Question

Is there a value to a potential suspect using an obscure or unknown operating system? Similarly,...

Is there a value to a potential suspect using an obscure or unknown operating system? Similarly, is there value in using data hiding techniques like log removal, private browsing, clearing Web caches, etc? What is the value, if any? If there isn't value, why not?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

If the potential suspect is careful enough, he can use any OS, and he will be undetected. As long as he is not accused, the state of the operating system does not influence his being identified. However, once under the radar, given ideal computational power and skills, every system can be broken down by identifying loopholes, albeit the time required may increase owing to the unfamiliarity of the system. This is true for the victims also. The unfamiliarity of the OS does increase complexity for the concerned party but does not make it an impossible detection task.

There is little value in clearing Web Caches and log removal etc., as most "data hiding" by simply performing a cleanup of residual temp files, cache folders and logs just hide them from your eyes but do not delete them entirely. Even though the folder is gone from the direct view of unwanted people, but the documents still exist and can easily be found with a bit of extra effort. Your browsing history is made up of various items, such as site URLs, cookies, cache files, download lists, search history and so on. The type of files we need to focus on now is the cache files, because they are easy to recover and once recovered, they can reveal unauthorized parties basically everything about your Internet activities. Now, cache actually speeds up your browsing, but clearing it may solve other issues of web sites not loading properly. In principle, deleting anything in an OS, for example, MS Windows does nothing but remove its reference from the directories, and the actual info is still there, disguised as "free space" to be overwritten by new files. Shredding the files may solve this problem, but is not usually performed by every user and may require special software.

Add a comment
Know the answer?
Add Answer to:
Is there a value to a potential suspect using an obscure or unknown operating system? Similarly,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Create a working proof of concept of one of the following applications which meets all of...

    Create a working proof of concept of one of the following applications which meets all of the minimum requirements. The application may be written in any programming language(s). The application should be sent with the following: ● All of the source code required for building ● A completed binary of the application (if applicable) ● Any required database files (if applicable) Each application requires a README. Please ensure the README includes the following components: ● Which application you choose to...

  • The goal of this homework is to write a small database system for an Animal Shelter....

    The goal of this homework is to write a small database system for an Animal Shelter. This is a no-kill shelter like the one just west of the Addition Airport. You will accept animal “donations” to the shelter, but mostly only dogs and cats. (But yes, there may be the occasional hamster or other nondog, non-cat animal donation.) At present, all we need to do is write the skeleton of a database that will track all the animals in the...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Case 2: Facebook and Google Privacy: What Privacy? In a 2010 interview, Mark Zuckerberg, the founder...

    Case 2: Facebook and Google Privacy: What Privacy? In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms had changed and people were no longer worried about sharing their personal information with friends, friends of friends, or even the entire Web. This view is in accordance with Facebook’s broader goal, which is, according to Zuckerberg, to make the world a more open and...

  • Program 2 #include #include using namespace std; int main() { int total = 0; int num...

    Program 2 #include #include using namespace std; int main() { int total = 0; int num = 0; ifstream inputFile; inputFile.open("inFile.txt"); while(!inputFile.eof()) { // until we have reached the end of the file inputFile >> num; total += num; } inputFile.close(); cout << "The total value is " << total << "." << endl; Lab Questions: We should start by activating IO-exceptions. Do so using the same method in Step 3 of the Program 1 assignment above, except that instead...

  • 2. If two different compounds have the same Rr value, how might they be identified using paper chromatography?...

    2. If two different compounds have the same Rr value, how might they be identified using paper chromatography? 3. Why is it important to keep the spots on the paper as small as possible? 4. If the solvent pool at the bottom of the beaker touched the spots on the 1.5cm line, what would happen to the spots? How would you address this error? 5. If you were teaching a student how to do paper chromatography, what three pieces of...

  • please help me with this in C# language. Constructors The goal for this exercise is to...

    please help me with this in C# language. Constructors The goal for this exercise is to understand what constructors are, how to define them, and how to call them, including ‘default’ constructors, and including the use of overloading to provide multiple constructors. One of the advantages of having a clear separation between the public interface of an object and private internal implementation of an object is that once you've got the data in the object you can then ask the...

  • Simple test in text: int main() { Deque dq1; cout << dq1.empty() << " - 1"...

    Simple test in text: int main() { Deque dq1; cout << dq1.empty() << " - 1" << endl; dq1.insertFront(42); dq1.insertBack(216); cout << dq1.peekFront() << " - 42" << endl; cout << dq1.peekBack() << " - 216" << endl; cout << dq1.size() << " - 2" << endl; Deque dq2(dq1); Deque dq3; dq3 = dq1; cout << dq1.removeFront() << " - 42" << endl; cout << dq1.removeBack() << " - 216" << endl; cout << dq2.peekFront() << " - 42" <<...

  • Objective: Write a program that implements the Game of Life cellular automata system invented by John...

    Objective: Write a program that implements the Game of Life cellular automata system invented by John Conway. 1. Create two game grids of size at least 50x50. These grid cells can be either Boolean or integer. In the following, I’ll refer to these as gridOne and gridTwo. 2. Set all cells in both grids to false. 3. Start by initializing gridOne. Allow the user to specify two different ways of initializing the grid: 1) by specifying a pattern file to...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT