• How network forensics analysis tools turn admins into detectives

    Network traffic capture, sophisticated analysis and forensics capabilities make network forensics analysis tools useful in making security assumptions and allocating resources.

    ITKE407,620 pointsBadges:
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

    Margaret Rouse18,425 pointsBadges:
  • Does your organization perform forensic analysis of virtual machine disks?

    WebEditor250 pointsBadges:
  • How to perform a forensic acquisition of a virtual machine disk

    Virtualization expert Paul Henry provides a step-by-step guide to imaging a virtual machine disk (*flat.vmdk) in a forensically sound manner.

    WebEditor250 pointsBadges:
  • Forensic mobile phone work reveals threat to all of us

    There are certain things you do not want to share with strangers. In my case it was a stream of highly personal text messages from my husband, sent during the early days of our relationship. Etched on my phone's SIM card - but invisible on my current handset and thus forgotten - here they now are,...

    ITKE407,620 pointsBadges:
  • Hacking forensics: Windows command-line tools for the modern era

    It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised.

    searchsecurity25,340 pointsBadges:
  • Do’s and don’ts of building a forensics workstation

    Elizabeth Genco explains the pros and cons of building a forensics workstation from scratch. Read now to learn what forensic tools are beneficial and which ones aren't.

    ITKE407,620 pointsBadges:
  • How a computer forensics investigation put two behind bars

    A computer forensics investigation lead by a computer-savvy investigator followed a network trail from a murder probe to a digital trove of child pornography.

    ITKE407,620 pointsBadges:
  • Four computer forensics books worth investigating

    Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.

    ITKE407,620 pointsBadges:
  • Rise of anti-forensics techniques requires response from digital investigators

    The rise of cyber threats is putting a strain on those trying to combat the problem but as Nick Booth finds out if you have the right skills these could be lucrative times

    MicroScope315 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following