Free Essay

A History of Modern

In:

Submitted By baby100
Words 2076
Pages 9
Guide to Computer Forensics and Investigations Fourth Edition
Chapter 7 Current Computer Forensics Tools

Objectives
• Explain how to evaluate needs for computer forensics tools • Describe available computer forensics software tools • List some considerations for computer forensics hardware tools • Describe methods for validating and testing computer forensics tools

Guide to Computer Forensics and Investigations

2

Evaluating Computer Forensics Tool Needs
• Look for versatility, flexibility, and robustness
– – – – – OS File system Script capabilities Automated features Vendor’s reputation

• Keep in mind what application files you will be analyzing

Guide to Computer Forensics and Investigations

3

Types of Computer Forensics Tools
• Hardware forensic tools
– Range from single-purpose components to complete computer systems and servers

• Software forensic tools
– Types
• Command-line applications • GUI applications

– Commonly used to copy data from a suspect’s disk drive to an image file
Guide to Computer Forensics and Investigations 4

Tasks Performed by Computer Forensics Tools
• Five major categories:
– – – – – Acquisition Validation and discrimination Extraction Reconstruction Reporting

Guide to Computer Forensics and Investigations

5

Tasks Performed by Computer Forensics Tools (continued)
• Acquisition
– Making a copy of the original drive

• Acquisition subfunctions:
– – – – – – – Physical data copy Logical data copy Data acquisition format Command-line acquisition GUI acquisition Remote acquisition Verification
6

Guide to Computer Forensics and Investigations

Tasks Performed by Computer Forensics Tools (continued)
• Acquisition (continued)
– Two types of data-copying methods are used in software acquisitions:
• Physical copying of the entire drive • Logical copying of a disk partition

– The formats for disk acquisitions vary
• From raw data to vendor-specific proprietary compressed data

– You can view the contents of a raw image file with any hexadecimal editor
Guide to Computer Forensics and Investigations 7

Guide to Computer Forensics and Investigations

8

Tasks Performed by Computer Forensics Tools (continued)
• Acquisition (continued)
– Creating smaller segmented files is a typical feature in vendor acquisition tools – All computer forensics acquisition tools have a method for verification of the data-copying process
• That compares the original drive with the image

Guide to Computer Forensics and Investigations

9

Tasks Performed by Computer Forensics Tools (continued)
• Validation and discrimination
– Validation
• Ensuring the integrity of data being copied

– Discrimination of data
• Involves sorting and searching through all investigation data

Guide to Computer Forensics and Investigations

10

Tasks Performed by Computer Forensics Tools (continued)
• Validation and discrimination (continued)
– Subfunctions
• Hashing – CRC-32, MD5, Secure Hash Algorithms • Filtering – Based on hash value sets • Analyzing file headers – Discriminate files based on their types

– National Software Reference Library (NSRL) has compiled a list of known file hashes
• For a variety of OSs, applications, and images
Guide to Computer Forensics and Investigations 11

Tasks Performed by Computer Forensics Tools (continued)

Guide to Computer Forensics and Investigations

12

Tasks Performed by Computer Forensics Tools (continued)
• Validation and discrimination (continued)
– Many computer forensics programs include a list of common header values
• With this information, you can see whether a file extension is incorrect for the file type

– Most forensics tools can identify header values

Guide to Computer Forensics and Investigations

13

Guide to Computer Forensics and Investigations

14

Tasks Performed by Computer Forensics Tools (continued)

Guide to Computer Forensics and Investigations

15

Guide to Computer Forensics and Investigations

16

Tasks Performed by Computer Forensics Tools (continued)
• Extraction
– Recovery task in a computing investigation – Most demanding of all tasks to master – Recovering data is the first step in analyzing an investigation’s data

Guide to Computer Forensics and Investigations

17

Tasks Performed by Computer Forensics Tools (continued)
• Extraction (continued)
– Subfunctions
• • • • • • Data viewing Keyword searching Decompressing Carving Decrypting Bookmarking

