Fig 3 - uploaded by Firdous Kausar
Content may be subject to copyright.
Network key and related key values

Network key and related key values

Source publication
Conference Paper
Full-text available
Free Download Manager (FDM) is one of the most popular download managers due to its free availability, high download speed and versatility. It contains a lot of information that is of potential evidentiary value even if a user deletes web browser history, cookies and temporary internet files. This software records download activities across multipl...

Contexts in source publication

Context 1
... a user configures proxy settings manually, these settings are recorded under the 'Network' key as shown in Figure 3. Figure 3 illustrates the proxy address, port address, username and password for FTP, HTTP and HTTPS protocols. ...
Context 2
... a user configures proxy settings manually, these settings are recorded under the 'Network' key as shown in Figure 3. Figure 3 illustrates the proxy address, port address, username and password for FTP, HTTP and HTTPS protocols. Proxy address and port number are concatenated under the 'xxxxProxy_Name' key value where 'xxxx' can be any protocol specified by the proxy. ...

Citations

... FDM main features are upload manager, site explorer, and HTML spider. Site explorer displays the structure of a web to download files that are needed and the user can fully download the files contained therein [6]. Site explorer capabilities that are used is to move the download process from the browser automatically to the download accelerator. ...
Article
Full-text available
Remote sensing data usually collected by direct acquisition using ground station. But, limitations on acquisition often leads to missing data (especially the old data). United States Geological Survey (USGS), as one of scientific agency and Landsat remote sensing satellite operator, provides access for users to their old to recent remote sensing data. USGS also provides tools to help user to download their data in large or small quantities, but the tools have limitations. The most noticeable limitations are error when downloading and low download speed. At the same time, access and download data in large quantities without tools would takes a lot of time and effort. Hence, an engine to overcome those limitations needs to be developed. By using this engine, users are expected to be able download remote sensing data in large/small quantities automatically, with higher download speed, and less error or corrupt data.
... In contrast to other instant messengers [1, 17, 18] and download managers [19, 20, 21], the Windows registry does not maintain the history of Digsby activities such as instant messages, email messages, and activities performed on social networks. The only information maintained by the Windows registry is the execution path, uninstall location, search bar, and recent usage status of Digsby. ...
Article
Since the inception of Web 2.0, instant messaging, e-mailing, and social networking have emerged as cheap and efficient means of communication over the Web. As a result, a number of communication platforms like Digsby have been developed by various research groups to facilitate access to multiple e-mail, instant messaging, and social networking sites using a single credential. Although such platforms are advantageous for end-users, they present new challenges to digital forensic examiners because of their illegitimate use by anti-social elements. To identify digital artifacts from Digsby log data, an examiner is assumed to have knowledge of the whereabouts of Digsby traces before starting an investigation process. This paper proposes a design for a user-friendly GUI-based forensic tool, DigLA, which provides a unified platform for analyzing Digsby log data at different levels of granularity. DigLA is also equipped with password decryption methods for both machine-specific and portable installation versions of Digsby. By considering Windows registry and Digsby log files as dynamic sources of evidence, specifically when Digsby has been used to commit a cyber crime, this paper presents a systematic approach to analyzing Digsby log data. It also presents an approach to analyzing RAM and swap files to collect relevant traces, specifically the login credentials of Digsby and IM users. An expected insider attack from a server security perspective is also studied and discussed in this paper.
... Along with all these characteristics, IDM software does not provide checksum verification (Internet Download Manager, 2010). This analysis follows on from the preceding research that examined the forensic artefacts left behind by Download Accelerator Plus (Yasin et al., 2009a) and Free Download Manager (Yasin et al., 2009b). The examination carried out in this paper accentuates the footprints of IDM. ...
Article
Internet Download Manager (IDM) provides accelerated download speed and flexibility in features. Its attractiveness lies behind video content processing and automatic handling of downloads. This paper analyzes IDM activities recorded across multiple files that includes Windows Registry, history and log files from artefacts collection view point. The tools and techniques used for extracting evidence are also elaborated. In case of download managers, the foremost concerns are installation location, download path, downloaded file, URL address, login credentials for password protected websites, date and time the activity was performed. This enables digital forensic investigators to envisage and deduce suspicious activities.
Conference Paper
There is an increasing interest in finding artifacts (digital evidence) created by various software tools. flareGet is an advanced multi-threaded and multi-segment download manager for Linux. This is the only download manager for Linux that integrates with almost all the browsers. In this paper, we examine (from a digital forensics angle) the artifacts created by flareGet for Linux, specifically on Ubuntu 12.04 distribution. The flareGet artifacts include download path, URL address, settings of flareGet, date and time of the activity performed, the encryption technique used by flareGet, etc. This is useful for the digital forensic investigator to search and interpret the artifacts created or left in the process of using flareGet. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014.
Article
Digsby is a versatile nature application, which can be used for instant messaging, emailing and at the same time providing an opportunity to end users to communicate over online social networks. Due to providing versatile services and facilities, the usage of Digsby by end users has diverted the attention of intelligence agencies to look into its log data from digital forensics examination point of view. In this paper, we follow a current conventional approach to analyze Digsby log data, which considers Windows registry and directory files as a vital source of evidence related to cyber crimes, specifically in case of Digsby usage. We have also analyzed the password encryption method used by the Digsby developers and discussed the expected insider attack. In addition, we have developed an application to assist analysts in decrypting Digsby user password.