The snapshots of registry were taken and compared prior and after each step. The experiment was carried out in three steps: installation, download, and uninstallation. #Bitcomet vs utorrent 2017 windows 8If order to fight against this type of cybercrime we carried out the research, during which we investigated the evidences left by BitTorrent client application in registry under Windows 8 operating system. This data could be used by a forensic investigator to locate information about a downloaded file where the file had been erased, or stored in a remote location.īitTorrent client application is a popular tool to download large files from Internet, but this application is quite frequently used for illegal purposes that are one of the types of cybercrimes. It was also found that all clients provided the same data as a function of their operation. It was found that all clients produced forensic data which could be located with a topical search. The clients examined were BitComet, BitTornado, Vuze, and µTorrent. The analysis was limited to that which could be determined using topical analysis, and examined the registry and other user areas within Windows, such as the local data area. This paper builds on previous work in this area and used Windows 7 as a base to examine four of the most popular BitTorrent clients to determine what information they write to a hard drive that is of use to a forensic investigator. Law enforcement need solid evidence, as well as investigative intelligence if they are to reduce this trade in illegal material. The use of BitTorrent technology to exchange illegal files over the internet is of concern, especially given the large volume of data exchanged.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |