Gimp is a free alternative to this more commonly known photo editor.
What is Photoshop
100
This device may be used while imaging a hard drive or other storage device to prevent the operating system from making changes to the storage device.
What is a write-blocker.
100
In reference to old western movies, good and bad hackers are often referred to by the color of this.
What is a hat
100
Most web browsers save the contents of web pages and images viewed in a set of folder known as this
What is a cache
200
Gimp is an example of this type of community-developed software where the code is freely available for download.
What is open-sourced
200
This portion of a computer’s information storage typically must be imaged on site as its contents will disappear shortly after power is removed
What is RAM
200
This type of password attack involves trying passwords from a list of words
What is a dictionary attack
200
This part of the computer stores information permanently and is of primary interest to forensic investigators
What is a hard drive
300
This layer is required for allowing the background of objects to be made clear.
What is alpha layer
300
Forensic examiners or creepy stalkers can often extract this information from your cell phone images you post online to find out where you are
What is GPS coordinates, geolocation
300
This recent piece of malware was speculated to have been designed to target Iran’s nuclear facility control systems
What is Stuxnet
300
Cell phones keep a log of the last several of these that can be used to track where the user has been
What are cellphone towers
400
Gimp is available as a free alternative because it is licensed under this license.
What is GNU license
400
This part of a file’s filename may indicate to the operating system what program it should open the file with, but is not necessarily tied to the file’s actual contents
What is an extension
400
The use of assumed identities, in-person interaction, and psychology to attack an organization is often called this
What is social engineering
400
This type of card inside many cell phones may contain text messages and contacts, often long after they have been deleted by the phone’s user
What is SIM card
500
This was Steve’s favorite tool in GIMP as acknowledged in the presentation.
What is UNDO
500
Network forensic investigators and examiners often track individuals actions across the internet by this kind of address
What is IP address
500
This kind of system, or site on the internet, can easily be used to bypass web filters, or to mask ones identity
What is a proxy
500
Attempting to acquire information such as usernames, passwords, and credit card by masquerading as a trustworthy entity