– Keyword search speeds up analysis for investigators

Guide to Computer Forensics and Investigations

18

Guide to Computer Forensics and Investigations

19

Tasks Performed by Computer Forensics Tools (continued)

Guide to Computer Forensics and Investigations

20

Tasks Performed by Computer Forensics Tools (continued)
• Extraction (continued)
– From an investigation perspective, encrypted files and systems are a problem – Many password recovery tools have a feature for generating potential password lists
• For a password dictionary attack

– If a password dictionary attack fails, you can run a brute-force attack

Guide to Computer Forensics and Investigations

21

Tasks Performed by Computer Forensics Tools (continued)
• Reconstruction
– Re-create a suspect drive to show what happened during a crime or an incident – Subfunctions
• • • • Disk-to-disk copy Image-to-disk copy Partition-to-partition copy Image-to-partition copy

Guide to Computer Forensics and Investigations

22

Tasks Performed by Computer Forensics Tools (continued)
• Reconstruction (continued)
– Some tools that perform an image-to-disk copy:
• • • • • SafeBack SnapBack EnCase FTK Imager ProDiscover

Guide to Computer Forensics and Investigations

23

Tasks Performed by Computer Forensics Tools (continued)
• Reporting
– To complete a forensics disk analysis and examination, you need to create a report – Subfunctions
• Log reports • Report generator

– Use this information when producing a final report for your investigation

Guide to Computer Forensics and Investigations

24

Tool Comparisons

Guide to Computer Forensics and Investigations

25

Other Considerations for Tools
• Considerations
– – – – Flexibility Reliability Expandability Keep a library with older version of your tools

• Create a software library containing older versions of forensics utilities, OSs, and other programs

Guide to Computer Forensics and Investigations

26

Computer Forensics Software Tools
• The following sections explore some options for command-line and GUI tools in both Windows and UNIX/Linux

Guide to Computer Forensics and Investigations

27

Command-line Forensic Tools
• The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for IBM PC file systems • Norton DiskEdit
– One of the first MS-DOS tools used for computer investigations

• Advantage
– Command-line tools require few system resources
• Designed to run in minimal configurations

Guide to Computer Forensics and Investigations

28

UNIX/Linux Forensic Tools
• *nix platforms have long been the primary command-line OSs • SMART
– Designed to be installed on numerous Linux versions – Can analyze a variety of file systems with SMART – Many plug-in utilities are included with SMART – Another useful option in SMART is its hex viewer

Guide to Computer Forensics and Investigations

29

UNIX/Linux Forensic Tools (continued)
• Helix
– One of the easiest suites to begin with – You can load it on a live Windows system
• Loads as a bootable Linux OS from a cold boot

• Autopsy and SleuthKit
– Sleuth Kit is a Linux forensics tool – Autopsy is the GUI/browser interface used to access Sleuth Kit’s tools

Guide to Computer Forensics and Investigations

30

Guide to Computer Forensics and Investigations

31

UNIX/Linux Forensic Tools (continued)
• Knoppix-STD
– Knoppix Security Tools Distribution (STD)
• A collection of tools for configuring security measures, including computer and network forensics

– Knoppix-STD is forensically sound
• Doesn’t allow you to alter or damage the system you’re analyzing

– Knoppix-STD is a Linux bootable CD

Guide to Computer Forensics and Investigations

32

Guide to Computer Forensics and Investigations

33

Guide to Computer Forensics and Investigations

34

Other GUI Forensic Tools
• • • • Simplify computer forensics investigations Help training beginning investigators Most of them come into suites of tools Advantages
– Ease of use – Multitasking – No need for learning older OSs

Guide to Computer Forensics and Investigations

35

Other GUI Forensic Tools (continued)
• Disadvantages
– Excessive resource requirements – Produce inconsistent results – Create tool dependencies

Guide to Computer Forensics and Investigations

36

Computer Forensics Hardware Tools
• Technology changes rapidly • Hardware eventually fails
– Schedule equipment replacements

