Search results

Jump to: navigation, search
  • Much of [[computer forensics]] is focused on the [[tools]] and [[techniques]] used by [[investigator]]s, but there are also a number of important [[pap ...Forensic Research Workshop (DFRWS) is about the Internet of Things (IoT). Analysis of devices and network data including a Smart TV Raspberry Pi and Amazon Ec
    8 KB (1,062 words) - 19:06, 30 October 2017
  • ...ish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives ev ...y recent drive except perhaps one or two levels via basic error-cancelling techniques. In particular the the drives in use at the time that this paper was origin
    2 KB (339 words) - 16:57, 16 April 2006
  • ILooK was the digital forensic analysis tool used in the investigation of the 9/11 attacks. Originally available on * Data capture, analysis, investigation and dissemination
    3 KB (463 words) - 01:45, 1 August 2018
  • ...nsic techniques''' try to frustrate [[forensic investigator]]s and their [[techniques]]. ...istence, amount and/or quality of evidence from a crime scene, or make the analysis and examination of evidence difficult or impossible to conduct
    13 KB (2,000 words) - 06:45, 19 May 2015
  • ...ysis_in_Digital_Forensics.pdf Discovering ephemeral evidence with Live RAM analysis] by Oleg Afonin and Yuri Gubanov, 2013 ...ods,%20Techniques%20and%20Issues.pdf Retrieving Digital Evidence: Methods, Techniques and Issues] by Yuri Gubanov, 2012
    5 KB (678 words) - 07:24, 21 December 2018
  • ...=411&pc= Forensic Science: An Introduction to Scientific and Investigative Techniques, Second Edition] |[http://www.awprofessional.com/title/0321268172 File System Forensic Analysis]
    8 KB (987 words) - 16:46, 3 November 2016
  • '''File analysis''' is an important part of [[computer forensics]]. [[Category:Analysis Techniques]]
    316 B (32 words) - 18:54, 5 August 2014
  • ...itioners need to process more and more data, it is likely that some of the techniques implemented by these tools will need to be adopted. ...graph-tool is an efficient python module for manipulation and statistical analysis of graphs (a.k.a. networks).
    9 KB (1,254 words) - 20:41, 6 April 2013
  • ...Consider use of one of many [[wireless preservation]] or [[RF isolation]] techniques. Note that the slightest signal leakage will allow an overwriting text mess ...urces/publications/forensic%20analysis%20of%20mobile%20phones.pdf Forensic Analysis of Mobile Phones]
    6 KB (762 words) - 21:02, 10 October 2017
  • ...the [[operating system]], and the overall state of a computer. Because the analysis is highly dependent on the operating system, it has been divided into the f * [[Linux Memory Analysis]]
    10 KB (1,404 words) - 04:46, 13 October 2017
  • ...to extract higher-level information about the state of the system a memory analysis tool is required. ==Linux Memory Analysis Tools==
    7 KB (908 words) - 02:32, 28 March 2017
  • ...e in performing a range of studies such as the developing of new forensic techniques and the sanitization practices of computer users. ...tributed a set of disk images and asked participants to conduct a forensic analysis of a compromised computer. Entries were judged and posted for all to see. T
    9 KB (1,335 words) - 18:24, 6 February 2014
  • ...ting digital forensics investigators and examiners; and develop new tools, techniques, and methodologies. Throughout the 10 1/2 month contest starting on 15 Dec ...ests that included: Audio steganography, real vs. computer generated image analysis, Linux [[Logical Volume Manager (Linux)|LVM]] data carving, and recovering
    15 KB (2,166 words) - 16:44, 6 June 2012
  • ...with programs like [[PEiD]] and [[PeExplorer]]. Finally, the most complete analysis can be done with debuggers like [[IDA Pro]] and [[OllyDbg]]. == Malware techniques ==
    12 KB (1,412 words) - 18:14, 13 April 2016
  • * Online Social Network Analysis === Volume/File System analysis ===
    4 KB (631 words) - 06:29, 28 April 2019
  • ...ail?csnumber=44381 ISO/IEC 27037:2012 - Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation ....htm?csnumber=44405 ISO/IEC DIS 27041 - Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative
    5 KB (751 words) - 15:04, 21 March 2018
  • |Essential Forensic Techniques (EFT) I and II Training ...ackbagtech.com/training/courses/essential-forensic-techniques-i-triage-and-analysis.html
    10 KB (1,341 words) - 15:47, 27 June 2019
  • ...e of leading-edge biometrics verification techniques. We discuss biometric techniques in general and focus upon the usability phases and issues, associated with ...= {As a result of the evolution in the field of biometrics, a new breed of techniques and methods for user identity recognition and verification has appeared bas
    14 KB (1,919 words) - 19:48, 26 November 2007
  • title = {Data mining: concepts and techniques by Jiawei Han and Micheline Kamber}, title = "Forensic feature extraction and cross-drive analysis",
    4 KB (436 words) - 18:40, 3 November 2008
  • ...ion about a non-booting drive which can then be sent to a tech for further analysis. Those more familiar with such procedures should find TestDisk a handy tool
    4 KB (503 words) - 15:49, 2 January 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)