Evaluation of registry data removal by shredder programs

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Shredder programs attempt to overcome Window's inherent inability to erase data completely. A shredder is useful when one needs to transfer ownership or dispose of a computer, but it can be exploited by a suspect for the purpose of wiping incriminating evidence. Most shredder programs claim to remove all traces of data. This paper examines these claims by conducting forensic examinations of computers on which shredder programs were used. © 2008 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Velupillai, H., & Mokhonoana, P. (2008). Evaluation of registry data removal by shredder programs. IFIP International Federation for Information Processing, 285, 51–58. https://doi.org/10.1007/978-0-387-84927-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free