• When planning your budget consider:
– Failures – Consultant and vendor fees – Anticipate equipment replacement

Guide to Computer Forensics and Investigations

37

Forensic Workstations
• Carefully consider what you need • Categories
– Stationary – Portable – Lightweight

• Balance what you need and what your system can handle

Guide to Computer Forensics and Investigations

38

Forensic Workstations (continued)
• Police agency labs
– Need many options – Use several PC configurations

• Private corporation labs
– Handle only system types used in the organization

• Keep a hardware library in addition to your software library

Guide to Computer Forensics and Investigations

39

Forensic Workstations (continued)
• Not as difficult as it sounds • Advantages
– Customized to your needs – Save money

• Disadvantages
– Hard to find support for problems – Can become expensive if careless

• Also need to identify what you intend to analyze

Guide to Computer Forensics and Investigations

40

Forensic Workstations (continued)
• You can buy one from a vendor as an alternative • Examples
– F.R.E.D. – F.I.R.E. IDE

• Having vendor support can save you time and frustration when you have problems • Can mix and match components to get the capabilities you need for your forensic workstation

Guide to Computer Forensics and Investigations

41

Using a Write-Blocker
• Write-blocker
– Prevents data writes to a hard disk

• Software-enabled blockers
– Software write-blockers are OS dependant – Example: PDBlock from Digital Intelligence

• Hardware options
– Ideal for GUI forensic tools – Act as a bridge between the suspect drive and the forensic workstation

Guide to Computer Forensics and Investigations

42

Using a Write-Blocker (continued)
• Can navigate to the blocked drive with any application • Discards the written data
– For the OS the data copy is successful

• Connecting technologies
– FireWire – USB 2.0 – SCSI controllers

Guide to Computer Forensics and Investigations

43

Recommendations for a Forensic Workstation
• Determine where data acquisitions will take place • Data acquisition techniques
– USB 2.0 – FireWire

• Expansion devices requirements • Power supply with battery backup • Extra power and data cables

Guide to Computer Forensics and Investigations

44

Recommendations for a Forensic Workstation (continued)
• External FireWire and USB 2.0 ports • Assortment of drive adapter bridges • Ergonomic considerations
– Keyboard and mouse – A good video card with at least a 17-inch monitor

• High-end video card and monitor • If you have a limited budget, one option for outfitting your lab is to use high-end game PCs

Guide to Computer Forensics and Investigations

45

Validating and Testing Forensic Software
• Make sure the evidence you recover and analyze can be admitted in court • Test and validate your software to prevent damaging the evidence

Guide to Computer Forensics and Investigations

46

Using National Institute of Standards and Technology (NIST) Tools
• Computer Forensics Tool Testing (CFTT) program
– Manages research on computer forensics tools

• NIST has created criteria for testing computer forensics tools based on:
– Standard testing methods – ISO 17025 criteria for testing items that have no current standards – ISO 5725
Guide to Computer Forensics and Investigations 47

Using National Institute of Standards and Technology (NIST) Tools (continued)
• Your lab must meet the following criteria
– – – – – – Establish categories for computer forensics tools Identify computer forensics category requirements Develop test assertions Identify test cases Establish a test method Report test results

• Also evaluates drive-imaging tools using
– Forensic Software Testing Support Tools (FS-TST)
Guide to Computer Forensics and Investigations 48

Using National Institute of Standards and Technology (NIST) Tools (continued)
• National Software Reference Library (NSRL) project
– Collects all known hash values for commercial software applications and OS files
• Uses SHA-1 to generate a known set of digital signatures called the Reference Data Set (RDS)

– Helps filtering known information – Can use RDS to locate and identify known bad files

Guide to Computer Forensics and Investigations

49

Using Validation Protocols
• Always verify your results • Use at least two tools
– Retrieving and examination – Verification

• Understand how tools work • One way to compare results and verify a new tool is by using a disk editor
– Such as Hex Workshop or WinHex

Guide to Computer Forensics and Investigations

50

Using Validation Protocols (continued)
• Disk editors
– Do not have a flashy interface – Reliable tools – Can access raw data

• Computer Forensics Examination Protocol
– Perform the investigation with a GUI tool – Verify your results with a disk editor – Compare hash values obtained with both tools

Guide to Computer Forensics and Investigations

51

Using Validation Protocols (continued)
• Computer Forensics Tool Upgrade Protocol
– Test
• New releases • OS patches and upgrades

– If you find a problem, report it to forensics tool vendor
• Do not use the forensics tool until the problem has been fixed

– Use a test hard disk for validation purposes – Check the Web for new editions, updates, patches, and validation tests for your tools
Guide to Computer Forensics and Investigations 52

Summary
• Create a business plan to get the best hardware and software • Computer forensics tools functions
– – – – – Acquisition Validation and discrimination Extraction Reconstruction Reporting

• Maintain a software library on your lab

Guide to Computer Forensics and Investigations

53

Summary (continued)
• Computer Forensics tools types
– Software – Hardware

• Forensics software
– Command-line – GUI

• Forensics hardware
– Customized equipment – Commercial options – Include workstations and write-blockers
Guide to Computer Forensics and Investigations 54

Summary (continued)
• Tools that run in Windows and other GUI environments don’t require the same level of computing expertise as command-line tools • Always test your forensics tools

Guide to Computer Forensics and Investigations

55

Similar Documents

Free Essay

Modern History

...| | | | | Phase 4 Individual Project Sara Smith HIST101-1303B-10 Modern American History: 1950 to the 21st Century Constantinos Scaros Colorado Technical University President Bill Clinton’s impeachment scandal In 1998 President Bill Clinton was questioned about several allegations that he had harassed and/or had sexual relationships with women that worked under him. He became the first President to ever be involved in questioning as a civil defendant. In the testimony both President Clinton and Monica Lewinsky denied having a sexual relationship, though there were tapes found of conversations between Lewinsky and her co-worker Linda Tripp that suggested otherwise. It seemed that everyone was on the President’s side when it came to the affair charges, even his wife Hilary Clinton. The first lady was quoted as saying that the entire thing was a “vast right-wing conspiracy to destroy her husband.” ("Lewinsky scandal,") On the 17th of August President Clinton took the stand and testified in front of the grand jury to admit his wrong. He then later went on national television to admit to the American people that not only had he been lying for months but that he had indeed had an extramarital affair during his presidency with Monica Lewinsky. In September of that year Starr Jones sent a document nearly 500 pages long to the White House giving four different reasons why the President should be impeached. These included...

Words: 637 - Pages: 3

Premium Essay

Modern History

...Modern history Evaluate the effectiveness of British leadership in developing strategies and tactics to break the stalemate on the western front. Traditional historic views have always painted a picture of a pompous, out of touch and arrogant Sir Douglas Haig, Commander in Chief of the British Military forces. Over the years revisionist historians have moved to change this perspective putting forward new arguments that show him in a more positive light. This presentation will discuss those differing views, using the battle of the Somme and Paschaendale to support my findings. Out of all the british general Sir Douglas Haig produced the most amount of controversy. Some Traditional views of Haig were that he was unaware of the demands of traditional warfare, he was out of touch of the battle front, and he led his army from his command post in Britain. It was seen that Haig thought of airplanes and tanks as only accessories to man and horse and that he deemed extreme loss of lives as a necessity of war showing a sort of disregard for a soldier’s life. Many people in history and historians themselves have not attempted to hide their distain for Haig. British Prime Minister David Lloyd George was a major example of this he thought that he was egotistic and complacent to human losses. D. winter said that rank was governed by patronage rather than skill. Jay Murray Winter, a history professor at Yale said in his book the experiences of WW1, ‘the rigidity of the British plan was the...

