Access control, Antivirus, Antivirus software, Application security, Auditing, Authentication, Biometrics, Current threats, cybersecurity, Digital certificates, Encryption, Endpoint security, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information risk management, Information security, Intrusion management, ISA Server, ISA Server 2006, malware, McAfee, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security in 2010, Security management, Security products, Security Program Management, Security tokens, SFTP, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Viruses, vulnerability management, Web security, Windows firewall, Windows Security, worms VIEW ALL TAGS
What tools do you use to perform network forensics? Do you have any favorites, and why?
I am currently a final year student studying forensic computing. i was hoping someone could give me some information regarding network forensics, i would like to know if there is a need for development in this area, what is the current views on networking with regards to gathering of forensic data...
Hello, I am using CISCO VPN. We have users that connect to our company's location using CISCO VPN. 1) Can we find out where they are located. Like what state they are connecting from. Any way to trace this?