Quantcast
Channel: Forensic Focus Blog
Browsing all 37 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Interview with Professor Golden G. Richard III, University of New Orleans

Golden, can you tell us something about your background and why you decided to teach digital forensics? I studied computer science at the University of New Orleans, then went to Ohio State to get an...

View Article



Image may be NSFW.
Clik here to view.

An Introduction to Penetration Testing – Part 1

by Si Biles In an earlier article, many moons ago (Sorry Jamie !), I stated my opinion that Forensics and Security were opposite sides of the same coin. I’ve felt very strongly that my skills as a...

View Article

Image may be NSFW.
Clik here to view.

Interview with John H. Riley, Bloomsburg University of Pennsylvania

John, can you tell us something about your background and why you decided to teach digital forensics? First, thanks for the opportunity to discuss our program. We're really proud of what we've...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Penetration Testing – Part 2 – The Discovery Phase – Passive...

by Si Biles ( @si_biles ), consultant for Thinking Security PenTest, like forensics, is almost as much an art as it is a science – you can only be taught so far, technical techniques and tools are all...

View Article

Image may be NSFW.
Clik here to view.

Parallels hard drive image converting for analysis

by zoltanszabodfw The other day, talking to one of the analysts in Dallas, a question emerged about analyzing Parallels’ virtual machine hard drives.  To my surprise, I did not find many help on this...

View Article


Image may be NSFW.
Clik here to view.

Retrieving Digital Evidence: Methods, Techniques and Issues

by Yuri Gubanov yug@belkasoft.com Belkasoft Ltd. http://belkasoft.com This article describes the various types of digital forensic evidence available on users’ PC and laptop computers, and discusses...

View Article

Image may be NSFW.
Clik here to view.

"Finding Evidence in an Online World" webinar recording and PDF now available

A recording of this week's webinar "Finding Evidence in an Online World - Trends and Challenges in Digital Forensics" is now available here and on YouTube here. Sincere thanks to Jad Saliba for...

View Article

Image may be NSFW.
Clik here to view.

Authenticating Internet Web Pages as Evidence: a New Approach

By John Patzakis [1] and Brent Botta [2] Previously, in Forensic Focus, we addressed the issue of evidentiary authentication of social media data (see previous entries here and here). General Internet...

View Article


Image may be NSFW.
Clik here to view.

Introduction to Penetration Testing – Part 3a – Active Reconnaissance

by Si Biles, Thinking Security Apologies in advance, this is a bit of a connective blog entry – this is a big topic, and it needs some scene setting, basic understanding and several weeks worth to get...

View Article


Image may be NSFW.
Clik here to view.

Book Review: Mastering Windows Network Forensics & Investigations

by Chad TilburyMastering Windows Network Forensics and Investigations fills an interesting niche not well addressed in the pantheon of digital forensics resources.  The material is well suited for...

View Article

Image may be NSFW.
Clik here to view.

Forensic Examination of FrostWire version 5

As digital forensic practitioners, we are faced regularly with users utilizing the internet to swop and download copyrighted and contraband material. Peer to peer (P2P) applications are commonly used...

View Article

Image may be NSFW.
Clik here to view.

Researchers Show How to Crack Android Encryption

As forensic examiners, some of the last things we want to hear are "encryption" and "enabled" in the same sentence, however that's what has been happening with the current line of Android devices....

View Article

Image may be NSFW.
Clik here to view.

Apple phones are AES-tough, says forensics expert

Monday's Technology Review carries a glowing tribute to Apple iPhone security according to its author, Simson Garfinkel, a contributing editor who works in computer forensics and is highly regarded as...

View Article


Image may be NSFW.
Clik here to view.

Webinar: Windows 8 Forensics - A First Look

Take a first look at Windows 8 forensics in a webinar presented by Josh Brunty, Assistant Professor of Digital Forensics at Marshall University. Learn about the changes in Windows 8 which forensic...

View Article

Image may be NSFW.
Clik here to view.

Generating computer forensic supertimelines under Linux: A comprehensive...

When the authors first published this paper, their intentions were to develop a comprehensive guide to digital forensic timelines in order to consolidate the many fragmented sources of information...

View Article


Image may be NSFW.
Clik here to view.

Computer Analysts and Experts – Making the Most of GPS Evidence

by Professor David Last The many companies that sell software for computer forensics have developed products for analysing satellite navigators. Police high tech crime units and independent...

View Article

Image may be NSFW.
Clik here to view.

JADsoftware - The Company Behind IEF - Re-Launches As Magnet Forensics Inc.

JADsoftware, the company behind the industry-leading digital forensics product Internet Evidence Finder (IEF), announced on Monday that they have re-launched the company under a new name - Magnet...

View Article


Image may be NSFW.
Clik here to view.

Windows 8 Forensics webinar - alternative URL

Sincere apologies to anyone having difficulty connecting to the Meetingburner service to view the Windows 8 Forensics presentation - please try the following URL on YouTube...

View Article

Image may be NSFW.
Clik here to view.

Interview with Philip Anderson, Senior Lecturer at Northumbria University

Philip, can you tell us something about your background and why you decided to teach digital forensics? I graduated from Northumbria University with a BSc (Hons) in Business Information Technology in...

View Article

Image may be NSFW.
Clik here to view.

Interview with Lindy Sheppard, F3 (First Forensic Forum) Secretary

Lindy, tell us something about the cases you have been involved in. I have been involved in quite a variety of cases, from counter terrorism to the importation of drugs, fraud, missing children and...

View Article
Browsing all 37 articles
Browse latest View live




Latest Images