by Joleyn Smithing, ISFCE
Articles
Potential Impacts of Windows Vista on Digital Investigations
First published December 2007
by Christopher Hargreaves and Howard Chivers
A Forensic Analysis Of The Windows Registry
First published November 2007
Derrick J. Farmer
Champlain College
Burlington, Vermont
[email protected]
(click here for a revised, quick reference PDF version of this paper)
Windows Vista – notes for forensic examiners (part two)
This article was first published in 2007 at http://www.securityfocus.com/infocus/1890 and is reprinted with permission
by Jamie Morris
Forensic Focus (www.forensicfocus.com)
Intro
In part one of this series [ref 1] we looked at the different editions of Vista available … Read more
Windows Vista – notes for forensic examiners (part one)
This article was first published in 2007 at http://www.securityfocus.com/infocus/1889 and is reprinted with permission
by Jamie Morris
Forensic Focus (www.forensicfocus.com)
Intro
While the fundamental principles of computer forensics remain largely unchallenged, the landscape upon which investigators operate is … Read more
F3 – The First Forensic Forum
‘F3 – The First Forensic Forum’, founded in the late 1990’s when forensic computing was still in its infancy, is a non-profit organisation with one specific goal which is reflected in our mission statement – “F3 exists to provide an … Read more
D.I.M. : An Effective Incident Management Tool Based On IODEF And Other Standards
First published February 2007
The number of procedures necessary in incident response and evidence cataloguing is constantly growing. These procedures need to be standardized and must perform clearly defined actions. Additionally, they must all be documented in detail to provide … Read more
Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime
First published January 2007
Fahmid Imtiaz
School of Computer and Information Science
Edith Cowan University
[email protected]
Abstract
As days pass and the cyber space grows, so does the number of computer crimes. The need for enterprise computer forensic capability is … Read more
Forensic Image Analysis of Familiar-based iPAQ
Cheong Kai Wee
School of Computer and Information Science, Edith Cowan University
[email protected]
Lih Wern Wong
School of Computer and Information Science, Edith Cowan University
[email protected]
AbstractOne of the PDA forensic issues is the difficulty in maintaining image integrity as
Computer Monitoring: Software vs. Hardware Keyloggers
First published November 2006
Stephen Allen, Allen Concepts Inc., Chandler, AZ
July 2006
www.keykatcher.com
ABSTRACT
John has been at his computer for hours, but his productivity has fallen lately. Is he emailing buddies, busy in chat rooms, or reading internet … Read more
The need for effective event management
First published November 2006
courtesy of GFI Software – www.gfi.com
Introduction
Underrated, undervalued and underutilized; events management is most often rated as a tedious and ungrateful task. System administrators shy away from event logs and the events contained within, citing … Read more
Reflections on a first computer forensic investigation
First published October 2006
by Brian Marofsky
What follows is a synopsis of the experience I had of conducting my first computer forensic investigation. It was my no means a text book investigation. I made my share of mistakes but … Read more
Examining Wireless Access Points and Associated Devices
First published October 2006
Sgt. Christopher Then, CISSP, EnCE September 17, 2006
Computer Crimes Unit
Morris County Prosecutor’s Office
Morristown, NJ 07963
[email protected]
Unique File Identification in the National Software Reference Library
First published September 2006
Steve Mead
National Institute of Standards & Technology
100 Bureau Drive, Stop 8970
Gaithersburg, MD 20899
[email protected]
Abstract:
The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for … Read more
Dissecting NTFS Hidden Streams
First published July 2006
by Chetan Gupta
NII Consulting, Mumbai
www.niiconsulting.com
VMWare as a forensic tool
First published May 2006
Brett Shavers
May 2006
VMWare Workstation is one of the most up and coming software applications in both the corporate environment and in the computer forensic community. This paper will not detail the inner workings of