Computer Forensics 101

First published May 2005 By Susan Steen and Johnette Hassell, Ph.D. Electronic Evidence Retrieval, LLC www.electronicevidenceretrieval.com Thirty years ago computers were colossal machines utilized only by government agencies and prodigious corporations. These early machines were so large and complex that… Read more

Collecting And Preserving Electronic Media

First published May 2005 by Joan E. Feldman, President Computer Forensics Inc. http://www.forensics.com The discovery process in civil litigation has always been a critical and sometimes confusing area for attorneys. Most attorneys have wondered, at one time or another, whether… Read more

Job hunting advice for UK computer forensics professionals

First published April 2005 by David Sullivan www.appointments-uk.co.uk David@appointments-uk.co.uk This short article is aimed at Computer Forensic Professionals based in the UK who are considering looking for a new job. Introduction A number of the posts on Forensic Focus relate… Read more

Data Recovery Handling Tips & ESD Precaution

First published April 2005 by ActionFront Data Recovery Labs www.ActionFront.com Data Recovery Handling Tips & ESD Precaution Mishandling is a leading cause of hard disk drive failure. ESD (Electrostatic Discharge) A familiar form of Electrostatic Discharge, often called “static electricity”,… Read more

Beware Do-it-Yourself Data Recovery Solutions and Products

First published April 2005 by ActionFront Data Recovery Labs www.ActionFront.com Do-It-Yourself data recovery software may complicate your problems and diminish the prospects of a successful recovery. The object of many fix/doctor/repair programs is to try to make the drive, file-system… Read more

Is There a Need for Industry Control?

First published April 2005 by Nick Furneaux CSITech www.csitech.co.uk For many years if someone asked what I did for a living I would have to use an all-purpose description such as I worked in computer security or even worse I… Read more

Computer Forensics – A Business Tool

First published March 2005 by Andy Fox Director Audax Digital Forensics www.audaxuk.com March 2005 Computer forensics has become an increasingly important part of IT security. A 2003 survey carried out on 201 companies by the National High Tech Crime Unit… Read more

Electronic Evidence as the Smoking Gun

First published February 2005 by Henry J. Fasthoff, IV NOTE: THIS IS ARTICLE IS FOR INFORMATIONAL PURPOSES ONLY. IT IS NOT INTENDED TO BE CONSTRUED AS LEGAL ADVICE. Electronic communications–particularly email–may contain a treasure trove of evidence in commercial litigation… Read more

Hard Drive Crash? The Essential Data Recovery Report

First published January 2005 by Greg Duffield Your worst nightmare just became a horrifying reality. You keep hearing that little voice in your head mockingly shout “you should have backed that stuff up” The voice keeps echoing throughout your head… Read more

Using the Forensic Server Project

First published November 2004 The following is an extract from Chapter 8 of “Windows Forensics & Incident Recovery” by Harlan Carvey. Collecting data from a potentially compromised system is relatively simple. There are several methodologies for collecting data that an… Read more

Data Forensics – The smoking gun may be a click away

First published September 2004 By PAUL G. LEWIS Lewis is the founding partner of PG Lewis & Associates of Whitehouse Station, a data forensics firm. http://www.pglewis.com Enquiries to Rob Kleeger, rkleeger@pglewis.com This article is reprinted with permission from the SEPTEMBER… Read more

Computer forensics software, an introduction

First published September 2004 by Jamie Morris, Forensic Focus In common with many other professions, the field of computer forensic investigation makes use of tools to allow practitioners to carry out their tasks effectively and efficiently. This article describes some… Read more