Security Corner:

Cyber Forensics

1

June 18, 2009  9:29 PM

How to Use the Windows Registry for Cyber Forensics: Part 2



Posted by: Ken Harthun
Cyber Forensics, Cybercrime, Encryption, Hacking, Intrusion detection

In Part 1 of this series, I introduced you to the concept of date/time coincidence and we explored five registry keys that are useful to the forensic examiner. This time, I'll show you how data can be encrypted and hidden in the registry. If you're involved in data security, you're familiar with...

May 27, 2009  8:25 PM

How to Use the Windows Registry for Cyber Forensics: Part 1



Posted by: Ken Harthun
Computer Forensics, Cyber Forensics, Cybercrime, Microsoft Windows, Security, Windows Registry

I recently completed the free SANS mini-course on cyber forensics (see my post, Free Mini-courses from SANS). That course could not have shown up at a more opportune time as I had just...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: