Verified Document

Forensic Tools For Computers Term Paper

Zilla Data Nuker Test: Zilla Data Nuker

Software Title

Files created or downloaded leave a trace even when deleted. These traces allow skilled computer forensic professionals to retrieve the data. Zillasoft, LLC, a New England-based software developing entity provides Zilla Data Nuker that "Shreds sensitive files so they cannot be recovered or undeleted" according to the promotional material for the software. (Zilla Data Nuker 2.0) Zilla Data Nuker is freely downloadable from the ZDNet site at www.zdnet.com or can be obtained directly from the Zillasoft website at www.zillasoft.ws.

Software Functionality

Zilla Data Nuker uses what the company terms as "shredding algorithms" to obliterate data. Ostensibly the software is designed to be used to improve the functionality of a home or office computer by deleting unnecessary files from the hard drive. Zillasoft also claims that the software can function to help protect the user's privacy by completely destroying information targeted by Zilla Data Nuker. This tool might be used by someone who wants to delete personal files that contain sensitive information or by someone working for a company that is attempting to "prevent employees from wasting company time on things such as pornography and music downloading." (Rothke, 2004) Many companies are beginning to more closely examine the files on employee computers to assure that misuse is not taking place. Zilla Data Nuker claims that it can remove such files not just from visibility but from existence on the hard drive. Since the Enron case where data was destroyed by the terabytes, "recovery and analysis of data has come to form a central part of internal investigations." (Marlin, 2004)...

Some proponents of command line forensic tools "argue that most users really do not know what is going on when they 'point and click' their way around a computer forensic examination." (Kuchta, 2001) This may be a true statement but is somewhat beyond the scope of this text since the testing information is not being submitted in a legal proceeding. Conditions where the specifics regarding the process that the software uses to perform its function will often require software experts from the company that wrote the software to help solidify the reliability of the program in question.
'The Computer Forensics Tool Testing project at the National Institute of Standards and Technology (NIST), an agency of the United States Department of Commerce, was designed to provide a measure of assurance for the software tools used by law enforcement in computer forensics investigations." (General Test Methodology, 2001)

The test method is a combination of the software used for testing and the procedures for completing the testing. (General Test Methodology, 2001) Each of the applicable procedures mentioned in the U.S. Commerce Department prescribed methodology has been included below.

Title stating what product was tested: Zilla Data Nuker

Identification of the testing environment: Local corporate office.

The name and address of the vendor: Zillasoft, LLC. The address was unlisted on the website. After conducting a…

Sources used in this document:
References

General Test Methodology. v1.9. (2001). National Institute of Standards and Technology

U.S. Department of Commerce. Retrieved from http://www.cftt.nist.gov/Test%20Methodology%207.doc

Kuchta, Kelly J. (2001). Your Computer Forensic Tookit. Information Systems Security, (10) 49.

Retrieved from Academic Search Premier database.
Zilla Data Nuker 2.0. (n.d.) Retrieved from http://downloads-zdnet.com.com/Zilla-Data-
Cite this Document:
Copy Bibliography Citation

Related Documents

Forensic Fabric Analysis
Words: 2310 Length: 7 Document Type: Term Paper

Forensic Fabric Analysis Some of the basic tools that a fabric examiner should at least have at any given moment include a stereomicroscope, along with a composite light microscope that is fitted with polarized light capability, and a comparison microscope. When examining both questioned and known fabric, the examiner must do this side by side, and within the same magnifications in terms of visible light. Alternative lighting, which includes fluorescent lighting

Forensic Accountant Must Possess Accounting
Words: 1557 Length: 5 Document Type: Research Paper

Assets in the investment portfolio were overvalued. Financial transactions were structured to report smaller amounts of debt and create the appearance of greater cash flow. Financial results were represented in a false and misleading manner. Forensic accountants also played an important role in the Enron case by doing audits and investigating accounting practices to gather evidence of how the fraud was performed. They played vital roles in the court room

Forensic Accounting Is a Special Subsection of
Words: 2063 Length: 7 Document Type: Essay

Forensic accounting is a special subsection of accounting that goes beyond the typical job description of an accountant. Forensic accountants use their work in courtroom and other legal settings to help. Their primary roles are litigation support and investigative accounting (Zysman, 2012). To do this, forensic accountants combine accounting, auditing, and investigative skills. However, conducting investigations is only one component of a forensic accountant's job description; they also have to

Forensic Lab Forensic Crime Labs Are Important
Words: 975 Length: 4 Document Type: Essay

Forensic Lab Forensic crime labs are important institutions within the criminal justice system and each lab must be up to standard in order for this system to operate at a high and fair level. A good crime lab begins with a good design based on solid fundamentals and thorough planning. The purpose of this essay is to design a digital forensic crime lab that can be used in a university setting.

Forensic Accounting in Practice Over
Words: 876 Length: 3 Document Type: Research Paper

This means laying out for the jury and the judge the role of different parties and how this contributed to illegal activities. It is at this point when everyone can understand the full context of the case. (Singleton, 2010) (Golden, 2011) Analyze the legal responsibility a forensic accountant has while providing service to a business. The legal responsibility of a forensic accountant is to determine when fraudulent activities have taken place

Forensics: Signature Analysis Forensic Examination and Analysis
Words: 1114 Length: 4 Document Type: Essay

Forensics: Signature Analysis Forensic examination and analysis of writer identification and verification are reported as having "applications in various domains. Especially in the field of biometric recognition. Forensic Document Examination (FED) is a process that clarifies the writer of a handwritten document. Applications included are signatures verification. FED is such that is reported to have been based primarily on manual examination by experts with only recent automation of analysis methods being

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now