10,617 research outputs found

    Spartan Daily, November 6, 1989

    Get PDF
    Volume 93, Issue 45https://scholarworks.sjsu.edu/spartandaily/7905/thumbnail.jp

    Spartan Daily, March 31, 1987

    Get PDF
    Volume 88, Issue 44https://scholarworks.sjsu.edu/spartandaily/7570/thumbnail.jp

    Spartan Daily, March 8, 1991

    Get PDF
    Volume 96, Issue 28https://scholarworks.sjsu.edu/spartandaily/8096/thumbnail.jp

    FSOS: a tool for recommending suitable operating systems to computer users

    Get PDF
    © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Operating system is essential to operate computers. Normally, computers come with preloaded operating systems. However, often the preloaded operating systems are not able to fulfill all requirements of users. The users sometimes need to change the operating system based on their needs. Although some comparative studies and tools are available on operating systems, there is still a lack of tools that provide independent and objective review and recommendation to help the users understand and select from all major operating systems. This paper propose a tool called FSOS, which analyses well-known operating systems used at domestic, commercial and industrial level and suggest suitable operating systems to the users as per their requirements

    An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh

    Get PDF
    The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two most commonly used Windows-based computer forensics applications on a Macintosh running Windows XP in native mode and in two virtual environments relative to a similarly configured Dell personal computer. The research results are directly beneficial to practitioners, and the process illustrates effective pedagogy whereby students were engaged in applied research

    Spartan Daily, April 25, 1990

    Get PDF
    Volume 94, Issue 57https://scholarworks.sjsu.edu/spartandaily/7987/thumbnail.jp

    On web user tracking of browsing patterns for personalised advertising

    Get PDF
    This is an Accepted Manuscript of an article published by Taylor & Francis in International Journal of Parallel, Emergent and Distributed Systems on 19/02/2017, available online: http://www.tandfonline.com/doi/abs/10.1080/17445760.2017.1282480On today’s Web, users trade access to their private data for content and services. App and service providers want to know everything they can about their users, in order to improve their product experience. Also, advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting users’ actions and tastes to suggest a range of products to buy. Both service providers and advertisers try to track users’ behaviour across their product network. For application providers this means tracking users’ actions within their platform. For third-party services following users, means being able to track them across different websites and applications. It is well known how, while surfing the Web, users leave traces regarding their identity in the form of activity patterns and unstructured data. These data constitute what is called the user’s online footprint. We analyse how advertising networks build and collect users footprints and how the suggested advertising reacts to changes in the user behaviour.Peer ReviewedPostprint (author's final draft

    Testing Memory Forensics Tools for the Macintosh OS X Operating System

    Get PDF
    Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cyberattacks that leave little or no evidence in secondary storage. The forensic community has developed tools to acquire physical memory from Apple’s Macintosh computers, but they have not much been tested. This work tested three major OS X memory-acquisition tools. Although the tools could capture system memory accurately, the open-source tool OSXPmem appeared advantageous in size, reliability, and support for memory configurations and versions of the OS X operating system
    • …
    corecore