O'Reilly logo

Steal This Computer Book 4.0, 4th Edition by Wallace Wang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 22. Computer Forensics: The Art of Deleting and Retrieving Data

I believe that people would be alive today if there were a death penalty.

NANCY REAGAN

Like most criminals, hackers often bring about their own downfall by failing to remove all traces of their crime. Not only do many hackers leave incriminating notes and printouts of their latest exploits scattered around, but they also can’t resist bragging about their exploits in public chat rooms. Yet even this blatant indiscretion wouldn’t be so damaging if these same hackers didn’t unwittingly leave incriminating evidence stored all over their own computers too.

Recovering Deleted Data

The biggest difference between electronic data and traditional data is that once you store electronic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required