±Forensic Focus Partners
|New Today: 2||Overall: 32225|
|New Yesterday: 3||Visitors: 113|
Back to top Skip to content Skip to menu
More (Security Focus)
More (press release)
Page 242Back to top Back to main Skip to menu
Tuesday, February 21, 2006 (12:50:29)Former CA chairman and chief executive Sanjay Kumar and another CA executive obstructed justice by attempting to erase evidence from computers after the federal government began investigating accounting fraud at the software company, prosecutors say in a letter to defense attorneys...
Monday, February 20, 2006 (16:07:08)Documents tend to collect hidden data, which takes two forms. One is metadata, or data about a document, which is appended by the program, often unnoticed by the user. Then thereâ€™s data that was part of the original document but somehow has been rendered invisible to the average user. Knowing how to find both types of hidden data is critical to getting rid of it...
Sunday, February 19, 2006 (14:19:07)On February 22nd, Guidance Software will host an online seminar that will explore the next generation of write block technologies. One of the first rules taught in computer investigations is to assure that the original media is not altered, and that the methods used to create forensic quality copies of the media and static data assure that the integrity of the original is maintained. For this reason, the use of write blocking / prevention mechanisms has always been suggested for "media imaging," as well as thorough testing beforehand to assure that the mechanism works without fail...
Sunday, February 19, 2006 (14:12:24)To many privacy geeks, it's the holy grail -- a totally anonymous and secure computer so easy to use you can hand it to your grandmother and send her off on her own to the local Starbucks. That was the guiding principle for the members of kaos.theory security research when they set out to put a secure crypto-heavy operating systems on a bootable CD: a disc that would offer the masses the same level of privacy available to security professionals, but with an easy user interface...
Friday, February 17, 2006 (12:17:03)When you think of crime scenes and gathering evidence, perhaps DNA and fingerprints come to mind. But there's another science which is helping law enforcement agencies like HPD find and convict criminals. It is the growing field of forensic computing. In a Houston office building, FBI-trained computer forensic examiners work at what's called the Regional Computer Forensics Laboratory...
Thursday, February 16, 2006 (11:57:50)A Becker County District Court judge has said an independent computer forensics expert can look for evidence in Moorhead, Minn. (US) city databases that police officers have to fulfill monthly quotas for traffic citations...
Wednesday, February 15, 2006 (12:20:39)In part one of this series, we discussed the current Sebek development and its integration with GenIII Honeynets. In this article, we take it a step further and focus on best practices to deploy Sebek inside a GenIII Honeynet, as well as the new Sebek "write" patch...
More (Security Focus)
Wednesday, February 15, 2006 (11:39:15)The information security firm Red Cliff Consulting LLC has renamed itself MANDIANT, reflecting a major evolution in the company's mission over the past year - a year that saw 150% revenue growth, the development of free software tools, and the rapid expansion of its advanced security services and customized education programs...
More (press release)
Tuesday, February 14, 2006 (11:37:15)Investigators are relying on computer records to trace Neil Entwistleâ€™s steps in the days before he allegedly shot his wife, Rachel, and 9-month-old daughter, Lillian Rose. As computers play an ever-greater role in everyday life, they are becoming increasingly important sources of evidence for police and prosecutors, investigators say...
Monday, February 13, 2006 (20:26:13)Sprite Guo, a policeman in China, has contacted me with details of the China Computer Forensics Conference 2006 (CCFC 2006), a computer forensics conference that takes place between members of the law enforcement community and computer forensic companies in China. This year the focus is on data recovery and forensic analysis techniques. He would like to invite computer forensic training agencies who want to enter the Chinese market to attend the conference and prepare some training sessions. Sprite is also keen to attract skilled investigators to the conference and asks anyone interested to visit the web site at http://www.china-forensic.com/2006-en.htm