New Today: 0
New Yesterday: 4
· Geo-tagging & Photo Tracking On iOS
· KS – an open source bash script for indexing data
· Mobile Device Geotags & Armed Forces
· Categorization of embedded system forensic collection methodologies
· Interpretation of NTFS Timestamps
· What are ‘gdocs’? Google Drive Data – part 2
· What are ‘gdocs’? Google Drive Data
· Bad Sector Recovery
· Forensic Artifact: Malware Analysis in Windows 8
Page 403Back to top Back to main Skip to menu
More (Navhind Times)
"You have to be prepared for anything; criminals are crafty," Marsico said.
After graduation in May, Marisco hopes to work for the FBI. But for now, his concern is developing a standard practice regarding how digital evidence may be used in court.
More (The Exponent)
"I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this issue free of charge, available to download now.
Reporting security breaches: A risk to be avoided or responsibility to be embraced? Editor in chief, Eoghan Casey, debates whether companies should or shouldn't report incidents to the police. If faced with more corporate reporting could law enforcement cope?
Tool Review: Forensic analysis of windows hosts using UNIX-based tools Most examiners only use UNIX-based forensic tools when investigating a UNIX system. However, such tools are excellent for examining Windows hosts. Cory Altheide writes a 16 page technical report on how to use Linux as a platform for forensic analysis and all the advantages it can bring to an investigation.
Download these articles at http://www.digitalinvestigation.net"
is now online and we're actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at firstname.lastname@example.org, thank you.