Quantcast
Channel: Computer Forensics RSS
Browsing all 21 articles
Browse latest View live

Anti-Digital Forensics, The Next Challenge

Computer hard drives are often analyzed for the presence of child pornography. When an examiner finds potentially incriminating .jpgs, a timeline can usually be established regarding when they were...

View Article



Computer Forensics Standards and Controls

The use of standards and controls in scientific experiments is a fundamental axiom of the scientific method. No experiment can be considered “scientific” unless they are used to ensure reliable...

View Article

Starting a Digital Forensics Section

Craig is sitting in his office enjoying a cup of coffee when his telephone rings. He answers and on the line is his boss, George, the laboratory director. George informs Craig that he wants to provide...

View Article

Image may be NSFW.
Clik here to view.

Why SSD Drives Destroy Court Evidence, and What Can Be Done About It: Part 1

Solid State drives (SSD) introduced dramatic changes to the principles of computer forensics. Forensic acquisition of computers equipped with SSD storage is very different from how we used to acquire...

View Article

Microsoft Windows 8: A Forensic First Look

Windows 8 retained many of the key artifacts that were present in earlier versions, however, its immersive experience also leans itself to artifacts nonexistent in previous releases.read more

View Article


Microsoft Windows Artifacts

The Windows Registry and the C:\Windows\Installer FolderIn the spring of 1992, Microsoft released Windows 3.10, the new heir of the Windows dynasty. In this Windows release was a new registration...

View Article

Why SSD Drives Destroy Court Evidence, and What Can Be Done About It: Part 2

Part 1 of this article discussed some of the forensic challenges relating to SSD drives. Part 2 will continue this discussion and look at some of the forensic significance of this information.read more

View Article

Mozilla Firefox Forensics: Part 2

Read part 1 at www.dfinews.com/article/mozilla-firefox-forensics. Browser Basics The most prevalent software applications in use today are probably Web browsers. They are used for viewing, retrieving,...

View Article


Image may be NSFW.
Clik here to view.

A Bit About Taking a Byte Out of Digital Forensics Laboratories

“…the Internet is the crime scene of the 21st century.” – Cyrus Vance, District Attorney, New York County (Manhattan)1read more

View Article


Mozilla Firefox Forensics: Part 3

Read Part 2 of Mozilla Firefox Forensics.read more

View Article

Forensic Laboratory 2030: Scientific Environment

What will constitute a modern forensic laboratory in 2030? From its physical manifestation to its legal and scientific mandates, the vision for the ideal forensic laboratory in 2030 will likely be...

View Article

Mozilla Firefox Forensics: Part 4

Read Part 3 of Mozilla Firefox Forensics.read more

View Article

Don't Forget Your Memory

Computer forensics is a field that is changing as fast as software can be written—and that’s fast. read more

View Article


Ethical Practices in Forensics

A recent headline in the news: “Crime laboratory manager resigns; two others resign after accusations of cheating on a proficiency exam.” This incident will probably have far ranging consequences in...

View Article

Image may be NSFW.
Clik here to view.

Cyber Investigations at the DHS

U.S. Immigration and Customs Enforcement's (ICE's) Homeland Security Investigations (HSI) is the largest investigative agency within the U.S. Department of Homeland Security (DHS) with a mission to...

View Article


Hardware-Assisted Advanced Forensics and Cyber Threat Detection

The goal of any computer investigation is to obtain as much evidence as possible from the computer while at the same time ensuring the integrity of the evidence. It is equally important that...

View Article

Detecting Source Code Re-Use through a Binary Analysis Hybrid Approach

Often, digital investigations have to deal with the theft of intellectual property in the form of source code copied and re-used without permission. In order to investigate source code infringement,...

View Article


Incorporating Extrinsic Evidence into the Digital Forensics Investigation

“Your role as a computer forensics professional is to gather evidence from a suspect’s computer and determine whether the suspect committed a crime or violated a company policy.” read more

View Article

Starting A Career in Digital Forensics: Part 1

The Problemread more

View Article

Image may be NSFW.
Clik here to view.

Memory Analysis and the Ongoing Battle Against Malware

Memory analysis is the latest frontier in the field of forensic investigations and a crucial skill for any investigator who is analyzing malware intrusions. Attackers use anti-forensic techniques to...

View Article
Browsing all 21 articles
Browse latest View live




Latest Images