±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 0
Overall: 27500
Visitors: 86

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 412

UK MP wants convicted hackers to face up to ten years behind bars

Thursday, July 14, 2005 (09:16:36)
A Labour MP is attempting to raise the maximum sentences that can be handed down on UK citizens who are convicted of hacking and DoS attacks. Tom Harris, MP for Glasgow South, introduced a bill on Tuesday to update the Computer Misuse Act. Harris wants the maximum sentence for accessing data without authorisation increase from six months to two years, and the maximum sentence for modifying data without authorisation lifted to 10 years from five at present...

More (ZD Net UK)

5th Annual Digital Forensic Research Workshop

Wednesday, July 13, 2005 (16:34:45)
Early registration for the 5th Annual Digital Forensic Research Workshop ends this Friday, July 15, 2005.

This year the workshop is in New Orleans, August 17-19. The workshop is designed to provide a forum for researchers and practitioners with interests in digital forensics to share results, knowledge, and experience. This year's program is now available online at:

http://www.dfrws.org/2005/program.html

For more information about DFRWS05 and to register, go to:

http://www.dfrws.org/2005/index.html
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (167 reads)

Computer Forensics Explained: A Primer for Physical Security Professionals

Wednesday, July 13, 2005 (09:58:29)
This article introduces computer risk and more specifically computer incident response and forensics to an audience who is traditionally accustomed to implementing physical controls such as camera surveillance, physical access, and alarm systems throughout their facility. We'll look at the methodology used during a computer incident, as well as the steps taken during a computer forensics investigation subsequent to an incident. Finally, a real case study will be introduced to fortify the points and demonstrate incident response in practice...

More (SecurityInfoWatch.com)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (232 reads)

Version 2.02 of The Sleuth Kit now available

Monday, July 11, 2005 (10:49:33)
Bug Fixes
- fls could crash if FAT short name did not exist
- Linux header file problem with some distros.
- Missing UFS / Ext2/3 file names (if deleted file claimed it used that data).
- Missing FAT directory entries with ils (if initial entries in cluster were invalid).
- Missing NTFS file if no $DATA or $IDX_* attributes existed (which meant the file had no content).

Updates
- Support for OS X Tiger.
- Internal design improvements and memory leak fix.
- 'ils -o' was readded as 'ils -O'.
- 'mactime -m' was added so that month is printed as number instead of name.

MD5: d8f53a69069369ee20a4ce623eb640b5

http://www.sleuthkit.org/sleuthkit/
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (209 reads)

UK computer forensics firm plays key role in investigation

Friday, July 08, 2005 (08:06:32)
A computer forensics firm from Sawbridgeworth has played a key role in a criminal investigation. Crucial evidence from company DataSec led to the convictions of Terry Butler and David Weightman, whose computer equipment contained tens of thousands of CP images. The specialist business was employed by Essex Police to examine computers and disks seized at their addresses in South Woodham Ferrers and Peckham.