![]() But we could calculate the hash value of the extracted data through logical extraction or of the image file extracted through physical extraction. As previously mentioned it is almost impossible to interact with mobile devices without altering them. ![]() MD5 or SHA are widely used algorithms to calculate the Hash values of the evidence. Hashing – Hashing is the method used to prove the integrity of the evidence.It is crucial because it keeps track of the Digital evidence. Investigator’s name, time and date of each step, Details of evidence transportation. ![]() It includes details like serial no, case no, locker no,
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |