Forensics Mode:
(Page 3 of 84)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Ruxcon 2010 Final Call For Papers 2010-08-20
cfp ruxcon org au


RUXCON 2010 FINAL CALL FOR PAPERS

Ruxcon would like to announce the final call for papers for the sixth annual Ruxcon conference.

This year the conference will take place over the weekend of 20th and 21st of November.

Ruxcon will be held at CQ, Melbourne, Australia.

The deadline for submission

[ more ]  [ reply ]
raw2vmdk - Mount raw images as VMware virtual disks 2010-06-17
Tasos Laskos (tasos laskos gmail com)
Hello to the list,

I recently wrote a little tool, raw2vmdk, that I'd like to share with
you and get some feedback.

raw2vmdk is a utility that enables users to mount raw hard drive images,
like images created with dd,
to a VMware virtual machine without the need to convert the entire image
to a

[ more ]  [ reply ]
AVTECH 773M video files recovery 2010-05-31
Marco Leone (mfoolb gmail com) (2 replies)
Hi,

I'm trying to recovery video data from a disk used with a DVR AVTECH
773-m (ADV7171 chipset); if I insert this disk into the DVR it can't
read it giving an empty disk error. I'm quite sure the data is still
into the disk.

It seems that the DVR write raw data to the disk, none of the tools
I've

[ more ]  [ reply ]
Re: AVTECH 773M video files recovery 2010-06-02
Steven H. Margolis (shm aero org)
Re: AVTECH 773M video files recovery 2010-05-31
Michael Painter (tvhawaii shaka com)
On-Demand Penetration Testing Webcasts with Ed Skoudis of SANS 2008-11-11
sfa securityfocus com
As a security pro, it's important to periodically stop, take a break, and refuel your brain. Once per month, Core Security Technologies does the same thing and invites industry thought leaders to share their insights through educational webcasts offering security testing tips, tricks and strategies.

[ more ]  [ reply ]
CCE training opportunities in June... 2008-05-18
Gary Kessler (gary kessler champlain edu)
Hi all!

Champlain College, in partnership with the International Society of Forensic Computer Examiners (ISFCE), is going to be offering two Certified Computer Examiner (CCE) Bootcamp courses in June:

o June 9-13 in Burlington, Vermont
o June 23-27 at Bunker Hill Community College in Boston

[ more ]  [ reply ]
CfP hack.lu 2008 2008-05-16
info (info hack lu)
Call for Papers Hack.lu 2008

The purpose of the hack.lu convention is to give an open and free
playground where people can discuss the implication of new technologies
in society.

hack.lu is a balanced mix convention where technical and non-technical
people can meet each others and share freely

[ more ]  [ reply ]
Re: Verify alternation and tracing the source of digital photos 2008-05-13
mark_thurber comcast net
Unless you have a MD5 or SHA value of the original it is a pretty daunting task. I came across this article from wired while doing a research paper. Here is the link. http://www.wired.com/gadgets/digitalcameras/news/2007/03/72883

-----------------------------------------------------------------
Unc

[ more ]  [ reply ]
[Fwd: NZ cops get 'COFEE' to capture PC evidence] 2008-05-03
atrav (atrav copper net)
Interesting news from New Zeland, I wonder how to get a copy. ;o)
-Aron-

-------- Original Message --------

http://www.stuff.co.nz/4507443a28.html

NZ cops get 'COFEE' to capture PC evidence
NZPA | Saturday, 03 May 2008

New Zealand police have been given a small plug-in device that
investigators

[ more ]  [ reply ]
Verify alternation and tracing the source of digital photos 2008-02-01
Frankie Li (securityf cheesy ca)
Hi List,

A case of digital photos circulated on the Internet formus, I need your
helps in find out answers for 2 answers:

1. Are there any tools that we could used to verify if a digital photo
has been altered?

2. As those photos are posted on various formus, how to trace back the
origin

[ more ]  [ reply ]
Advice on transferring forensic image 2007-12-04
Stefan Kelm (stefan kelm secorvo de)
Folks,

one of my cases has been going on for almost half a year
now. Unfortunately, I now do have the need to transfer
the forensic dd image to another target disk which will
then become the case disk.

Is there anything other than the usual stuff (securely
erase the 'new' disk, create checksums be

[ more ]  [ reply ]
Call for Papers -- Journal of Digital Forensics Practice 2007-11-26
Gary Kessler (gary kessler champlain edu)
Hi all!

My apologies for any duplicate posts!

Attached is a Call for Papers for the next issue of the Journal of Digital Forensics Practice. We are specifically seeking practitioner articles for this peer-reviewed, high-quality publication.

Feel free to contact me or editor-in-chief Marc Rogers

[ more ]  [ reply ]
Re: Converting an external hard drive enclosure into a write blocker? 2007-11-25
jnemeth victoria tc ca (John Nemeth)
On Apr 12, 4:47am, Terry Roebuck wrote:
}
} A*nix mount with DD would be my option of choice, but for windows, I
} hesitatingly ask could you not modify an IDE cable to make any connected
} drive 'read-only' (might require a resistor - not sure if you can just
} clip a wire? - maybe some one wit

[ more ]  [ reply ]
Re: Converting an external hard drive enclosure into a write blocker? 2007-11-25
Krassimir Tzvetanov (krassi krassi biz) (1 replies)
Well this is a little one sided.

When you are preserving a hard disk you want a snapshot in the moment
it was seized. This would mean that you should not do any alteration
after that point and I'll ask you to consider two cases that will show
you where I come from.

1. The journal replay may overwr

[ more ]  [ reply ]
Re: Converting an external hard drive enclosure into a write blocker? 2007-11-20
Stefan Kelm (stefan kelm secorvo de) (1 replies)
> you can mount the storage as read-only - any unix filesystem will
> support read-only mount, and provided your root account isnt
> compromised, no one can remount it as write. Root cant write to
> read-only mounted filesystems without remount either.
>
> mount -r /dev/da2 /readonly in BSD land..

[ more ]  [ reply ]
Re: Converting an external hard drive enclosure into a write blocker? 2007-11-26
Terry Roebuck (terry roebuck usask ca)
RE: [Fwd: AOL file structure and utilities] 2007-11-18
Greg Kelley (gkelley vestigeltd com)
We have used ePreserver Forensic for pfc files.

http://www.connectedsw.com/Overview/36400.

Greg Kelley, EnCE
Vestige, Ltd

-----Original Message-----
From: listbounce (at) securityfocus (dot) com [email concealed] on behalf of James G. McIntyre
Sent: Fri 11/16/2007 12:01 PM
To: forensics (at) securityfocus (dot) com [email concealed]
Cc:
Subject:

[ more ]  [ reply ]
Re: Converting an external hard drive enclosure into a write blocker? 2007-11-17
forensics mialta com
If it is a USB enclosure and you have Windows XP service Pack 2 use

the USB write Protect.

http://www.m2cfg.com/usb_writeblock.htm

Turn write block on before plugging in the drive.

Thanks

Mike

[ more ]  [ reply ]
Re: Converting an external hard drive enclosure into a write blocker? 2007-11-17
jnemeth victoria tc ca (John Nemeth)
On Apr 5, 3:35pm, Tom Yarrish wrote:
}
} I wanted to find out if there was a method to convert an external
} hard drive enclosure into a "cheap" write blocker device? I'm not

The only difference between read and write is the command issued.
You would need an intelligent adapter that sit

[ more ]  [ reply ]
Re: Log in as administrator with live data collection CD? 2007-11-16
keydet89 yahoo com
Matt and Kelly,

> I guess there is one point here that leads to

> possible issues a cd to forensically collect

> evidence for law enforcement would require that

> you collect the data with a device that could

> not write to the hard disk,

What if you could collect the data you needed, b

[ more ]  [ reply ]
[Fwd: AOL file structure and utilities] 2007-11-16
James G. McIntyre (jim McintyreSecurity com)

Anyone know of any docs or utilities for analyzing AOL files, for example
pfc and feedbag etc. ?

Any assistance would be appreciated.

Jim Mc....

--

--
James G. McIntyre
Senior Consultant
SANS/GIAC - GCIA Certified Intrusion Analyst
- GCFW Certified Firewall Analyst
- GAWN

[ more ]  [ reply ]
(Page 3 of 84)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus