File Integrity Monitoring
A look at how file integrity tools can help, post intrusion.
Genetic Algorithms & Digital Forensics
An introduction to using evolutionary techniques for forensic investigations.
Imaging 1000 Drives
What you need to understand about corporate digital forensic investigations.
Cell Site Analysis
Mapping the DNA of the communication infrastructure.
Cloning a Drive with Faulty Sectors
Research and test results in some detail.
Imaging a MacBook Air
Imaging Macs and the challenges of the new MacBook Air.
Detecting Commercial Grade Spyware
A look at commercial spyware and sandboxing.
Wireless Drones & Network Evidence
How to improve forensic readiness using wireless drones.
Criminal Profiling
Part 2 of Lucas Donatos’ detailed look at the phases of a computer hacking attack
Advanced Cyber Probes
Monitoring the Internet backbones
Plus all the regular features......