Computer Forensics – A Business Tool

First published March 2005

by Andy Fox
Director
Audax Digital Forensics
www.audaxuk.com

March 2005

Computer forensics has become an increasingly important part of IT security. A 2003 survey carried out on 201 companies by the National High Tech Crime Unit … Read more

Electronic Evidence as the Smoking Gun

First published February 2005

by Henry J. Fasthoff, IV

NOTE: THIS IS ARTICLE IS FOR INFORMATIONAL PURPOSES ONLY. IT IS NOT INTENDED TO BE CONSTRUED AS LEGAL ADVICE.

Electronic communications–particularly email–may contain a treasure trove of evidence in commercial litigation … Read more

Hard Drive Crash? The Essential Data Recovery Report

First published January 2005

by Greg Duffield

Your worst nightmare just became a horrifying reality. You keep hearing that little voice in your head mockingly shout “you should have backed that stuff up” The voice keeps echoing throughout your head … Read more

Using the Forensic Server Project

First published November 2004

The following is an extract from Chapter 8 of “Windows Forensics & Incident Recovery” by Harlan Carvey.

Collecting data from a potentially compromised system is relatively simple. There are several methodologies for collecting data that an … Read more

Computer forensics software, an introduction

First published September 2004

by Jamie Morris, Forensic Focus

In common with many other professions, the field of computer forensic investigation makes use of tools to allow practitioners to carry out their tasks effectively and efficiently. This article describes some … Read more

Share to...