This article shows the use of the iPhone as a case study in order to provide information security device on iOS.
.Method of IOS cover that can be used to prevent the disclosure of information of the content currently not covered by IOS of password / activation password.4 main or alphanumeric passwords in equipment iOS is less in the prevention of user data in the device.The information concealment and remove our technique can be used in data security. (including information about equipment iOS risk of defects in the screen).The technique of iOS can be used to enhance data protection mechanism Apple to protect the data stored iOS equipments.It also shows that the insertion of external file in the file system structure as possible and disable file system are important in the process of law. It is also important to note that when inserting the contents of the file in the device.One must pay attention to the data file and editing is necessary to reduce the risk of such activity is detected during the forensic investigation.In this research, including the future improvement secrets and techniques to remove the better work, such as the deletion, modification, The per file,To check how to manage the structure of the device, without setting device iOS เข้าสู่โหมด recovery.
.
การแปล กรุณารอสักครู่..
