Forensics Journal - Stevenson University 2014 | Page 11

STEVENSON UNIVERSITY collected in accordance with various ethical procedures. These ethical procedures protect examiners and recovered evidence against any form of corruption. Evidence can include any details such as passwords, filenames, personal identifiable information in memory, and even running programs and files. In the case of 3D and 2D print technology, this will include printers as the connected media. information from a printer can identify the device by its Uniform Resource Locator (URL), embedded by manufacturers within a small microchip, which serves to monitor ink or toner supply (Hoekstra). VULNERABILITIES AND LIMITATIONS PRINTER FORENSICS Unfortunately, printer technology has vulnerabilities and limitations like other technological devices. In general, a maj