Two Real Network Forensics Analysis FORENSICS ANALYSIS RELATED WITH THE ATTACKS TO PHP.NET AND THE BOSTON BOMBS.
We could say that we live an era where the signature-based Antivirus has less...
Dear eForensics readers!
Here is a free teaser of USB Forensics issue. What you will find inside:
HOW TO PERFORM FORENSICS ON USB MASS STORAGE DEVICES – PART 1: USB BASICS
USB mass storage devices have become the standard for backup and transfer of files. The popularization of this media has led to challenges for forensic specialists used to traditional magnetic media. This first article in a multi-part series will provide a necessary overview of how USB devices work at a low level.
HOW TO FORENSIC USB DEVICES
In this article there is a description of difficulties added to computer forensic by the diversity of devices that were included at investigation scope after the creation and popularization of USB interface. The principal focus will be the investigation at Windows environment, describing some characteristics of this operational system, how it deals with USB devices and the attention points for the forensic image acquisition.
HOW TO PERFORM FORENSICS ON USB MASS STORAGE DEVICES PART 2: UNDERSTANDING USB MASS STORAGE DEVICES
USB mass storage devices have become the standard for backup and transfer of files. The popularization of this media has led to challenges for forensic specialists trying to find data on fixed memory storage media instead of traditional magnetic media. This article in a multi-part series will provide readers with a basic understanding of how USB mass storage devices work at a low level.