Candid Tech Talk With... © May 2006 Monthly Tech Tip IT Professionals Providing Business Solutions Issue 9 Hold down the Ctrl key on your key board and turn the wheel on your mouse, either towards you or away from you. The print size will change, the print will get larger or smaller depending on which way you turn the wheel. -Pete Keenan Computer Forensics: File Signature Analysis What’s in a name? A person pretending to be someone they are not will often use a fake signature—or a forgery. In a similar way, data in files can be hidden by changing the file name to make the data in the file appear to be something it is not. For example, if there was an inventor that wanted to keep an AutoCAD design document hidden, she may decide to use the document’s filename to hide the contents. All AutoCAD documents end in the file suffix .dwg. The .dwg suffix on the end of the filename is used by Windows to automatically start AutoCAD when a file ending in .dwg is selected. If the inventor did not want someone to know the file was an AutoCAD document, instead of naming the AutoCAD file invention.dwg, that person may decide to name it BdayWishList.doc. Not only has the main filename been changed, but also the suffix. The intent is to try to make the AutoCAD invention drawing look like a birthday wish list written in Microsoft Word. By changing the filename, it does not change the contents of the file, only how it appears from the outside. In this example, the inventor had good reason to mask the contents of the file. It may contain valuable information someone else would want to get their hands on. Someone with malicious intent could also employ a similar scheme to hide the contents of data files. It appears to be a simple, yet foolproof way for someone to cover their tracks. But not so fast! There is much more information stored in a data file than just a filename. Every file also has what is called a “file signature”. The file signature is a unique sequence of bytes inside a file that indicate what type of data is stored in the file. The signature is created by the program being used, in this case AutoCAD. The typical user has no way to access this information and most users know nothing about “file signatures.” When a forensic investigator begins a new investigation, one of the first searches completed is typically a “file signature” verification. This is a program that is run to scan the entire contents of a hard drive and verify that all files on the hard drive actually contain what the filenames indicate they contain. For example, all Word documents should end in .doc. If a mismatch is found, the name is reported to the investigator for further analysis. Similar methods can be used to detect any file type that has been misnamed. It’s a quick technique that can be used to easily determine what’s behind a filename. General Announcements from Keilman Business Consulting: A new place to call home. We have moved our offices and are now located in downtown South Bend on the third floor of the Anderson, Agostino and Keller property immediately south of Tippecanoe Place. Our group has been in need of more space and we were lucky enough to find some in a beautifully maintained building. Mike Anderson, Pete Agostino and Scott Keller have made the transition a smooth one and have been very generous in helping us furnish our larger and very empty offices. Please continue to use our PO Box for all business correspondence. Our official mailing address is Keilman Business Consulting, Inc. PO Box 10002 South Bend, IN 46680 Finally, we wanted to express very warm appreciation to our friends at Eaton Corporation for providing us with office space for the last few years. -Steve Keilman Upcoming newsletter topics: June: Corporate policies- what can you do to secure your network? It may not necessarily be an employee who steals intellectual property from your PCs or network- it could be a complete stranger. Shut off USB ports, install read-only CDROMs and DVD’s, eliminate floppy drives and save data to a server (rather than locally). July: Summer is here! Here’s an introduction to some of the hottest technologies for Forensics, Networking, and Programming. All of the new gadgets are there for enhancing productivity and security, while not breaking the bank. Aug: The new version of Microsoft Windows, called Vista is due to be released late 2006/early 2007. Decisions can be made today to incorporate that technology into your business tomorrow. Current events in the IT world: Desperate for good things to watch online? Disney to the rescue! Entire episodes of Desperate Housewives is able to be downloaded from ABC.com, the Disney-owned television network. This new way of distributing television shows provides yet another opportunity to increase advertising revenue. (http://news.bbc.co.uk/2/hi/business/4897742.stm) AT&T and Comcast competitors? You bet! Both are trying to provide bundled services including telephone, television programming and Internet Access. They are each targeting specific geographic areas with the intent of making these services generally available. (http://news.zdnet.com/2100-1035_22-6066038.html) Microsoft has delayed releasing the next version of Windows until late 2006 for businesses and early 2007 for consumers. If released by 2007, it will have been six years since Windows XP was released—the longest period between versions of Windows. With PC hardware and software vendors weathering difficult times, the new release of Windows will bring a welcome boost to these businesses. (Wall Street Journal, March 22, 2006) If you would prefer to receive this publication on-line or if you would like to be taken off our mailing list, please email us at info@keilman.com. We will always keep your personal information confidential. PO Box 10002 South Bend, IN 46680 «AddressBlock»