±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 6
New Yesterday: 2
Overall: 26983
Visitors: 67

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 428

Australian ISP raided for BitTorrent links

Tuesday, March 15, 2005 (06:34:35)
An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian Stock Exchange, was fronted at 9am by seven music industry piracy investigators, data forensics experts and court appointed solicitors...

More (APC)

Cases confirm computer privacy is illusion

Monday, March 14, 2005 (07:07:32)
Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won't do it for yourself, do it for your lawyer -- the one you may need one day because of something stupid or damning or both that you blithely typed into a computer e-mail or document file on the false assumption that it was confidential or untraceable...

More (Wichita Eagle)

Should Undercover Internet Investigations be Publicized in the Media?

Sunday, March 13, 2005 (09:20:15)
Should Undercover Internet Investigations be publicized in the Media?

By Sergeant Frank Kardasz

More (New Criminologist)

Windows Security Log Encyclopedia (Press Release)

Saturday, March 12, 2005 (09:08:19)
IT managers and their staffs now have the Windows Security Log Encyclopedia, a new Windows tool for monitoring, intrusion detection and for carrying out computer forensics. The new tool covers all nine audit categories of Windows Server 2003 and illuminates the subtle, yet critical, differences between Windows Server 2003, 2000, and XP regarding security events. It documents each security event in the Windows OS, complete with analysis and commentary. This tool is freely available online at

http://www.ultimatewindowssecurity.com/encyclopedia.html

Deleted computer files never truly gone

Friday, March 11, 2005 (10:55:09)
“Whenever you delete a file, you’re really not deleting the file,” said Georges Stokes, system administrator for Air Armament Center plans and programs office. “The data is still technically there.” The information that people attempt to delete from their computers varies from user to user said Special Agent Robert Renko, Defense Computer Forensics Laboratory director of operations...


More (Air Force Link)