Words: 329 - Pages: 2

Premium Essay

Modern History

...Topic: The world at the beginning of the 20th century Notes Timeline: 1871: Germany wins the Franco-Prussian war, and takes the provinces of Alsace and Lorraine. 1882: Germany, Austria-Hungary and Italy form an alliance called the ‘Triple Alliance’. 1889: ‘The second international’, an international congress meets in Paris. 1898: The Spanish-American war, the Philippines, Guam and Porto-Rico are transferred to the USA. 1899: Boer, settler’s rebel against British rule is South Africa. 1900: The boxer rebellion in China against foreign influence. 1901: President Mc Kindy is assassinated by an anarchist. 1906: The British battleship the dreadnaught is launched, naval race with Germany begins. 1907: The triple Entente is formed between Britain, Russia and France. 1908: A commission uncovers abuses and maltreatment of tribe’s people in the Belgian Congo. 1910: Japan annexes Korea. 1914: 28th June: The heir to the Austro-Hungarian is assassinated. 28th July: Austria bombards Belgrade, with the opening shots of WW1. 4th August: All major European powers at war. Political Ideologies: Socialism: • Developed in the 19th century as a result of industrial revolution. • Based on enlightenment assumptions: 1. Mankind was basically good. 2. Problems of society could be remedied. 3. A gov’t owes a duty to its citizens. • Marxism was the most important form of socialism • Means of producing...

Words: 3057 - Pages: 13

Premium Essay

Modern History

...-The issue that brought the U.S into the war was Germany’s policy of unrestricted submarine warfare. -On May 7, 1915, the British Cunard liner, the Lusitania, was attacked and sunk by a German submarine. 1198 civilians were killed including 124 Americans. Many more attacks on American vessels caused the Americans to declare war. -The German Foreign minister, Zimmermann, sent a secret note to the German minister in Mexico suggesting joint German-Mexican action against the United States. This became known as the ‘Zimmermann Telegram’. -On 6 April the U.S declared war on Germany. War was not declared on Austria-Hungary until 7 December 1917. -The U.S involvement had an immediate impact on morale. Allied morale jumped, and the German morale did the opposite. -At the beginning of 1917, the U.S had only a small army of about 160 000, 25 000 of whom were stationed overseas. By October 1918 it had an effective army of 4 million. More than 2 million had been transported to France and about 1.3 million were actually on the front. -Operation Michael, the first stage of Ludendorff's’ spring offensive, occurred as a result of the U.S entry and the Russian withdrawal. This operation made use of storm troopers, who used ‘secret’ tactics to infiltrate and destroy the enemy artillery. -Germany’s ultimate and inevitable defeat came as a result of the U.S entry. For Germany, it seemed that the end of the war was very near and it did not seem the end would be to their favour. -Two Revolutions...

Words: 326 - Pages: 2

Free Essay

A History of Modern Psychology

...A History of Modern Psychology Psychology 310-History and Systems of Psychology October 7, 2013 Abstract Philosophy has been said to be the mother of all disciplines. Philosophy is the oldest disciplines studied and has influenced modern science. Natural and social science have their roots in philosophy. Modern sciences are influenced by philosophy and are similar to philosophical questions. Understanding the way problems are addressed by philosophers is essential to understanding the science of psychology. Philosophers paved the way for modern psychology. Aristotle was a very famous philosopher and was called the father of psychology. Aristotle created idealism which believes that the mind and reasoning cannot exist without the body. Plato was also a philosopher. He taught theories based on the behaviors of humans like impulses and reasoning. Rene Descartes, another philosopher determined that psychology is an actual discipline. There are several philosophers that have influenced 19th Century philosophy. Edward Hitzig and John Locke are respected 19th Century philosophers, just to name a few. These philosophers have had an impact on 19th Century philosophy like no other. Their discoveries provide a different perspective on modern psychology. ("Understanding Learners", n.d.). Psychology as a Discipline According to "Understanding Learners" (n.d.), “Psychology as a discipline aims to describe behavior, explain behavior...

