Kamis, 26 Juli 2012 Introduction to Penetration Testing – Part 3a – Active Reconnaissance by Si Biles, Thinking Security Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scen...
Selasa, 24 Juli 2012 Authenticating Internet Web Pages as Evidence: a New Approach By John Patzakis [1] and Brent Botta [2] Previously, in Forensic Focus, we addressed the issue of evidentiary authentication of social medi...
Kamis, 19 Juli 2012 "Finding Evidence in an Online World" webinar recording and PDF now available A recording of this week's webinar "Finding Evidence in an Online World - Trends and Challenges in Digital Forensics" is now ...
Sabtu, 14 Juli 2012 Retrieving Digital Evidence: Methods, Techniques and Issues by Yuri Gubanov yug@belkasoft.com Belkasoft Ltd. http://belkasoft.com This article describes the various types of digital forensic eviden...
Jumat, 13 Juli 2012 Parallels hard drive image converting for analysis by zoltanszabodfw The other day, talking to one of the analysts in Dallas, a question emerged about analyzing Parallels’ virtual machine ha...
Rabu, 11 Juli 2012 Introduction to Penetration Testing – Part 2 – The Discovery Phase – Passive Reconnaissance by Si Biles ( @si_biles ), consultant for Thinking Security PenTest, like forensics, is almost as much an art as it is a science – you ca...
Kamis, 05 Juli 2012 Interview with John H. Riley, Bloomsburg University of Pennsylvania John, can you tell us something about your background and why you decided to teach digital forensics? First, thanks for the opportunity to d...