Selasa, 29 November 2011 Is your client an attorney? Be aware of possible constraints (Part 2) by Sean L. Harrington "In my first post several weeks ago, I discussed some of the special obligations that digital forensics investi...
08.01 Forensic Toolkit v3 Tips and Tricks ― Not on a Budget by Sean L. Harrington "A couple of weeks ago, Brian Glass posted a very helpful comment, Forensic Toolkit v3 Tips and Tricks — on a B...
08.00 Android Forensics Study of Password and Pattern Lock Protection Posted by Oxygen Software "Let’s see what Pattern Lock is, how to access, determine or even get rid of it? We’ll also speak about Pas...
08.00 iPhone Tracking – from a forensic point of view Posted by 4rensiker "iPhoneTracking is sexy! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it pr...
07.59 Forensic Toolkit v3 Tips and Tricks – On a budget Posted by Brian K. Glass "While researching FTK 3X and Oracle, you just recently discovered that the best configuration of your Oracle...
07.59 Skype in eDiscovery by Stuart Clarke, 7Safe "The EDRM (Electronic Discovery Reference Model) is a widely accepted workflow, which guides those involved i...
07.58 Anonymous, what does it mean? Posted by forens245 "Anonymous, a word which Merriam-Webster describes as: of unknown authorship or origin, not named or identified, ...
Jumat, 07 Oktober 2011 YouDetect – Implementing the principles of statistical classifiers and cluster analysis for the purposes of classifying illegally acquired multimedia files Author: Jonathan Murphy, 7Safe Whilst all instances of the illegal acquisition of multimedia are not known, it is not possible to gain a c...
01.38 Advice for Digital Forensics Job Seekers by Joe Alonzo You see the job advertisements posted on the web everyday, Digital Forensics Analyst, Internet Investigator, Computer Forens...
Selasa, 04 Oktober 2011 Forensic Toolkit v3 Tips and Tricks – Re-indexing a case by Brian K.Glass This is the first in a series of articles that will cover topics concerning AccessData Forensic Toolkit (FTK) version 3. S...
Kamis, 29 September 2011 Is your client an attorney? Be aware of possible constraints on your investigation. (Part 1 of a multi-part series) by Sean L. Harrington Significant legal and ethical challenges confront digital forensics investigators, for which some may not be well pr...
Kamis, 22 September 2011 Publishing articles at Forensic Focus Forensic Focus is always keen to publish articles, papers or blog posts of interest to the digital forensics community. Articles are publis...
Senin, 19 September 2011 What is “good enough” information security? by Simon Biles I have, occasionally in the past, mentored people in (on?) Information Security – once for money (this is not a revenue str...
Rabu, 24 Agustus 2011 mobile forensics Obtaining Information from Mobile Devices in Criminal Investigations by David W. Bennett Mobile device forensics is the process of recovering digital evidence from a mobile device under forensically sound con...
Selasa, 23 Agustus 2011 cold boot attack memory acquisition An in-depth analysis of the cold boot attack: Can it be used for sound forensic memory acquisition? by Richard Carbone The purpose of this technical memorandum is to examine the technical characteristics behind the cold boot attack techniq...
Senin, 22 Agustus 2011 Google forensics Google history Google History Forensics by Craig Ball About the Author Craig Ball is a Texas lawyer who limits his practice to service as a court-appointed special maste...
Jumat, 29 Juli 2011 Important Changes to "Articles & Papers" Section From today, the section where we display user submitted articles and research papers is changing significantly. Users will now be able to ...
Rabu, 29 Juni 2011 computer forensics recruitment Scott Burkeman Interview with Scott Burkeman, Warner Scott Recruitment Scott is a Director at Warner Scott Recruitment in London, specialising in computer forensics recruitment throughout the UK and abroad. For...
Selasa, 24 Mei 2011 data recovery data recovery training Scott Moulton Scott Moulton’s “5-Day Data Recovery Expert Certification” Course reviewed by by Karlo Arozqueta http://www.myharddrivedied.com/data-recovery-training Just about every individual who is immersed in the In...
04.24 chris hargreaves Standard Units in Digital Forensics by Chris Hargreaves About the Author Dr Chris Hargreaves is a lecturer at the Centre for Forensic Computing at Cranfield Universit...
03.15 Nessus Si Biles vulnerability scanners PitchLake - a tar pit for scanners by Simon Biles About the Author Simon Biles is a founder of Thinking Security Ltd. , an Information Security and Risk Management c...
Selasa, 29 Maret 2011 craig ball The End of Digital Forensics? by Craig Ball About the Author Craig Ball is a Texas lawyer who limits his practice to service as a court-appointed special maste...
Minggu, 27 Maret 2011 Fragmentation of the digital forensics community From the forums: I started in the digital forensics community about five years ago, and I already feel old, and I am a Johnny-come-lately. ...
Kamis, 24 Maret 2011 mobile telephone connection records Sam Raincock Evaluating Mobile Telephone Connection Behaviour - Part 2 by Sam Raincock Sam Raincock from SRC is an IT and telecommunications expert witness specialising in the evaluation of digital ev...
Selasa, 22 Maret 2011 business continuity disaster recovery simon biles Biles’ Hierarchy of Disaster Recovery Needs by Simon Biles Having failed to keep up with my New Year’s resolution of being more organised (the observant of you might have noticed the ...
Senin, 28 Februari 2011 David Benford geotags tagview Geotags: Friend or Foe? by David Benford Director, Blackstage Forensics David Benford I recently wrote a research paper, “Geotag Data: The Modificatio...
Kamis, 24 Februari 2011 Computer forensics to die out by 2020 Somewhat contrary to expectations, I was interested to see that a search for "computer forensics" using Google's Insights for ...
07.28 Columnists sean mclinden Is the NTSB a model for incident response? by Sean McLinden Recently, the events surrounding the defacement of the HBGary Web site and publication of sensitive data were being bante...
Jumat, 28 Januari 2011 Interview with Ben Findlay, North Yorkshire Police Hi Tech Crime Unit "Many people are familiar with the concept and importance of validating and verifying (V&V) results (and the difference between t...
08.45 Challenges of Smart Phone Forensics by Rob Adams "Mobile devices have become an essential component of our daily lives. These devices keep us connected and act as so muc...
08.45 "I'm here! Now what?" by Ken Pryor "Working for a small police department in a rural area, my opportunities to do digital forensic work on real cases are mu...
Selasa, 25 Januari 2011 Challenges Images Test Images and Forensic Challenges A list of sample images and forensic challenges is now available at: http://www.forensicfocus.com/images-and-challenges Additions are encour...
Rabu, 19 Januari 2011 Sam Raincock Evaluating Mobile Telephone Connection Behaviour - Part 1 by Sam Raincock Examining Mobile Equipment – Ensuring Accuracy In general, all modern mobile telephones contain call information and SMS ...