Words: 911 - Pages: 4

Premium Essay

Vaccinations: Modern History

...Vaccinations: The Greatest Health Development of Modern History Dr. Carl Sagan, a renowned Cornell-educated academic and astronomer, once stated that “Advances in medicine and agriculture have saved vastly more lives than have been lost in all the wars in history” (Sagan 15). Of all the advances in medicine throughout history, nothing is more beneficial and effective in the mission to prevent the spread of infectious diseases, than the vaccine. Diseases previously common to man, such as smallpox, polio, and whooping cough, are now prevented by this miracle of medicine, resulting in countless of human lives being saved. Despite controversial and considerable opposition from numerous anti-vaccine movements, vaccines are widely accepted to be...

Words: 688 - Pages: 3

Premium Essay

History of Modern Psychology

...History of Modern Psychology The roots of early Philosophy are the initial study of understanding; it is therefore the core of Psychology, which is used to motivate an individual’s thoughts, feelings, and actions to understand behavior. Philosophy relates to how an individuals experiences through understanding with no emotions. Therefore, one understands of how both philosophy and psychology can correlate with each other, even though they are both very different, the foundation was laid for further development of modern psychology today (Kowalski & Westen, 2005). Psychology has a long past, short history (Hermann Ebbinghaus, 1908). Hermann Ebbinghaus was noted for his slogan, and the first person to study memory through experimenting. Which brings us to psychology in its infancy, and the development of this science can be contributed to many philosophers as far back as the 18th century, and forward into the 19th century. Featuring, German experialmentalist Gustav, and Fechner 1801-1807, and Hermann von Helmholtz 1821-1894 all were apart of the growing developments of what Philosophy would become (Garth Kemerling, 2002). The American Psychological Association was founded by G. Stanley Hall in 1892. The Principles of Psychology, one of the most important texts in Psychology was written by William James, who would later determine functionalism. Rene Descartes and John Locke are two of the greatest philosophers known for teaching many about psychology today (Wade Pickerin...

Words: 856 - Pages: 4

Premium Essay

History of Modern Psychology

...The History of Modern Psychology PSY/310 Psychology is not something that came about over night. Through the years and centuries psychology has grown from simple ideals of philosophers into its own kind of science. There are not a lot of people who know very much about when psychology and philosophy first came together, which was during this century, “a period that to a large extent defined the philosophical-methodological distinctiveness of our psychological science in comparison to world psychology” (Abul'khanova & Slavskaia, 2007,p. 1). This paper will look at the early philosophers and the beginning of psychology. I will also research psychology and its development into a real science. One of the early philosophers was Plato, “Plato is one of the founding fathers of philosophy and has had a massive impact on the history of western thought” (In Great Thinkers A-Z, 2004, p. 1). Another early philosopher was Descartes, he believed that by using your own abilities to reason then the truth will come out (Goodwin, 2008). “Descartes identified the ‘thinking thing’ or mind, with the human soul or consciousness; the body, though somehow interacting with the soul, was a physical machine, secondary to, and in principle separable from, the soul” (The Hutchinson Unabridged Encyclopedia with Atlas and Weather Guide, 2009, p. 1). For centuries philosophers and psychologist have tried to figure out what the connection between the mind and body is and they...

Words: 728 - Pages: 3

Premium Essay

History of Modern Psychology

...acts. Psychology is the scientific study of human behavior and mental processes. The science of psychology has a history that goes back to ancient past. Back to the time of Plato and Aristotle but began to flourish and take shape in the 1600’s. For one to have an appreciation for this science he or she must consider the root and various perspectives of psychology. Modern psychology has come a long way since Rene Descartes and john Locke in the 16th century. The science of psychology began to flourish in the 1600’s with philosophers Descartes and Locke contributing significant theories on human behavior, impacting the rise of modern psychology. “As a science psychology evaluates competing ideas with careful observations and vigorous analysis” (Myers, 2007. p. 2). Rene Descartes was a French philosopher and mathematician who became influential and well-known in the field of psychology. He is the father of the mind-body interaction also known as the dualism theory. According to the dualism theory the mind and body are separate entities working together to build human experiences (Goodwin, 2008). While Descartes was working on his theory a British scientist Francis bacon was taking the science of psychology into a down-to-earth forum (Myers, 2007). Bacon’s theories were centered on experiments, experience, and common sense. He became one of the founding father of modern science, and his influence still hovers...

Words: 799 - Pages: 4

Free Essay

Modern World History

...Veronica Asidi Modern World History French Troops in Mali (January 11, 2013) The event I choose was about the French troops arriving in Mali to stem rebel advance. This took place in Mali, in West Africa. French troops have arrived in Mali to help within the country, where Islamist groups and most terrorists like the Al-Qaida are continuing to clash with the army for control of the desert in the north. The French President, François Hollande, announced this event on January 11th, saying French armed forces had come to the aid of Mali troops on the ground. “France was ‘ready to stop the terrorists' advance if it continues,” Hollande said, in a speech he made earlier to the country's diplomatic corps. “I have decided that France will respond, alongside our African partners, to the request from the Malian authorities. We will do it strictly within the framework of the United Nations Security Council resolution. The rebels have even tried to deal a fatal blow to the very existence of Mali. France, like its African partners and the entire international community, cannot accept that.(Guardian, pg.1)” He also said that the plan will last very long and the French Parliament will discuss the next move on January 13, 2013. It relates to Modern World History because the technology we use is getting more aimed against us, than to help us at situations like Mali is facing now. This event is important because before the French troops are helping, Mali was suffering with Islamic...

Words: 379 - Pages: 2

Free Essay

History of Modern Psychology

...A History of Modern Psychology University of Phoenix Flaur Conde Psy 310 The History of Psychology is something that is important to many psychologists everywhere. The history is celebrated by many centennial celebrations that started in 1979 (Goodwin, 2008, pg. 2). In the 1960’s when the history of psychology caught interest research of psychology’s past became prominent (Goodwin, 2008, pg. 2). History is important, because it lets people know where they came from, and what mistakes were made, and what discoveries were made, and how we can apply the past to future learning (Goodwin, 2008, pg. 3). One of the forerunners to the beginning philosophy to psychology is Rene Descartes. The Renaissance gave him a great stage to start with, because it had already started the changing of thought, made science more accepted, and made the approved teachings of the church mundane. Descartes wanted to search for a system where all information could be united (Goodwin, 2008, pg. 32). He believed that knowledge can be found through reasoning, and wouldn’t accept any truth unless it could not be doubted (Goodwin, 2008, pg. 32). In the Discourse on Method, Descartes explained his four rules for being able to reason so one could come up with the truth (Goodwin, 2008, pg. 33). The first one is what I stated previously is he would accept information as truth unless it was un-doubtable. The second rule he would take information and break it down to the first stages. The third rule is that...

Words: 1135 - Pages: 5

Premium Essay

Modern History Of Detroit

...The modern history of Detroit began with the creation of the Ford Motor Company in 1903 by Henry Ford. Fordism created an appeal for Detroit’s automobile factories, and soon they were the embodiment of American labor and industry. In Henry Ford’s footsteps, the Dodge Brothers and other automotive inventors and capitalists began building their own automobiles in Detroit, forging Detroit’s famous nickname as the “Motor City.” Soon, Detroit’s economy and the automobile industry were one in the same, and the reliance on the automotive boom in the early 1900’s shaped Detroit’s economy for a century. The creation of the Big Three American automobile companies brought manufacturing-sector wage labor and heavy reliance on the oil, steel, and rubber industries. Detroit was not immune to the Great Depression of the 1930’s, but the gaping hole in the economy was filled with a threat abroad. During the Second World War, Detroit auto plants were converted in order to construct tanks and aircraft, earning Detroit the...

