A Forensic Analysis Of The Windows Registry

First published November 2007 Derrick J. Farmer Champlain College Burlington, Vermont dfarmer03@gmail.com (click here for a revised, quick reference PDF version of this paper) AbstractThis paper will introduce the Microsoft Windows Registry database and explain how critically important a registry

Corporate Investigations and the UK Data Protection Act

First published September 2007 by Rowenna Fielding INTRODUCTION A number of requirements of the Data Protection Act apply to workplace monitoring. While the DPA does not prohibit employee monitoring and investigation, any such activity must conform to the requirements of

Windows Vista – notes for forensic examiners (part two)

This article was first published in 2007 at http://www.securityfocus.com/infocus/1890 and is reprinted with permission by Jamie Morris Forensic Focus (www.forensicfocus.com) Intro In part one of this series [ref 1] we looked at the different editions of Vista available and discussed

Windows Vista – notes for forensic examiners (part one)

This article was first published in 2007 at http://www.securityfocus.com/infocus/1889 and is reprinted with permission by Jamie Morris Forensic Focus (www.forensicfocus.com) Intro While the fundamental principles of computer forensics remain largely unchallenged, the landscape upon which investigators operate is constantly changing.

F3 – The First Forensic Forum

‘F3 – The First Forensic Forum’, founded in the late 1990’s when forensic computing was still in its infancy, is a non-profit organisation with one specific goal which is reflected in our mission statement – “F3 exists to provide an

Writing a winning resume/CV for computer forensics vacancies

First published April 2007 In this short article, David Sullivan, a specialist computer forensics recruiter at www.appointments-uk.co.uk, provides some tips on compiling a winning CV along with a suggested CV template (available here). In the current job market, the key

Intrusion Detection System Logs as Evidence and Legal Aspects

First published January 2007 Fahmid Imtiaz School of Computer and Information Science Edith Cowan University E-mail: fimtiaz@student.ecu.edu.au Abstract Modern techniques and methodologies for detecting attacks and malicious activities on computers and networks has evolved a lot over the last couple

Forensic Image Analysis of Familiar-based iPAQ

Cheong Kai Wee School of Computer and Information Science, Edith Cowan University ckw214@yahoo.com Lih Wern Wong School of Computer and Information Science, Edith Cowan University lihwern@yahoo.com AbstractOne of the PDA forensic issues is the difficulty in maintaining image integrity as

Computer Monitoring: Software vs. Hardware Keyloggers

First published November 2006 Stephen Allen, Allen Concepts Inc., Chandler, AZ July 2006 www.keykatcher.com ABSTRACT John has been at his computer for hours, but his productivity has fallen lately. Is he emailing buddies, busy in chat rooms, or reading internet

The need for effective event management

First published November 2006 courtesy of GFI Software – www.gfi.com Introduction Underrated, undervalued and underutilized; events management is most often rated as a tedious and ungrateful task. System administrators shy away from event logs and the events contained within, citing

Reflections on a first computer forensic investigation

First published October 2006 by Brian Marofsky What follows is a synopsis of the experience I had of conducting my first computer forensic investigation. It was my no means a text book investigation. I made my share of mistakes but

Examining Wireless Access Points and Associated Devices

First published October 2006 Sgt. Christopher Then, CISSP, EnCE September 17, 2006 Computer Crimes Unit Morris County Prosecutor’s Office Morristown, NJ 07963 cthen@co.morris.nj.us Wireless access for the home has become the preferred choice of connecting computers to the Internet. As