±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 9
Overall: 26251
Visitors: 73

±Forensics Europe Expo


±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 400

Browser History: What Happened?

Thursday, April 28, 2005 (06:42:26)
Occasionally, you might need to trace a user's Web-browsing path. Manual forensic analysis, which involves digging through cookie files, the browser's cache, and browser history data, isn't easy. For a good rundown on forensic analysis of browser activity, you should consider reading "Web Browser Forensics, Part 1," by Keith J. Jones and Rohyt Belani of Red Cliff Consulting. The article, published on the SecurityFocus Web site, offers a brief usage overview of some very useful tools: in particular, Pasco, Internet Explorer History Viewer, Web Historian, and Forensic Toolkit...

More (WindowsITPro)

New Article: Mining the Protected Storage Area

Wednesday, April 27, 2005 (12:40:25)
A new article by Andy Dodd entitled "Using areas of the Microsoft Windows registry to mine data for use in Forensic Computing" has been added to the computer forensics papers and articles section.

We are always happy to consider new additions to this section. Submissions or proposals should be sent through the contact form.

Skeletons on your hard drive

Wednesday, April 27, 2005 (10:58:58)
There are a number of options for cleansing the drives of unwanted computers, from special wiping software to destruction services to manufacturers' recycling programs. But what many PC owners don't realize, experts say, is that these methods are often not enough. Two weeks ago, the National Association for Information Destruction announced that it could not endorse the use of wiping applications alone for deleting data from hard drives. Bob Johnson, executive director at NAID, said the data-destruction industry group would like to be able to recommend the tools, but that tests had left reason to doubt the wiping products...

More (News.com)

Task force cracks down in California

Wednesday, April 27, 2005 (07:16:13)
Computer crimes are like viruses - they infect many and quickly, mutating as technology grows ever more complex. In the Solano area, though, there's an antidote - "NC3TF." In layman's terms, that's the Northern California Computer Crimes Task Force, a Napa-based criminal justice outfit with a Redding bureau that celebrates its fifth birthday in June...

More (The Reporter)

It's no secret -- they're here to help (with computer forensics)

Tuesday, April 26, 2005 (08:37:06)
Local US law enforcement agencies that lack resources and technology to extract and analyze the data on seized computers and electronic devices now can turn to the U.S. Secret Service for help. Government technicians will analyze computers, cell phones and PDAs and generate easy-to-read forensic reports for free, said Jeff Eisenbeiser, the special agent in charge of the Secret Service's Pittsburgh office...

More (Pittsburgh Tribune-Review)