
File | |
---|---|
eForensics-Magazine-22_08_12o1.pdf |
WINDOW INTO THE WORLD OF SUPERVISING DETECTIVE INVESTIGATOR SHAUN WINTER BY LIORA FARKOVITZ
Enjoy this intriguing interview with Shaun Winter who is the head of the Special Investigations Unit Computer Forensics Lab. Shaun shares an interesting perspective of work in the Information Technology (IT) Department.
WHAT’S SO DIFFERENT ABOUT CYBERCRIME?
by Bob Bird
Mr. Bob Bird, Lecturer in Forensic Computing and Ethical Hacking in the Engineering and Computing Faculty at Coventry University, UK, will try to answer the question: “What’s so different about Cybercrime?” This article discusses problems associated with eCrime.
PACKET CAPTURING FOR FORENSICS INVESTIGATIONS
by Łukasz Kaczorowski
In this article, the author discusses two of the more popular packet sniffers in Network forensics world: Wireshark and NetworkMiner. Read this to discover how packet sniffers work and which of these two programs might better suit your needs.
RECOVERING IE HISTORY USING PASCO
by Carlos Cajigas
The article is a useful tutorial that teaches how to use Pasco in Linux Ubuntu for Recovering IE History. Helpful illustrations clarify the subject matter.
Capturing Instant Messages with Packet Capture Technologies
by Nicholas Miter
This article discusses some of the principals of packet capture and provides a simple example of a forensic tool, capturing instant messaging traffic and storing it in a Microsoft SQL Database Server. Many forensic toolkits support importing data from commercial database systems.
AN INTRODUCTION TO IMAGE AND VIDEO FORENSICS
by Martino Jerian
Surveillance cameras, photo enabled cell phones, and fully featured digital cameras are present almost everywhere in our lives. Martino Jerian presents an introduction to image and video forensics.
THE ACCIDENTAL FORENSIC EXPERT
by Herbert Rawlinson
Plus, a very interesting article written by Herbert Rawlinson, an experienced specialist in the area of Forensic 3D Imagery–a “must read,” if you’re into criminal tales and CSI!
File | |
---|---|
eForensics-Magazine-22_08_12o1.pdf |