A friend of mine said to me, she could fool those forensic tools easily by changing writing direction in text. I said to her: "Really?" is Sure...don ' t jump to conclusions too soon ... ". She showed me screenshots as below:1.She used Intella to does full index search:2. She searched "Sun" and "Taipei Hostel", and those characters definitely exist in above file, guess what? No any hits found ...Ok Intella failed to find those Chinese characters that actually exist. Let ' s try
Last week my friend brought me an evidence file duplicated from a Linux server, which distribution is CentOS 5.0 and the I 18n is ZH-TW. She wanna know whether there is any malware on this Linux server or not. Ok. Let's get to work. I Add this evidence and do evidence Process. Guess what??? EnCase could not recognize Chinese character folder Names/filenames, and those folder Names/filenames become Hier Oglyphics. I am very disappointed and don ' t kno
Embedded GUI ftk introduction (9)-run ftk on Android Simulator
Indicate the source and author's contact information during reprinting.ArticleSource: http://www.limodev.cn/blogContact information of the author: Li xianjing
The android simulator uses qemu to implement the arm virtual machine, which can simulate the real running environment to a large extent. The ftk
My friend she told me last week this ftk could not the "see" keywords in a plain the text files when doing index search. That ' s very interesting. I used to trust the search results of FTK, and I think there must is something wrong.I have the to does a test to see what's going on. A Plain text file named "Password.txt" is as below, and its code page is traditional Chinese Big5.It makes sense this both
I used to conduct raw search in EnCase V6, and I ' d like to see if EnCase V7 raw search could hits keywords inside compound Files or not. You won ' t believe It~search results are 0 but those keywords do exist inside compound files ... Let my show you my Test as below:Scenario:Compound files, one is a docx and the other is a xlsx. Keywords, one is "password", and the other is "password".1. Evidence process
Indicate the source and author's contact information during reprinting.Article Source: http://www.limodev.cn/blogAuthor contact: Li xianjing
Embedded GUI RT-THREAD/ftk 0.6 Release Notes
O add tab widgetO add file browser widgetO add opengles backendO Port to AndroidO Port to RT-ThreadO Port to winceO Port to iPhoneO more maintenance ation.O multi font size supported.O re-implement window animation.O Required Mace and memory optimization.O use gb231
Pyftk is the python binding of ftk, the Project address is located in the https://github.com/htbegin/pyftk.
* The version number of the pyftk is the same as that of the ftk. The current version is v0.6.* Pyftk currently supports Linux and has not been tested for Windows.* Pyftk is implemented using Python's ctypes module instead of C for extension.* The structure provided by pyftk is the same as that provi
Ftk memory usage and Optimization
1. Font
FtkThe size of the built-in font file is 4519756 bytes. If the system supports MMAP or norflash, this will not be a big problem, otherwise it will all be read into the memory, obviously this is unknownSmart. Fortunately, we usually do not need to display all characters, but only need several hundred or even dozens of characters. In this case, we can use tools/fontextract to regenerate the font file.The font
FRAMEWORK Functions
The framework function supports the ftk entity. It initializes the application, starts the main loop, and exits the main loop. It is indispensable for any ftk application, even if the application does not use any controls (of course this does not make sense), so we first introduce these functions.1. initialize ftk
Prototype: RetFtk_init (INT a
entire code one go, focusing on several entry created in the middle. Once created, you can bind it to the input method. The method is not difficult, just need to use Ftk_entry_set_input_method to set up a bit. The difference is the second parameter of the function, each of which is 0, 1. 2. What effect did it. Just can input Chinese character wubi, Chinese pinyin, English.Show it. In fact, and we usually use the Sogou input method effect is the same.Old rules Next show. Copyright notice: This a
number indicates that an event will occur within the specified time.
* Ftk_source_dispatch is used to process events. Each event source has its own processing function, which simplifies the implementation of the Program.
Currently, ftk uses the following event sources:
1. ftk_source_input (. c/. h)
In Linux, all input device files are in the/dev/input/directory, and the events are reported to the application using the consistent event structure (inpu
Indicate the source and author's contact information during reprinting.ArticleSource: http://www.limodev.cn/blogContact information of the author: Li xianjing
Considering that cross-compilation is just a waste of time, ftk provides a makefile to cross-compile ftk itself and its dependent software packages. In tools/cross-build/readme, the following describes how:
1. Copy cross. mk and env. Sh into the
FTK-0.5 release
Indicate the source and author's contact information during reprinting.ArticleSource: http://www.limodev.cn/blogAuthor contact: Li xianjing
FTK-0.5 release notes:
1. bug fix and optimization.2.widgets improvements: o entry supports tips. O label supports alignment. O listview supports marquee. O progressbar support text information.3.vnc supported.4.screen rotate.5.gettext suppor
A case on business secret the suspect took lots of photos and screenshots from BOM, RD papers ... We have to conduct a keyword search for find out what he/she had stolen. We ' re not going to spend time to "take a look" at all documents and pictures so we need to use OCR function to figure it O Ut. As you could see this FTK OCR options support file type like Pdf,jpg,tiff. etc.1.First we have a to check OCR function when processing evidence.2. Sorry I
Finally, we have the first official Demo:This is to run the svn ftk on RT-thread and use the mini2440 branch. In order to make it a qemu virtual machine, you can see the effect intuitively, after the download in Windows decompressed to a directory to run the run-rtthread-ftk.bat batch file can be, do not need the real development board.
This is internal. The OS runs RT-thread, the file system is started, and the network protocol stack is not opened,C
Indicate the source and author's contact information during reprinting.ArticleSource: http://www.limodev.cn/blogAuthor contact: Li xianjing
Although ftk supports window animation for a long time, as an animation implementer, I have to admit that the animation implementation before ftk version 0.6 is very poor. The main reasons are as follows:
1. The animation speed is a single uniform motion.2. The num
Indicate the source and author's contact information during reprinting.ArticleSource: http://www.limodev.cn/blogAuthor contact: Li xianjing
After the Spring Festival holiday efforts, FTK-0.3 released as scheduled, its main modifications are:
The ftkallocator interface is introduced for statistical analysis of memory usage.
Supports decoding non-compressed BMP images.
Supports Pinyin input.
Supports five input methods.
Impleme
Embedded GUI ftk supports Input Method
Indicate the source and author's contact information during reprinting.ArticleSource: http://www.limodev.cn/blogAuthor contact: Li xianjing
The ftk input method is supported during the Spring Festival. Currently, the Pinyin input method, five-stroke input method, and handwriting input method are supported. The handwriting input method is only implemented
[Disclaimer: All Rights Reserved. You are welcome to reprint it. Do not use it for commercial purposes. Contact Email: feixiaoxing @ 163.com]
Before starting the list topic today, let's take a look at the running effect of the icon.
The list
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.