Podcast
Questions and Answers
What is the most effective way to avoid leaving evidence of activity?
What is the most effective way to avoid leaving evidence of activity?
What is the importance of encryption in removing evidence of activity?
What is the importance of encryption in removing evidence of activity?
What is the advantage of running the OS from a removable drive?
What is the advantage of running the OS from a removable drive?
What is the promise of using a virtual machine?
What is the promise of using a virtual machine?
Signup and view all the answers
What is the benefit of using portable apps?
What is the benefit of using portable apps?
Signup and view all the answers
What can be used if none of the previous methods were used?
What can be used if none of the previous methods were used?
Signup and view all the answers
What is the availability of CCleaner?
What is the availability of CCleaner?
Signup and view all the answers
What is the availability of BleachBit?
What is the availability of BleachBit?
Signup and view all the answers
Why is it important to avoid creating data in the first place?
Why is it important to avoid creating data in the first place?
Signup and view all the answers
What is the purpose of securely wiping the VM?
What is the purpose of securely wiping the VM?
Signup and view all the answers
A forensic expert can always recover deleted data from a computer.
A forensic expert can always recover deleted data from a computer.
Signup and view all the answers
Encryption can make data unrecoverable even if it is found.
Encryption can make data unrecoverable even if it is found.
Signup and view all the answers
Running the OS from a removable drive can completely eliminate evidence of activity.
Running the OS from a removable drive can completely eliminate evidence of activity.
Signup and view all the answers
Using a virtual machine can completely delete all files created by the registry.
Using a virtual machine can completely delete all files created by the registry.
Signup and view all the answers
CCleaner is only available on Windows.
CCleaner is only available on Windows.
Signup and view all the answers
BleachBit is available on all operating systems.
BleachBit is available on all operating systems.
Signup and view all the answers
Portable apps can make it impossible to retrieve data.
Portable apps can make it impossible to retrieve data.
Signup and view all the answers
CCleaner and BleachBit can be used to securely wipe data.
CCleaner and BleachBit can be used to securely wipe data.
Signup and view all the answers
Running the OS from a removable drive can make data retrieval easier.
Running the OS from a removable drive can make data retrieval easier.
Signup and view all the answers
Using encryption can make data readable without the encryption key.
Using encryption can make data readable without the encryption key.
Signup and view all the answers
Using a virtual machine can make it impossible to retrieve data.
Using a virtual machine can make it impossible to retrieve data.
Signup and view all the answers
CCleaner is only available on Windows and Linux.
CCleaner is only available on Windows and Linux.
Signup and view all the answers
A forensic expert will always find some data left behind.
A forensic expert will always find some data left behind.
Signup and view all the answers
BleachBit is only available on Windows.
BleachBit is only available on Windows.
Signup and view all the answers
Running the OS from a removable drive can eliminate all evidence of activity.
Running the OS from a removable drive can eliminate all evidence of activity.
Signup and view all the answers
Encryption can make data readable without the encryption key.
Encryption can make data readable without the encryption key.
Signup and view all the answers
Avoiding creating data in the first place is the most effective way to remove evidence of activity.
Avoiding creating data in the first place is the most effective way to remove evidence of activity.
Signup and view all the answers
CCleaner and BleachBit can be used to securely wipe data.
CCleaner and BleachBit can be used to securely wipe data.
Signup and view all the answers
Using portable apps can make it impossible to retrieve data.
Using portable apps can make it impossible to retrieve data.
Signup and view all the answers
Encryption can make data unrecoverable even if it is found.
Encryption can make data unrecoverable even if it is found.
Signup and view all the answers
Avoiding creating data in the ______ place is the most effective way to remove evidence of activity.
Avoiding creating data in the ______ place is the most effective way to remove evidence of activity.
Signup and view all the answers
A forensic expert will always find some data left behind either on ______ or in the operating system registry.
A forensic expert will always find some data left behind either on ______ or in the operating system registry.
Signup and view all the answers
Using ______ can make retrieving the data much more difficult.
Using ______ can make retrieving the data much more difficult.
Signup and view all the answers
The third option is running the OS from a ______ drive.
The third option is running the OS from a ______ drive.
Signup and view all the answers
Using ______ can make data unrecoverable even if it is found.
Using ______ can make data unrecoverable even if it is found.
Signup and view all the answers
We can use programs like ______ if none of the previous methods were used.
We can use programs like ______ if none of the previous methods were used.
Signup and view all the answers
BleachBit is available on ______ and Linux.
BleachBit is available on ______ and Linux.
Signup and view all the answers
The promise of using a ______ machine is that we can delete the VM with all the data after we are done with our work.
The promise of using a ______ machine is that we can delete the VM with all the data after we are done with our work.
Signup and view all the answers
CCleaner is available on ______, Mac, and Linux.
CCleaner is available on ______, Mac, and Linux.
Signup and view all the answers
Running the OS from a ______ drive can make retrieving the data much more difficult.
Running the OS from a ______ drive can make retrieving the data much more difficult.
Signup and view all the answers