Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user’s password and gain access to the contents of the device.
Becoming An Amped FIVE Certified Examiner (AFCE)
The Power Of Digital Forensics: How ADF Solutions Is Revolutionizing The Digital Forensics Industry
Hacking Your Future: Education Choices For A Cybersecurity Career
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.