SlideShare a Scribd company logo
Understanding
Memory in
Computing
Pravash Chandra Das
Digital Forensic Specialist
Disclaimer
:
This tutorial is for educational purposes only,
showcasing digital forensics principles.
Ensure legal compliance, ethical use and
obtain proper authorization before applying
these techniques. The creator is not
responsible for any misuse or legal
consequences resulting from the information
provided. Always handle digital evidence with
care to prevent data loss.
Introduction
Memory in the context of
computing generally refers to
storage, where data and
programs are stored for the
computer to access.
Types of Memory
There are different types of
memory in a computer
system. RAM, or Random
Access Memory, is volatile
and temporary. On the other
hand, storage devices like
hard drives and solid-state
drives are non-volatile and
retain data even when the
power is off.
File Deletion
When you delete a file from
storage, it is not immediately
erased. Instead, the
operating system marks the
space occupied by the file as
'available' or 'free,' allowing
it to be overwritten by new
data.
Recovery Tools
Until that space is
overwritten, the original data
may still be recoverable using
specialized tools. Forensic
tools like Foremost and
Autopsy are designed for this
purpose.
How Recovery Tools Work ?
These tools operate by
scanning the storage medium
for data that is not
associated with any file or
directory entry. They can
identify and reconstruct data
based on patterns and
structures, even if the file
system has removed the
reference to that data.
File Recovery Process
• Let's break down how file recovery works:
• - Deletion: When you delete a file, the OS
marks the space as available for new data.
• - File Recovery Tools: Tools like Foremost and
Autopsy search for data not linked to any file
system entries.
• - Data Reconstruction: The tools identify
patterns and structures in the data.
• - Overwriting Risk: If the space is overwritten
by new data, recovery becomes challenging.
Factors Affecting Recovery
The effectiveness of file
recovery depends on factors
like how much new data has
been written to the storage
device since the file was
deleted.
Enhancing Data Security
To enhance data security, consider
using secure deletion methods or
encryption tools when disposing of
sensitive information permanently.
Some file systems may also have
features like 'trim' or 'secure erase'
to help securely delete data.
Conclusion
In conclusion, understanding
how memory works and the
risks associated with file
deletion is crucial for
maintaining data security in
computing

More Related Content

PDF
Data Backup and Recovery.pdf
PPT
Fs Ch 18
PPT
System Calls and Components of OS . ppt
PPTX
3170725_Unit-4.pptx
PPTX
Data backup and disaster recovery
PPTX
File-Disk-and-System-Management-Tool.pptx
DOCX
Data recovery report
PPTX
Storage management in operating system
Data Backup and Recovery.pdf
Fs Ch 18
System Calls and Components of OS . ppt
3170725_Unit-4.pptx
Data backup and disaster recovery
File-Disk-and-System-Management-Tool.pptx
Data recovery report
Storage management in operating system

Similar to Understanding Memory in Computing part 1.pptx (20)

PDF
ResearchPaperITDF2435
PDF
computerforensics-140529094816-phpapp01 (1).pdf
PPTX
Computer forensics
PPTX
Presentation1
PPTX
installing and optimizing operating system software
PPTX
Operating zSYtemterfrom Presentationform
PPTX
2 opreating system
PDF
Chapter 8 system soft ware
PDF
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
PPTX
The purpose of operating systems 2
DOCX
Operating system
PPT
File Carving
PPTX
ppt of features of operating system.pptx
PDF
operating system structure
PPTX
File System Implementation & Linux Security
PDF
Database management systems notes for unit 1
PPT
Operating system structures
PPTX
DBS Theory Week 1 including relationships and relational database
PPT
Chapter 5 It Architecture
PPT
When disk utility fails to fix Mac OS X file system corruption issues
ResearchPaperITDF2435
computerforensics-140529094816-phpapp01 (1).pdf
Computer forensics
Presentation1
installing and optimizing operating system software
Operating zSYtemterfrom Presentationform
2 opreating system
Chapter 8 system soft ware
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
The purpose of operating systems 2
Operating system
File Carving
ppt of features of operating system.pptx
operating system structure
File System Implementation & Linux Security
Database management systems notes for unit 1
Operating system structures
DBS Theory Week 1 including relationships and relational database
Chapter 5 It Architecture
When disk utility fails to fix Mac OS X file system corruption issues
Ad

Recently uploaded (20)

PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
ai tools demonstartion for schools and inter college
PDF
System and Network Administraation Chapter 3
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
history of c programming in notes for students .pptx
PDF
AI in Product Development-omnex systems
PPTX
L1 - Introduction to python Backend.pptx
PDF
top salesforce developer skills in 2025.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
Reimagine Home Health with the Power of Agentic AI​
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Odoo POS Development Services by CandidRoot Solutions
ai tools demonstartion for schools and inter college
System and Network Administraation Chapter 3
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
history of c programming in notes for students .pptx
AI in Product Development-omnex systems
L1 - Introduction to python Backend.pptx
top salesforce developer skills in 2025.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Design an Analysis of Algorithms I-SECS-1021-03
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
How to Choose the Right IT Partner for Your Business in Malaysia
Ad

Understanding Memory in Computing part 1.pptx

  • 1. Understanding Memory in Computing Pravash Chandra Das Digital Forensic Specialist
  • 2. Disclaimer : This tutorial is for educational purposes only, showcasing digital forensics principles. Ensure legal compliance, ethical use and obtain proper authorization before applying these techniques. The creator is not responsible for any misuse or legal consequences resulting from the information provided. Always handle digital evidence with care to prevent data loss.
  • 3. Introduction Memory in the context of computing generally refers to storage, where data and programs are stored for the computer to access.
  • 4. Types of Memory There are different types of memory in a computer system. RAM, or Random Access Memory, is volatile and temporary. On the other hand, storage devices like hard drives and solid-state drives are non-volatile and retain data even when the power is off.
  • 5. File Deletion When you delete a file from storage, it is not immediately erased. Instead, the operating system marks the space occupied by the file as 'available' or 'free,' allowing it to be overwritten by new data.
  • 6. Recovery Tools Until that space is overwritten, the original data may still be recoverable using specialized tools. Forensic tools like Foremost and Autopsy are designed for this purpose.
  • 7. How Recovery Tools Work ? These tools operate by scanning the storage medium for data that is not associated with any file or directory entry. They can identify and reconstruct data based on patterns and structures, even if the file system has removed the reference to that data.
  • 8. File Recovery Process • Let's break down how file recovery works: • - Deletion: When you delete a file, the OS marks the space as available for new data. • - File Recovery Tools: Tools like Foremost and Autopsy search for data not linked to any file system entries. • - Data Reconstruction: The tools identify patterns and structures in the data. • - Overwriting Risk: If the space is overwritten by new data, recovery becomes challenging.
  • 9. Factors Affecting Recovery The effectiveness of file recovery depends on factors like how much new data has been written to the storage device since the file was deleted.
  • 10. Enhancing Data Security To enhance data security, consider using secure deletion methods or encryption tools when disposing of sensitive information permanently. Some file systems may also have features like 'trim' or 'secure erase' to help securely delete data.
  • 11. Conclusion In conclusion, understanding how memory works and the risks associated with file deletion is crucial for maintaining data security in computing