Most of these attempts were aimed at a study of chaotic systems defined by differential equations, but a few attempts were made also at evolutionary design of initial conditions or rules of cellular automata aimed at performing a specified task. In recent years there have been numerous attempts to control chaotic behavior by evolutionary optimization. Other details of this research are shown in the results and discussion section. Findings showed that students who come from cities (towns) had higher symptoms of Internet addiction than villagers. Finally, significant results were related to residence. Other questions focused on neuroticism - emotional stability, where more neurotic students were more addicted than less neurotic students. According to Zamani, extroverts prefer social and face-to-face interaction with others (Zamani et al., 2011). Some other significant results show that more extroverted students are less Internet-addicted than their less extroverted counterparts. The research results show that female have more potential to become addicted than male, which could be caused by feelings and sadness (Ha & Hwang., 2014). We collected data by means of an online questionnaire over the period of more than six months. The standardized questionnaire was used in all regions of Slovakia. to detect significant differences between the following: a personality trait – addiction, addiction – age, addiction – a place of residence, etc. The aim of the research was to determine the symptoms of Internet addiction in Slovak secondary school students, i.e.
PRIVAZER VS FORENSICS FREE
ICT-related free time activities of the young generation have notably changed over the last decade (Slovakia was connected to the Internet in November 1992). Information and communication technology (ICT) has a major influence not only on individual sectors of the national economy (services, industry, agriculture, etc.), but also on free time activities and interests of the young generation. Finally, this study makes many recommendations, highlights the limitations of the work and points out the future scope.Ī new phenomenon, which increasingly rises among the young generation all over the world, is Internet addiction.
PRIVAZER VS FORENSICS WINDOWS
We also found that the contents of resident and non-resident alternate data streams, $LogFile and $UsnJrnl files, and Windows Registry keys are not wiped by these tools. Also, $LogFile and $UsnJrnl files of NTFS file system, and Windows Registry keys provide detailed evidence of wiping tools used and the files wiped by them. The results suggest that FAT32 and exFAT file system directory structures and $MFT entries of NTFS file system can confirm the use of wiping tools, identify these tools and provide the remnants of the wiped files.
PRIVAZER VS FORENSICS PC
Our experiments used four file-wiping tools (SecureDelete v1.0, Secure Eraser v5.2, PC Shredder v1.1, and Blank and Secure v5.88) to wipe files on three Windows file systems (FAT32, exFAT and NTFS). To achieve this goal, we analyzed the changes made by these tools to metadata structures of Windows file systems during file wiping. The goal is to identify and extract the evidence of the tools used to wipe files and the files wiped by them on the Windows operating system. This paper presents forensic analysis of anti-forensic file-wiping tools on the Windows platform.