±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 4
New Yesterday: 7
Overall: 27513
Visitors: 39

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 449

Final version of NIST's "Guidelines on PDA Forensics" complete

Tuesday, November 16, 2004 (13:53:30)
Special Publication 800-72, entitled Guidelines on PDA Forensics, was developed to help organizations evolve appropriate policies and procedures for dealing with PDA forensics and to provide forensic specialists with a background on the technology, tools, and principles involved. The intended audience ranges from response team members handling a computer security incident, to organizational security officials investigating an employee-related situation, to forensic examiners involved in criminal investigations.

More (IWS)

The lighter side of data recovery

Sunday, November 14, 2004 (07:30:02)
An executive who froze his broken hard disk thinking it would be fixed has topped a list of the weirdest computer mishaps.

Although computer malfunctions remain the most common cause of file loss, data recovery experts say human behaviour still is to blame in many cases.

More (BBC)

New opensource computer forensics tool - Vital Data FoRK based on PSK

Tuesday, November 09, 2004 (13:16:26)
The team at Vital Data have finished beta testing their FoRK CD and have uploaded version 1.0.0 for all members to download. It is available at forensicIT.com.au in the General Utilities - GNU / Linux - Downloads section.

It is based on the Knoppix 3.6 LiveCD, with some customisations and additions. Bugs identified during the testing were only minor, such as identification of hard drives transposing makes with model numbers, etc. These have all been corrected. We encourage everyone to download the CD, as it is an extremely useful tool to have, and we would appreciate all the testing and feedback we can get.

Stopping Computer Crime

Tuesday, November 09, 2004 (10:19:31)
Stopping computer crime requires two basic things: You need to let criminals know it won't be tolerated by reporting and prosecuting, and tell the world what these crimes are and how folks can avoid being a victim. It's not enough to know you're under attack, or that you think you're in compliance with relevant laws—you must collect the evidence supporting your assumptions.

More (MCPmag.com)

Meticulous cybersleuth takes on high-tech cases

Monday, November 08, 2004 (12:48:42)
Just call William Simon the Sherlock Holmes of computers. The cyberspace sleuth would love the comparison. In fact, he named his business, Abberline Investigations, after his distant cousin Frederick Abberline, a Victorian-era Scotland Yard investigator.

The licensed private investigator, with more than two decades of experience in computer forensics, is the go-to guy when companies need to analyze and retrieve information stored on a computer in such a way that the information can be used as evidence in a court of law.

More (HoustonChronicle.com)