scams happen. The worst part is that everyday something or the other turns up online that is tempting enough to get engaged in it and go for it. What is most required is being vigilant against these cyber criminals, scammers and online Grinch who are there to steal your data.

The most used tricks that are played upon majority of people online includes scams related to e-mail attachments, search results containing greeting cards, shipping documents, social media postings and other such tricks. However if you have decided that enough is enough then you need to first understand how to avoid it. Here are a few pointers to avoid online scams the easy way.

Things to watch out for:

• You need to keep an eye on the latest deals and offers that are provided online. Not that these are necessarily going to be a scam but it is always essential to watch out for it. You must beware of anything that says holiday cards, holiday gift cards, photos, holiday coupon and other festive offers that you receive on your e-mail. When you receive e-mail with these attachments or subject lines you need to be careful as these lead to Trojans and malware infection. These are well-designed scams to steal your bank information.

• If you are thinking of checking out the link it is better not to actually access it by clicking it. The best thing you can do is to type the web address of the retailer. To follow the e-mail links by an online retailer can be misleading and malicious. Another thing to keep in mind is not to be deluded by pop-up ads as many of these lead to fraudulent websites.

• Another most interesting fact is that if you are using a debit card for online purchases then there are chances that you might get into fraudulent transactions. It is advisable that you use a credit card as it has its own limits for extending maximum credit, better would be to use a credit card with lowest credit limit.

• Do not forget to check the URL in the browser before accessing the website. If you want to be safe then check for https extension before any web address especially for transaction purpose.

• If you receive an e-mail without asking about a specific deal or without subscription then the links and the deals can be fake. It is better to find out if the sender is authentic to determine the e-mail is real or fake.

About E-mails

• If you are on a social media website then you need to be careful in clicking links that appear there. These are malicious and harmful as it is always easy to post short links and transfer them through e-mails. This is the reason you receive e-mails with malicious links and shortened URLs.

• It is always great to have an updated security suite and all the security patches installed on your system. It prevents you from getting infected and the security patches are always apt for preventing any new online threat to enter your system.

• If you are in a habit of making online transactions then it is better to use a dedicated system or a desktop for it. A secured desktop that is used for carrying out your online transactions will be more safe to handle. Remember, not to use it for casual e-mails, downloads, or web surfing purpose.

• It is advisable to keep a close eye on every transaction that you are carrying out online through your bank statements on regular basis. The online or credit card activity is the best way to keep a track on transactions and avoid any online threat.

• When you are installing a software then it is essential to be wary of the source from which you are about to install the software. Things like spyware tools, accelerators and other such tools that talk about enhancing internet speed or other such tempting offers should be scrutinized before taking any action.

• You need to remember that any pop-up or free software is a trick used by hacker to get into your system.

• If you receive any e-mail or message that says your parking token or a banking certificate is about to expire then it might be a fraud. It is better to seek enquiry directly from the authority or financial institution. Better call and ask about the e-mail and you will get your answer.

Keeping all the above-mentioned pointers in mind will help you get past the online Grinch and frauds on this festive season.

How to Create Your Own Virtual Private Network

With so many people constantly on the move, the temptation to use an open Wi-Fi network like those found in coffee shops and fast food restaurants increases daily. The problem with open networks is that although the internet connection is free, your data becomes vulnerable to hackers or people with the knowledge to steal your information right out of the air.

Simple things like checking your email, logging onto your banks website, or any other secure search on an open wireless network, sends your username and password over the air just long enough for someone who knows what they are doing, to steal your information and your identity. This is where VPN's or Virtual Private Networks have grown in popularity over the years. They provide the user with a secure way of surfing the web.

Until now, you only had two choices when it came to secure web searches, VPN's or Dedicated Security Appliance. VPN's are easy to install and use. If you know how to download an app and put in a username and password, you are pretty much set. The downside to using VPN's is the monthly service fee if you are using the paid version. The free versions while cost effective come with advertising for their service, which can get disruptive. VPN's also do not help you to get back to your ISP, which is another downside. Dedicated Security Appliance's requires and intermediate knowledge of computers in order to set up that method. Once set up though, the usage is relatively simple. This solution uses your very own firewall to help you achieve secure web browsing. The downside is that you would still be using your own ISP network, and it can be expensive to set up.

Another option is to build your very own VPN with DD-WRT to achieve secure web browsing. There are about four steps to this process with an important warning. Do not use your primary router for this job, as you may need to use the internet to troubleshoot problems.

1. Getting DDT-WRT
 
Even though you can look up online how to flash a router with DD-WRT, your router still needs to have a compatible version of DD-WRT with the VPN tab under services. If the VPN tab is not there, update the instillation. Then you will need a good power source. If your router is struggling power wise under its regular load, this will put it past the breaking point, so make sure you have a big enough power source.

2. Write down the installation process
 
This is extremely important and you will need four things:
 
a. The username and password of the router you will be using.
b. The external IP address of the router (192.168.1.300) for example.
c. The internal IP address of the router (192.168.300.1) for example.
d. Finally, you will need the internal DHCP range of the router.

3. Enabling the Virtual Private Network Servers
 
Even though a security flaw has caused the DD-WRT VPN servers to depreciate, and that flaw is hard to exploit, it is still a good starter VPN server. As time goes, you may want to move to an open VPN. The first step is to login and go to the "Services" tab. Next, click the "VPN" sub-tab where there will be two boxes, the "PPTP Server" and the PPTP Client. Click the "PPTP Server". Enter the external IP address of your router in the "Server IP" box. Then, you want to enter a range of IP's that the connecting computer will be using into the "clients IP" box (For example 192.168.300.310-320- etc.). Also, make sure to use the internal range of the router. Enter the usernames and passwords into the CHAP-Secrets section, putting each entry on a new line.

