F3 – The First Forensic Forum

‘F3 – The First Forensic Forum’, founded in the late 1990’s when forensic computing was still in its infancy, is a non-profit organisation with one specific goal which is reflected in our mission statement – “F3 exists to provide an… Read more

Writing a winning resume/CV for computer forensics vacancies

First published April 2007 In this short article, David Sullivan, a specialist computer forensics recruiter at www.appointments-uk.co.uk, provides some tips on compiling a winning CV along with a suggested CV template (available here). In the current job market, the key… Read more

Intrusion Detection System Logs as Evidence and Legal Aspects

First published January 2007 Fahmid Imtiaz School of Computer and Information Science Edith Cowan University E-mail: fimtiaz@student.ecu.edu.au Abstract Modern techniques and methodologies for detecting attacks and malicious activities on computers and networks has evolved a lot over the last couple… Read more

Forensic Image Analysis of Familiar-based iPAQ

Cheong Kai Wee School of Computer and Information Science, Edith Cowan University ckw214@yahoo.com Lih Wern Wong School of Computer and Information Science, Edith Cowan University lihwern@yahoo.com AbstractOne of the PDA forensic issues is the difficulty in maintaining image integrity as… Read more

Computer Monitoring: Software vs. Hardware Keyloggers

First published November 2006 Stephen Allen, Allen Concepts Inc., Chandler, AZ July 2006 www.keykatcher.com ABSTRACT John has been at his computer for hours, but his productivity has fallen lately. Is he emailing buddies, busy in chat rooms, or reading internet… Read more

The need for effective event management

First published November 2006 courtesy of GFI Software – www.gfi.com Introduction Underrated, undervalued and underutilized; events management is most often rated as a tedious and ungrateful task. System administrators shy away from event logs and the events contained within, citing… Read more

Reflections on a first computer forensic investigation

First published October 2006 by Brian Marofsky What follows is a synopsis of the experience I had of conducting my first computer forensic investigation. It was my no means a text book investigation. I made my share of mistakes but… Read more

Examining Wireless Access Points and Associated Devices

First published October 2006 Sgt. Christopher Then, CISSP, EnCE September 17, 2006 Computer Crimes Unit Morris County Prosecutor’s Office Morristown, NJ 07963 cthen@co.morris.nj.us Wireless access for the home has become the preferred choice of connecting computers to the Internet. As… Read more

Unique File Identification in the National Software Reference Library

First published September 2006 Steve Mead National Institute of Standards & Technology 100 Bureau Drive, Stop 8970 Gaithersburg, MD 20899 smead@nist.gov Abstract: The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for… Read more

Dissecting NTFS Hidden Streams

First published July 2006 by Chetan Gupta NII Consulting, Mumbai www.niiconsulting.com   Cyber Forensics is all about finding data where it is not supposed to exist. It is about keeping the mind open, thinking like the evil attacker and following… Read more

VMWare as a forensic tool

First published May 2006 Brett Shavers May 2006 VMWare Workstation is one of the most up and coming software applications in both the corporate environment and in the computer forensic community. This paper will not detail the inner workings of… Read more

The Farmer’s Boot CD

First published May 2006 Preview Data in Under Twenty Minutes by Thomas Rude THE FARMER’S BOOT CD Preview Data in Under Twenty Minutes On January 1, 2006, THE FARMER’S BOOT CD, or FBCD for short, was officially released to the… Read more

Forensic Analysis of the Windows Registry

First published April 2006 Lih Wern Wong School of Computer and Information Science, Edith Cowan University lihwern@yahoo.com Abstract Windows registry contains lots of information that are of potential evidential value or helpful in aiding forensic examiners on other aspects of… Read more