±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 2
Overall: 27354
Visitors: 38

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 422

New Article: Job hunting advice for UK computer forensics professionals

Friday, April 29, 2005 (10:53:13)
A superb new article by David Sullivan entitled "Job hunting advice for UK computer forensics professionals" is now online at

http://www.forensicfocus.com/computer-forensics-jobs-uk

I am sure our UK members will find it a very worthwhile read!

Jamie

Fraud propels demand for computer forensics training

Friday, April 29, 2005 (06:46:36)
In the 'if you can't beat 'em, join 'em stakes', computer-based crime is driving more and more IT professionals to study the skills and tools needed to unravel and reveal the inner workings of cyber fraudsters. The general upsurge in computer skills in the population is reflected equally amongst criminals and malcontents and law enforcement agencies frequently confiscate computers to search for evidence of alleged misdeeds. In the knowledge race, computer forensics has become a priority and, since 1999 has propelled the growth in demand for training in this sector by 600 percent, according to Paul Hughes, managing director of Brisbane-based Frontier Security Solutions...

More (Computerworld)

Browser History: What Happened?

Thursday, April 28, 2005 (06:42:26)
Occasionally, you might need to trace a user's Web-browsing path. Manual forensic analysis, which involves digging through cookie files, the browser's cache, and browser history data, isn't easy. For a good rundown on forensic analysis of browser activity, you should consider reading "Web Browser Forensics, Part 1," by Keith J. Jones and Rohyt Belani of Red Cliff Consulting. The article, published on the SecurityFocus Web site, offers a brief usage overview of some very useful tools: in particular, Pasco, Internet Explorer History Viewer, Web Historian, and Forensic Toolkit...

More (WindowsITPro)

New Article: Mining the Protected Storage Area

Wednesday, April 27, 2005 (12:40:25)
A new article by Andy Dodd entitled "Using areas of the Microsoft Windows registry to mine data for use in Forensic Computing" has been added to the computer forensics papers and articles section.

We are always happy to consider new additions to this section. Submissions or proposals should be sent through the contact form.

Skeletons on your hard drive

Wednesday, April 27, 2005 (10:58:58)
There are a number of options for cleansing the drives of unwanted computers, from special wiping software to destruction services to manufacturers' recycling programs. But what many PC owners don't realize, experts say, is that these methods are often not enough. Two weeks ago, the National Association for Information Destruction announced that it could not endorse the use of wiping applications alone for deleting data from hard drives. Bob Johnson, executive director at NAID, said the data-destruction industry group would like to be able to recommend the tools, but that tests had left reason to doubt the wiping products...

More (News.com)