Words: 567 - Pages: 3

Premium Essay

Modern History - Romanovs

...TO WHAT EXTENT DID WW1 CONTRIBUTE TO THE FALL OD THE ROMANOV DYNASTY? The three-hundred year Tsarist dynasty collapsed during the Russian Revolution of February 1917, following Tsar Nicholas II’s abdication on the 2nd March. However, whilst the Revolution spurred this on, short and long-term causes were important. Most important was Russia’s involvement in the First World War, in which they suffered around two million losses compared to the British Empire’s one million and suffered embarrassing defeats. Historians suggest that victory in the war depended on a nation’s military effectiveness, economic strength, administration, and political stability. These were all challenges which the tsarist government failed to meet and led to the tsar’s downfall. The argument that the First World War led to the downfall of tsardom is supported by the military unreadiness of the Russian army. This is including the poor conditions that soldiers fought in, shortages and the low self-confidence of soldiers. Russian soldiers particularly experienced terrible conditions at war, including weaponry shortages. Despite having the largest army of all the countries who fought in the war, Russia did not send many men in proportion to its entire population to the war. This proved to be a mistake as the army was not as strong as it could have been. As well as this, up until 1915, a quarter of those men that were sent to the front were unarmed and were instructed to simply pick up what they could...

Words: 1223 - Pages: 5

Free Essay

Modern Pentathlon History

...AJALUGU Algus Moodsa viievõistluse rajajaks peetakse prantsuse pedagoogi ja ajaloolast ning ühtlasi ka kaasaegsete olümpiamängude algatajat, parun Pierre de Coubertan´i. Tal tuli suurepärane mõte luua uus kompleksspordiala, mis ühendaks mitut kaasajal harrastatavat ala ning sealt tuleneski antud spordiala nimetus, mida tuntakse praegu kui „moodsat viievõistlust”. Sellega toodi välja iga võistleja mitmekülgus – nendes peitus jõud tulla toime niivõrd erinevate aladega Kõige suuremat poolehoidu leidis uue spordiala idee Rootsi ohvitserkonnas. Rootsist levis see ka teistesse maadesse. Paruni algatusel võeti moodne viievõistlus Olümpiamängude kavva. Viievõistlust harrastasid algaastail peamiselt ohvitserid ning seetõttu nimetatigi siis ala esialgselt hoopiski ohvitseride viievõistluseks. 1912 - Stockholmi olümpiamängudel esimest korda kavas viievõistlus. Startis 32 viievõistlejat kümnest riigist. Kolmikvõidu said spordiala sünnimaa esindajad rootslased. 1947 - N. Liidu ratsaspordi meistrivõistluste raames peeti esimesed meistrivõistlused viievõistluses. Siin osalesid ka eestlased Hillar Müür, Uno Bork ja Enn Vohli. 1948 - Londonis olümpiamängude ajal asutati Rahvusvaheline Moodsa Viievõistluse Liit (UIPM). 1949 - Stockholmis korraldati esimesed maailmameistrivõistlused. Osales 21 sportlast seitsmest riigist. Kuldmedalid võitsid rootslane Tage Bjurefelt ja Rootsi meeskond. 1952 - Helsingi OM-l hakati pidama ka meeskondlikku arvestust, mängudel osalesid esmakordselt N. Liidu...

Words: 1231 - Pages: 5

Premium Essay

Modern Football History

...To this day, questions still hang over the exact place where football originated. But there is a consensus among those connected to it that the roots of modern football lie in the mob game of 19th Century Britain. In its earliest form, football was chaotic to say the least, and it involved two teams playing with a spherical object on a less than uniform pitch. More than a decade after Sheffield Club beat Hallam FC 2-0 in the world’s first club match in 1857, there seemed to be an acknowledgment to the fact that the arrangement of players on the pitch in a certain way made a considerable difference to the way the game was played. (Wilson 2008, p.13, p.17) One of the earliest formations conceived was the pyramid shaped 2-3-5 formation. It had...

Words: 2064 - Pages: 9