• Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8, Fourth Edition

    In this excerpt of Windows Forensic Analysis Toolkit, author Harlan Carvey discusses what Volume Shadow Copies are and how they affect forensic analysis in Windows 8.

    ITKE354,800 pointsBadges:
  • Hacking forensics: Windows command-line tools for the modern era

    It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised.

    ITKE354,800 pointsBadges:
  • Windows registry forensics: Investigating system-wide settings

    Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever connected to a particular Windows machine, these tools can streamline an investigation. Ed Skoudis...

    searchsecurity21,900 pointsBadges:
  • Black Hat 2007: Forensics software security holes revealed

    Researchers from iSEC Partners tell the Black Hat 2007 audience that the industry's leading forensics software is susceptible to attack.

    MMimoso3,355 pointsBadges:
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

    ITKE354,800 pointsBadges:
  • Black Hat DC: Feds seek new digital forensic tools

    The Defense Cyber Crime Center (DC3) is overwhelmed by the amount of data it must study, and director Jim Christy hopes the private sector can help with better forensic tools.

    searchsecurity21,900 pointsBadges:
  • CSRF exploit could tarnish forensics

    A former special agent will explain how attackers could take advantage of the vulnerability to muddle ongoing investigations.

    searchsecurity21,900 pointsBadges:
  • Should data from a corrupted workstation be transferred to a forensics laptop?

    If a Windows workstation is compromised, should the information be transferred to a forensics laptop? Or is it better to use USB pen drives or a Windows share? In this expert Q&A, Ed Skoudis explains the three options and decides which one is best.

    searchsecurity21,900 pointsBadges:
  • Digital forensic challenges in a cloud computing environment

    Cloud computing creates difficulties for digital forensic investigators.

    SearchCloudSecurity2,890 pointsBadges:
  • Gathering forensic data with CrowdResponse

    Video: Keith Barker of CBT Nuggets shows how to use CrowdStrike's security incident response tool, CrowdResponse, to gather forensic information.

    ITKE354,800 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following