Working With Windows And CLI Systems – Essay Example

The paper “Working With Windows And CLI Systems” is an excellent example of an essay on information technology.
A BitLocker is a feature of full disk encryption; that is included in the Windows Vista and Windows 7, both Ultimate and Enterprise, Windows 8, Windows 8.1 and Windows Server 2008. It is a new security technology, whose aim is to provide for greater data security by providing encryption of the hard disk. This helps protect data on PC when the machine falls in unauthorized persons. It encrypts the entire Windows volume, thus preventing unauthorized users from accessing data by breaking the Windows file and system protections, or either attempting the offline viewing of information on a secured device.
The BitLocker technology has to a large extent posed a great challenge to the forensic investigations. This is the identification and collection of information is difficult when the operating system is encrypted. The forensic investigators have therefore resulted in using software forensics to identify, collect, preserve, analyze and present evidence. The US authorities have also ordered Microsoft to allow them to circumvent the BitLocker technology (FutureTech & Park, 2012).
Windows operating systems have a core component called the Windows Registry. The Registry maintains a considerable amount of configuration information about the system. Additionally, it maintains the historical information about user activity so as to provide the user with a more personalized experience. The registry is useful in the forensic investigation, especially when attempting to establish a timeline of activity on a system. The information in the Registry is very resourceful in the forensic analysis (Carvey, 2011).
EnCase is an example of a tool used to investigate the windows operating system. It is a commercial software package enabling the investigator to examine data from hard disks and some PDAs. Another tool used is SafeBack. It is used primarily to image hard disks and restore the images to other hard disks (EC-Council, 2010).
In conclusion, forensic investigators have to embrace the available technology to get evidence from the hard discs of suspected computers. The BitLocker technology should not be a hindrance.