4. Enabling the Client
 
Each mobile client may be a bit different, but the basic principle is the same. For Android devices with Android 4.1 or higher, the steps are as follows.
 
o Go into configurations
o enter the "more networks" tab
o click "VPN"
o then click the "+" sign to add a VPN
o Name it
o Type in the server address
o Click save then click the connection
o Enter your username and password the click connect and you should be done.

Now that you know how to create your own VPN, surfing the web will now be a safe activity. Enjoy!

The Benefits Of Green Schools

More and more people are seeing the need to "go green." We have collectively ignored the health of our planet for a long time, and are now finding that we need to start cleaning it up and nurturing it once more. As the idea of greening America grows, educational websites are beginning to tout the benefits and importance of "green schools." There are many educational websites that are dedicated to showing all the ways green schools will make a difference in the world. There are teaching aids and education websites that offer ways for everyone to contribute to this growing movement.

A great website to find teaching aids is Green Teacher. This online magazine offers many resources for teachers. It provides green activities to use as teaching aids for students from elementary education to high school. This can be a great way to engage students in the importance of living healthy lives and to become aware of the global challenges they will face as they grow. There are activities to spark student interest in becoming more environmentally friendly. Eco-friendly teaching aids can shed light on the problems the earth is facing.

United States Green Building Council- Build Green Schools is one of the educational websites that is devoted to actually building environmentally conscience schools. They believe that too much money and energy is being wasted, and schools are losing out on opportunities to lower operational costs. Saving on operational costs frees up money so schools have more resources for teachers in the classroom. Additionally, the health benefits green schools will give students and faculty are tremendous. Environmentally conscience schools benefit school budgets, overall health, and the preservation of the earth, making them an important next step in education.

Getting these types of schools implemented nationwide has become a popular trend that's giving rise to educational websites like Green School Alliance. This website is devoted to involving all stakeholders from elementary education through high school together collaborate on environmental sustainability in schools. They bring classroom students, communities, and administrators together to address environmental challenges. They then share ideas and implement environmental practices to make positive changes. Resources for teachers are shared and peer-to-peer gatherings are held to constantly keep improving the green initiative.

What these education websites have in common is creating a better school experience that will serve everyone involved. They all make different contributions to this movement from providing resources for teachers to funding the building of green schools. When it comes to the education of our youth we should look into any educational websites that provide us with a better way to do education. There are many resources for teachers to utilize in making green changes within the classroom. Green schools are the future and as with anything change takes time. Use available green lesson teaching aids to help you start the green process within your classroom.

Saturday, December 7, 2013

How to Use AutoCAD - Basics

AutoCAD is a computer-based piece of software that enables users to draw 2-dimensional and 3-dimensional images. These images are then used for manufacturing or construction. Engineers use the program to plan buildings, design electrical products and even build elaborate homes.

AutoCAD is a professional program and employees do need to complete training courses before they are allowed to use it in the workplace. If you are an individual who is interested in learning some easy steps, before you start your training program, then you have come to the right place. Read on for some tips on where to begin.

Tips for beginners

• Pick the type of software you need to use - Decide why you are going to use the software because there are different types for different designers. If you want to build and design a house in the long run, there is no point using a software that is based on animation (AutoDesk Maya)

• What type of computer do you have? - Have a look in the system preferences to see the specifications of your computer. AutoCAD is expensive and you will have wasted your money if you have bought a Mac program when you have a Windows computer. The basic AutoCAD program needs 2GB of RAM and 2GB worth of space to be installed on the computer, so make sure you have enough space on your computer. AutoCAD uses IE 7.0 or higher, but there are updates available for other internet browsers, you will just have to install them separately.

• Installation - Now that you have checked everything, you are ready to install AutoCAD. The program comes with an installation wizard, so just insert the CD or download the program and then sit back and relax. If all goes to plan, it will take about 30 minutes to install.

• What to expect - Once the installation is complete, open the program and you are greeted with a black screen, full of blue boxes. This is where you are going to be designing your images. To get started, click on the line tool, in the home tab and you are ready to make your first line in the image.

• Line tool - This is where the program is similar to the pen tool in Photoshop, or Pixelmator. You click in the space where you want to begin, drag the line across to where you want it to end, and then unclick. You have drawn your first line.

• Eraser tool - If you make a mistake, don't worry all is not lost. There is an eraser tool that looks like the end of a pencil, with the eraser on the top. Just click on it and highlight the line that you want to erase. Simple.

• Circle tool - The next tool you need to know about is the circle tool. It looks like a circle and it is in the same place as the line tool. You just put the mouse where you want the middle of the circle to be. Then you hold down on the mouse, move outwards until the circle is the size that you want it and then unclick. You have options to alter the dimensions of the of the diameter and the radius, using your computer keyboard.

• Trim tool - Once you have the circle the way that you want it, you might not want a full circle. This is where the trim tool comes in. You highlight the area you want to trim. The lines will become dotted, right click on the mouse and the lines will disappear.

There are some basic tips for beginners and people who want to learn the basic tools. If you want to learn AutoCAD to use it in your job, you will have to take a course. There is no getting around that. Your employers are not going to give you the time to learn whilst you work, it will be a waste of their money.

The CAD Corporation is an online store providing needs to designers. They have sections on their website for buying software, hardware, training packages and even job seekers. It is the one stop shop for people who are in the design field or are looking to get into it. In addition to their website, they have sales offices and training centers throughout Africa. Their joint sales and training centers are located in Johannesburg and Centurion, and their independent training centers are in Capetown, Port Elizabeth, Eastrand and Gateway Umhlanga. They supply design products for customers in the fields of building, engineering, manufacturing and plant.