{"id":35,"date":"2019-11-18T20:15:36","date_gmt":"2019-11-18T20:15:36","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=35"},"modified":"2019-12-08T12:22:51","modified_gmt":"2019-12-08T12:22:51","slug":"extracurricular","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/extracurricular\/","title":{"rendered":"Crime &amp; Computer Summary"},"content":{"rendered":"<h1><a href=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-218 alignright\" src=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1-300x169.png\" alt=\"\" width=\"295\" height=\"166\" srcset=\"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1-533x300.png 533w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic1.png 1920w\" sizes=\"(max-width: 295px) 100vw, 295px\" \/><\/a>Computer Investigations<\/h1>\n<p>Computer Investigations entails the examination of online and computer related crimes using computer tools, programming, and open source information.<\/p>\n<h1>Terms <a href=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-222\" src=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6-300x169.png\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6-300x169.png 300w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6-768x432.png 768w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6-533x300.png 533w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-7-Pic6.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/h1>\n<p>Computer Forensics: the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.<\/p>\n<p>Cryptography: \u00a0a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.<\/p>\n<p>Encryption: the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.<\/p>\n<p>Stenography: the practice of concealing messages or information within other non-secret text or data.<\/p>\n<p>Exif, or Exchangeable image file format, is a standard that specifies the formats for images, sound, and ancillary tags used by digital cameras, scanners and other systems handling image and sound files recorded by digital cameras.<\/p>\n<h1>Tools <a href=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-220\" src=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2-300x169.png\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2-300x169.png 300w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2-768x432.png 768w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2-533x300.png 533w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Lab-2-PGP-Keys-2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/h1>\n<p>Autopsy, the computer application, is a digital forensics platform and graphical interface to The Sleuth Kit\u00ae and other digital forensics tools. It is used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera&#8217;s memory card.<\/p>\n<p>Tor is a free and open-source software for enabling anonymous communication. Tor makes it more difficult to trace Internet activity to the user, making it useful for both cyber-criminals as well as cyber-crime investigators.<\/p>\n<p><a href=\"https:\/\/manytools.org\/hacker-tools\/steganography-encode-text-into-image\/\">Manytools<\/a>\/steganography is a website that allows people to both encode images with a message or even another image, as well as decode images as well.<\/p>\n<h1><a href=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-223\" src=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1-300x169.png\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1-533x300.png 533w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/Manny-Tools-1.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/h1>\n<p><a href=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-221\" src=\"http:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1-300x169.png\" alt=\"\" width=\"298\" height=\"168\" srcset=\"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1-533x300.png 533w, https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-content\/uploads\/sites\/17087\/2019\/12\/ePortfolio-pic-1.png 1920w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/a><\/p>\n<h1><\/h1>\n","protected":false},"excerpt":{"rendered":"<p>Computer Investigations Computer Investigations entails the examination of online and computer related crimes using computer tools, programming, and open source information. Terms Computer Forensics: the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Cryptography: [&hellip;]<\/p>\n","protected":false},"author":15713,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/pages\/35"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/users\/15713"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":224,"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/pages\/35\/revisions\/224"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/emmanuelnnawulezicrimeandcomputer\/wp-json\/wp\/v2\/media?parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}