Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt

May I have some guidance for a project I am working on?
These are the requirements:

A Dataset needs to be submitted in a .csv format, delimited by ‘|’
The Dataset needs to be submitted periodically (once per month)
There are ID columns in… Continue reading Assure Deterministic Hashing/Encryption Process can be Replicated if Rebuilt

Are there better methods of sustaining forensic integrity apart from disk hashing?

As far as I’ve heard, hashing a disk image before computer forensics is started, and then comparing that hash to a new hash after the forensics is finished is the most common way to make sure that there is no tampering with the disk during… Continue reading Are there better methods of sustaining forensic integrity apart from disk hashing?