• How network forensics analysis tools turn admins into detectives

    Network traffic capture, sophisticated analysis and forensics capabilities make network forensics analysis tools useful in making security assumptions and allocating resources.

    ITKE364,055 pointsBadges:
  • How security market needs transformed Network Flight Recorder

    Marcus Ranum's Network Flight Recorder was poised as a forensics tool when the market demanded IDSes -- so it adapted accordingly.

    ITKE364,055 pointsBadges:
  • Black Hat 2007: Forensics software security holes revealed

    Researchers from iSEC Partners tell the Black Hat 2007 audience that the industry's leading forensics software is susceptible to attack.

    MMimoso3,355 pointsBadges:
  • forensic

    Forensic, in a general sense, means "related to or used in courts of law" or "used for formal public debate or discussion.

    Margaret Rouse7,270 pointsBadges:
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

    ITKE364,055 pointsBadges:
  • Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8, Fourth Edition

    In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8.

    ITKE364,055 pointsBadges:
  • Hacking forensics: Windows command-line tools for the modern era

    It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised.

    ITKE364,055 pointsBadges:
  • Windows registry forensics: Investigating system-wide settings

    Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever connected to a particular Windows machine, these tools can streamline an investigation. Ed Skoudis...

    searchsecurity22,820 pointsBadges:
  • Black Hat DC: Feds seek new digital forensic tools

    The Defense Cyber Crime Center (DC3) is overwhelmed by the amount of data it must study, and director Jim Christy hopes the private sector can help with better forensic tools.

    searchsecurity22,820 pointsBadges:
  • CSRF exploit could tarnish forensics

    A former special agent will explain how attackers could take advantage of the vulnerability to muddle ongoing investigations.

    searchsecurity22,820 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following