Kasun Balasooriya
Kasun Balasooriya
### The hash values of each file should be recorded to to prove the integrity during analyzing and processing. This can be run as a service if possible so that...
## Displaying - [ ] View modes (the windows view modes if possible)  - [ ] Preview of a file when hovering over (for images and text files )
The logs can be used when generating reports and to prove the data integrity of an investigation. Add logs wherever possible and applicable. eg: - Assigning a new investigator to...
Three user levels giving the administrator full rights and restrict access down the hierarchy to have proper control. The proposed model is as follows. _Please mark as done if this...
_The system should have the capability of capturing an image from a given device. To provide proof of the data integrity the hash values can be used._ 1. Devices which...
_Please check in the tasks if already exists or once completed._ - [ ] Case Number (unique) : Each case should have a unique case number for court issues. -...
Currently the username and passwords are stored as plain text in the database. (except in the first instance when the administrator is created). The passwords can hashed and salted. (a...