In This Issue
Issue 30 - Out now!
Here's a quick review of some of the main articles within Issue 30
Issue 30 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.
Here's just a few of the fantastic articles inside Issue 30...
UDP-Based Amplification Attacks
We’ve all heard of a Denial of Service Attack (DDoS), and some of us may have heard of a Distributed Reflective Denial of Service Attack (DRDoS). They are synonymous to both the reflection attack in traditional terms and to a more best of breed amplification attacks. Desmond Collins explains.
Windows Anti-Forensics
Nihad Hassan investigates the practice of Advanced Data hiding techniques using Alternative Data Stream in Windows NTFS.
Cloud Technology Vulnerabilities
Virtualisation technologies are vulnerable to all the attacks that are found in software applications and networking environments. The big difference however is that virtualisation technologies are software and hardware complexities that add extra layers of potential for attack. Brian Cusack investigates.
Vehicles Solve Crime
Two Global Industry Leaders Align to Offer Investigators Unparalleled Capabilities for Data Extraction and Vehicular Forensics. Josh Grossman explains the thoughts behind the collaboration.
Mathematica
Richard Carbone continues his series of articles into advanced image visualization and image content identification (ICI) using Mathematica
Plus all the regular features, news, our legal section and From The Lab...
Login to read online or Subscribe today!