A 14-year-old female presented with oliguric dialysis requiring kidney injury due to acute poststreptococcal glomerulonephritis (PSGN) with hypertension strongly suggestive of atypical hemolytic uremic syndrome (aHUS) with microangiopathic hemolytic anemia and elevated factor H antibody levels. Renal biopsy revealed crescentic glomerulonephritis with typical subepithelial, intramembranous and mesangial electron-dense deposits (humps) on electron microscopy. She was treated with glucocorticoids following which she recovered, remained dialysis free and her Factor H antibody levels and depressed complement 3 levels normalized. PSGN-associated HUS has rarely been described, with this patient being the 11 case reported, to the best of our knowledge. This case is unique as we describe the course and management of the first patient with PSGN-associated HUS in the era of eculizumab, without eculizumab, and plasmapheresis. This patient presented with clinical and histological features of PSGN as well as anemia and thrombocytopenia consistent with aHUS. Given that these diseases are both mediated through the alternate complement pathway, it is tempting to speculate that blockade of the terminal complement pathway through the use of eculizumab might improve outcomes. Temporally, the hematological parameters in our patient seemed to improve soon after treatment was initiated; however, none of the prior cases in the literature experienced any long-term hematological issues, suggesting that supportive management can be a reasonable alternative.
The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber-crime and has raised an enormous challenge to tackle it effectively. There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber-crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber-crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic. However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber-crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.