Forensics in Spanish
Fundamental Computer Investigation Guide For Windows Feb 15 2007 02:13AM
Jeimy José Cano Martínez (jcano uniandes edu co)

Estimados profesionales,

Adjunto documento liberado por Microsoft que puede ser de nuestro interés.
Fundamental Computer Investigation Guide For Windows
Published: January 11, 2007

Internet connectivity and technological advances expose computers and computer
networks to criminal activities such as unauthorized intrusion, financial
fraud, and identity and intellectual property theft. Computers can be used to
launch attacks against computer networks and destroy data. E-mail can be used
to harass people, transmit sexually explicit images, and conduct other
malicious activities. Such activities expose organizations to ethical, legal,
and financial risks and often require them to conduct internal computer

This guide discusses processes and tools for use in internal computer
investigations. It introduces a multi-phase model that is based on
well-accepted procedures in the computer investigation community. It also
presents an applied scenario example of an internal investigation in an
environment that includes Microsoft® Windows®â??based computers. The
investigation uses Windows Sysinternals tools (advanced utilities that can be
used to examine Windowsâ??based computers) as well commonly available Windows
commands and tools.


Jeimy J. Cano, Ph.D, CFE
Universidad de los Andes
Bogota, D.C

Editor of "Critical Reflections on Information Systems. A systemic approach"

Este correo y su contenido son confidenciales y exclusivos para su
destinatario. Si usted recibe este mensaje por error o no es el destinatario
del mismo, por favor s�rvase eliminarlo y notificarle a su originador. As�
mismo, todas las ideas y reflexiones expresadas en esta comunicaci�n
corresponden al originador del correo y NO representa la posici�n oficial de
This email is intended only for the addressee(s) and contains information which
may be confidential, legally privileged. If you are not intended recipient
please do not save, forward, disclose or copy the content of this email. Please
delete it completely from your system and notify originator.Finally, all
ideas expressed in this communication are personal comments and NOT represent
official position of his employer.

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus