Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security management, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
What tools do you use to perform network forensics? Do you have any favorites, and why?
I am currently a final year student studying forensic computing. i was hoping someone could give me some information regarding network forensics, i would like to know if there is a need for development in this area, what is the current views on networking with regards to gathering of forensic data...
Hello, I am using CISCO VPN. We have users that connect to our company's location using CISCO VPN. 1) Can we find out where they are located. Like what state they are connecting from. Any way to trace this?