Computer forensics ...
 
Notifications
Clear all

Computer forensics myths?

48 Posts
41 Users
0 Reactions
4,704 Views
(@pedro281)
Eminent Member
Joined: 17 years ago
Posts: 38
 

I'm good with computers so I should be able to get a job in forensics.

I'm good with forensics so i'm good with Computers wink


   
ReplyQuote
(@seanmcl)
Honorable Member
Joined: 19 years ago
Posts: 700
 

I can get you the answer (tomorrow, within two days, by the end of the week).

The absence of the data the subject is accused of taking is evidence that the system was wiped.

Law enforcement/PI experience qualifies you to do computer forensics and the lack of these disqualifies you.

As long as you take no steps to deliberately delete or destroy evidence you are in compliance with a perservation order.

Hardware acquisition is better than software acquisiton.

Prioprietary systems are better than open source (and vice versa).

All write-blockers are the same.

The duty to preserve data under the US Federal Rules of Evidence begins with the preservation order or the notification that you are being sued.

Malware did this (not always, but far less common than what appears in the popular press).


   
ReplyQuote
(@gkelley)
Estimable Member
Joined: 21 years ago
Posts: 128
 

I don't need to test my theory, I just know what I'm telling you is true.


   
ReplyQuote
(@llista)
Active Member
Joined: 18 years ago
Posts: 17
 

A computer forensics expert dealing with Windows OS computers can do a Unix OS equally good when it comes along


   
ReplyQuote
(@rampage)
Reputable Member
Joined: 17 years ago
Posts: 354
 

Law enforcement/PI experience qualifies you to do computer forensics and the lack of these disqualifies you.

unlucly here where i live this thing happens for real..
even if you are more skilled law enforcement members generally takes precedence on you, even if sometimes they don't even understand that the cd-rom drive is not a coffee-cup stand


   
ReplyQuote
(@seeker)
New Member
Joined: 17 years ago
Posts: 3
 

"Don't worry about finding a job. There's plenty of work for everyone!" (Attribute that one to the head of the digital forensics department of the college that presented me with my certification six months ago and I'm STILL looking for work!)


   
ReplyQuote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

When pressing keys on a keyboard, or clicking on things, or when things are happening on the screen, there are always audio feedback from the system. Preferably in a high/low/high/low sequence, but always space age sounding…

The font on screen is always 72p, especially for the password box.


   
ReplyQuote
(@Anonymous)
Guest
Joined: 1 second ago
Posts: 0
 

"There's spyware on my phone. I KNOW it's there! You just weren't able to find it!!"


   
ReplyQuote
(@former33t)
New Member
Joined: 16 years ago
Posts: 3
 

That all good software steals computing cycles away from the real work to make neat sound effects. High power, CPU intensive graphics transitions are also important to any forensics software.

My second favorite thing to see is the "digital enhancement" done to grainy photographs and video. One minute you can hardly tell there's a person there, the next minute you can read his watch….


   
ReplyQuote
(@douglasbrush)
Prominent Member
Joined: 16 years ago
Posts: 812
 

The "captured" IP address will always lead you to the suspect.


   
ReplyQuote
Page 3 / 5
Share: