![]() ![]() A report can be generated easily with the "generate report"-button. In this example the original filename of Shareaza was "Email-Client.exe" because of the deep-scan option the exe-file was scanned, an md5-hash compared with the internal database and a match was found. The results are shown in the results-window. Additionally a P2P-application was found which matches predefined search-criteria but has no entry in the database as it is either unknown or a new version. In this example 4 P2P-applications, 1 usenet-client (both database-verified) were found. The mechanisms for accomplishing this with the most common clients as of the time of writing are as listed here. During the scanning-process the currently processed directory is displayed below the results-window.Īfter scanning is completed an overview of found applications is given as shown below. The two primary goals of peer-to-peer forensics are to identify files that the suspect downloaded and to identify files that the suspect shared with others. *.exe, *.jar, *.dll) and compared with the internal database.Īfter pushing the "start examination"-button the scanning-process starts. If "Deep Scan" is selected an MD5-hash is calculated for all known extensions of P2P-programs (e.g. In this example the "Program Files"-folder was chosen. Can someone please let me know if Shareaza can start a download in one place, autoconnect/autostart at a windows start up in another place For example, someone starts a download for a movie or song at a Dunkin Donuts, it does not finish. The next step is to tell PeerLab where to search for applications. Questions about Shareaza P2P and timestamps. You can now enter case-specific information which will also be used in generated reports. In order to use the scanner a case has to be created by using the "Create Case"-button. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |