1
  • Windows registry forensics: Investigating system-wide settings

    Information security forensic investigations can be a big job, but Windows registry command tools can make it easier. From querying autostart programs to getting the goods on every USB device ever connected to a particular Windows machine, these tools can streamline an investigation. Ed Skoudis...

    searchsecurity21,075 pointsBadges:
  • Black Hat 2007: Forensics software security holes revealed

    Researchers from iSEC Partners tell the Black Hat 2007 audience that the industry's leading forensics software is susceptible to attack.

    MMimoso3,355 pointsBadges:
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

    ITKE346,360 pointsBadges:
  • Black Hat DC: Feds seek new digital forensic tools

    The Defense Cyber Crime Center (DC3) is overwhelmed by the amount of data it must study, and director Jim Christy hopes the private sector can help with better forensic tools.

    searchsecurity21,075 pointsBadges:
  • CSRF exploit could tarnish forensics

    A former special agent will explain how attackers could take advantage of the vulnerability to muddle ongoing investigations.

    searchsecurity21,075 pointsBadges:
  • Should data from a corrupted workstation be transferred to a forensics laptop?

    If a Windows workstation is compromised, should the information be transferred to a forensics laptop? Or is it better to use USB pen drives or a Windows share? In this expert Q&A, Ed Skoudis explains the three options and decides which one is best.

    searchsecurity21,075 pointsBadges:
  • Digital forensic challenges in a cloud computing environment

    Cloud computing creates difficulties for digital forensic investigators.

    SearchCloudSecurity2,620 pointsBadges:
  • Gathering forensic data with CrowdResponse

    Video: Keith Barker of CBT Nuggets shows how to use CrowdStrike's security incident response tool, CrowdResponse, to gather forensic information.

    ITKE346,360 pointsBadges:
  • Digital Forensics Processing and Procedures

    In this excerpt from Digital Forensics Processing and Procedures, the authors provide insight on areas that will need to be considered when setting up a forensic laboratory.

    ITKE346,360 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following