Create an account Home  ·  Topics  ·  Downloads  ·  Your Account  ·  Submit News  ·  Top 10  
Modules
· Home
· Content
· FAQ
· Forensic Downloads
· Forensics Feedback
· Forums
· Members List
· Statistics
· Surveys
· Top 10
· Topics
· Training Reviews
· Web Links
· Your Account

Our Membership

Latest: WhqUr3s577
New Today: 1
New Yesterday: 2
Overall: 29415

Computer Forensics
This is a free and open peer to peer medium for digital and computer forensics professionals and students. Please help us maintain it by contributing and perhaps linking to us from your own website.

Recent Posts

 Hostile work enviornment
 Can anyone suggest me a topic under printers forensics
 Unallocated clustered as court evidence
 Encryption
 I know how to recover ost file 2016

Computer Forensics World Forums


Pages Served
We received
52996627
page views since August 2004

Security Sources

FTC
OnGuard Online
ISO 17799 ISO 27001
ISO 27000 Toolkit
ISO 27001 & 27000
Cryptography
Security Policies

Computer Forensics World: Forums

Computer Forensics World :: View topic - access data ftk
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

access data ftk

 
Post new topic   Reply to topic    Computer Forensics World Forum Index -> Employment Forum
View previous topic :: View next topic  
Author Message
chinozuca
Newbie
Newbie


Joined: Jun 19, 2012
Posts: 1
Location: cardiff

PostPosted: Wed Jun 20, 2012 2:34 am    Post subject: access data ftk Reply with quote

hi everyone I'm new to this website, my first topic...
how does FTK 3.2 works regarding the image carving? i mean, i know that it recognizes images by they content, such as if the image is a pornographic image how does it recognizes those types of images, does it work by binary reading?? thanks guys
_________________
chinozuca
Back to top
View user's profile
PreferredUser
Newbie
Newbie


Joined: Jan 01, 2007
Posts: 1130
Location: USA

PostPosted: Wed Jun 20, 2012 5:34 am    Post subject: Reply with quote

As with most tools file recognition is a function of analyzing headers and footers.
Back to top
View user's profile
Blackegg
Newbie
Newbie


Joined: Jul 08, 2009
Posts: 15

PostPosted: Sat Jul 14, 2012 4:40 am    Post subject: Exactly... Reply with quote

That is exactly how it works, by analyzing header(file beginning)/footer(file ending)types.
_________________
A+
Net+
ACE
BDRA
UFED
Back to top
View user's profile
cybercop
Newbie
Newbie


Joined: Nov 01, 2005
Posts: 551
Location: Marion, Indiana, USA

PostPosted: Sat Jul 14, 2012 9:12 am    Post subject: Reply with quote

Software can't determine if an image is pornographic. It can find image files and the examiner can determine if they are pornographic. If the software has a database of hashes for known pornographic images, it can check the hash of the image and see if it matches. But that is about as close as you are going to get to "detection". Maybe in the future as facial recognition and edge detection software advances, it may be possible to have the software "examine" an image to determine whether or not the examiner needs to look closer at it (difference between a truck and a person etc).
Back to top
View user's profile
Display posts from previous:   
Post new topic   Reply to topic    Computer Forensics World Forum Index -> Employment Forum All times are GMT + 10 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Powered by phpBB 2.0.10 © 2001 phpBB Group
phpBB port v2.1 based on Tom Nitzschner's phpbb2.0.6 upgraded to phpBB 2.0.4 standalone was developed and tested by:
ArtificialIntel, ChatServ, mikem,
sixonetonoffun and Paul Laudanski (aka Zhen-Xjell).

Version 2.1 by Nuke Cops 2003 http://www.nukecops.com

Forums ©

 

TMs property of their respective owner. Comments property of posters. 2007 Computer Forensics Science World.
Digital forensic computing news syndication: Computer Forensics Training News or UM Text
Software is copyrighted phpnuke.org (c)2003, and is free under licence agreement. All Rights Are Reserved.