Computer Forensics and IR - What's New?

A blog dedicated to the bleeding edge in Computer Forensics and Incident Response.

Sunday, April 10, 2011

IEF - great new updates including Gigatribe Chat!

›
Being a user of IEF since near it's inception, I have seen the product grow from an "add on" tool, to one that should almost ...
3 comments:
Sunday, November 14, 2010

Windows Event Logs and F-Response

›
I have been looking to better define my ability to identify, preview and analyze Windows logs.  When I am looking at identifying key informa...
1 comment:
Monday, October 25, 2010

Blackberry IPD files and FTK 3.2

›
I was curious as to FTK's ability to analyze RIM Blackberry IPD files.  I imported 7 backup files - some were "Autobackups" ...
Friday, October 22, 2010

Updated Windows Registry and Mac resources & Jad's Software....updated

›
As several sites have rightfully pointed out.... Accessdata has made a huge jump ahead with their recent release of FTK Imager v3.0 .  (not...
9 comments:
Sunday, October 3, 2010

Kindle 3G Wireless Reading Device - forensically speaking

›
Having just acquired the new model of Kindle , I got to wondering what kind of information was stored on the device and if necessary, how wo...
4 comments:
Thursday, September 23, 2010

Caine v2.0 - Newlight released !

›
The newest version of Caine , a forensics live Linux distro, has been released. Some of the 20 new tools include MountManager, SSDeep, Air v...
Wednesday, September 8, 2010

Google Voice - Call phones - lovin' the log!

›
I decided to give Google Voice a try - was kind of difficult to ignore the "reminder" that popped up each time I logged into a GMa...
4 comments:
Wednesday, August 18, 2010

Want to learn Python....for free?

›
It's been more than a few years since I took my programming classes and to be honest, it's difficult to keep a skill unless you use ...
Monday, August 2, 2010

"The Missing Link" in my computer forensic training.....Network Forensics!

›
Over the years, I've taken several classes in computer forensics (vendor specific and neutral), information security and networks. Back ...
8 comments:
Sunday, July 11, 2010

What's next in Volume Shadow Copies...?

›
Having just attended a presentation by Mark McKinnon ( RedWolf Computer Forensics ) and Lee Whitfield ( Disklabs and Forensic4cast ) at the...
1 comment:
›
Home
View web version
Powered by Blogger.