±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36768
New Yesterday: 0 Visitors: 113

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 320

An Interview With John Paul Lucich About His New Book Cyber Lies

Tuesday, March 06, 2007 (16:10:41)
"If you think your spouse is cheating on you then this might be the self help book you need. Mr. Lucich is a data forensics expert with over 20 years of hard earned experience. I had an opportunity to talk to Mr. Lucich about this intriguing line of work..."

More (blogcritics.org)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1419 reads)

Submissions Now Being Accepted for Timothy Fidel Award

Monday, March 05, 2007 (23:49:09)
Guidance Software, Inc. (NASDAQ:GUID), the world leader in digital investigations™, today announced the Timothy Fidel Memorial Award Committee, whose judges act as the decision-making body for the award given in memoriam of Special Agent Tim Fidel, a pioneer and tireless advocate of cyber forensics. The winner will be named at the sixth annual Computer Enterprise Investigations Conference® (CEIC) taking place May 6-9 at the Loews Lake Las Vegas Resort...
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3793 reads)

'The Eight E's': Ascending the Computer Forensics Ladder

Friday, March 02, 2007 (14:30:54)
Though computer forensics is a young discipline, it's not the exclusive province of new graduates of computer forensics degree programs. It's a natural career extension for IT and law enforcement professionals and peripatetic lawyers with a dominant geek gene. Expertise in litigation and computer forensics also opens the door to lucrative opportunities in electronic data discovery consulting. Here are "The Eight E's" to becoming a skilled CF expert...

More (Law.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1071 reads)

Digital forensics plagued by expanding storage

Thursday, March 01, 2007 (16:47:46)
The increasing storage requirements of consumers and businesses has become a plague for computer-crime investigators, a former special agent told attendees at the Black Hat DC Conference on Wednesday. While only one percent of crimes involved DNA evidence, a majority of cases involve some sort of digital evidence, said Jim Christy, a retired special agent and director of the Defense Cyber Crime Center. And that evidence keeps growing in size...

More (SecurityFocus)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2996 reads)

RAID Recovery: The Data Knight Kroll Ontrack To The Rescue!

Thursday, February 22, 2007 (13:41:22)
More and more enthusiast users approach Kroll Ontrack with destroyed RAID arrays. Generally, data recovery from such a RAID array is possible, but keep in mind that the effort increases disproportionately. First of all, data has to be copied from a RAID drive onto a server, and the data set has to be put back together. The distribution of data into smaller blocks across one or more drives makes RAID 0 the worst possible type to recover. Increasing performance doesn't necessarily do your data any good here! If a drive is completely defective, only small files, which ended up on only one of the RAID drives (despite the RAID stripe set), can be recovered (at 64 kB stripe size or smaller). RAID 5 offers parity data, which can be used for recovery as well...

More (Tom's Hardware)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1572 reads)

Detective: New Web laws not cure-all

Wednesday, February 21, 2007 (17:05:04)
While a recent online harassment case in Danville (USA) started a push for computer crime legislation, some experts say the problem isn't that laws don't exist to fight such crimes — it's that agencies don't know how to use those laws. And worse, they say new laws could further complicate an area that many jurisdictions already have trouble understanding. "Something needs to be standardized, but we're not at that point yet," said Detective Bryan Vevera, a computer crime specialist with the Walnut Creek Police Department. "Every agency has a different view of how to handle it." But Vevera said new legislation is not the answer...

More (insideBayArea.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1059 reads)

Kangaroo Court: IT staff failure could cost a teacher forty years in prison

Tuesday, February 20, 2007 (14:52:23)
Kangaroo Court is the only way to call the railroading of Julie Amero, a substitute teacher in Norwich Connecticut. In January, Julie Amero was convicted of four counts of ‘risking injury to a child’ and will face up to forty years in prison when she is sentenced in March. The conviction was handed down in the Norwich Superior Court. The story behind this and the facts used to convict her have many in the IT world gaping in shock...

More (m&c)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1160 reads)

DFRWS 2007 File Carving Challenge

Saturday, February 17, 2007 (22:09:11)
The DFRWS 2007 File Carving Challenge has been posted: http://www.dfrws.org/2007/challenge/

This year's challenge builds upon last year's and adds more file types and scenarios. File carving is the process of extracting files from data using file type specific knowledge, such as header and footer values or internal data structures. Different approaches to file carving result in different error rates and the goal of this challenge is to develop AUTOMATED file carving programs that are efficient and have low false positive rates.

Challenge submissions are due July 9, 2007. The Challenge Organizers (Brian Carrier, Eoghan Casey, and Wietse Venema).

Paper submissions for the general conference are due April 2, 2007.
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1142 reads)

Steganography Examiner Training

Saturday, February 17, 2007 (21:52:36)
Learn how to detect and extract hidden information!

Host: Cybercrime Summit
Location: Fairfield Inn and Suites, Kennesaw, GA
Dates: March 17 - 18, 2007

With only 14 seats available, the course is sure to fill up fast so sign
up soon!

To reserve your space, contact:

Amy Lambert
1-866-401-9392
304-333-SARC (7272)
[email protected]
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (948 reads)

WinHex, X-Ways Forensics, X-Ways Investigator 13.8 released

Saturday, February 17, 2007 (18:29:21)
WHAT'S NEW?

The investigator version of X-Ways Forensics is now a separate product: X-Ways Investigator ( http://www.x-ways.net/investigator/ ). The user inface of the investigator version is now customizable to a certain extent: With the help of an optional file named "investigator.ini", additional administrative security precautions and additional optional usage simplifications can be activated individually...