authorize 2. View all uploaded documents 3. scan all Droids(Malwares) and Normal documents and alert to corresponding end users about malware details 4. List all Droid(Malwares) affected files and its ratio in total files 5. View all data integrity attackers with date and time 6. List all all transactions End User 7. Block the users those who spread droid (Malwares). 8. View all no. Of droid(Malwares) files and normal files in chart ()
1. Register and Login
2. Add all Documents with digital sign 3. Verify data integrity and recover 3. View and share all documents to other users and categorize droid (Malwares) effected files 4. Search for documents based on contents’ keyword and display all related documents after scanning droid files and download the file
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems