Colapse all |
Post message
Re: Determining that someone is not the author of an offensive email 2007-05-30 Flavio Silva (flavioabs gmail com) Re: Determining that someone is not the author of an offensive email 2007-05-31 Flavio Silva (flavioabs gmail com) OK Anna, thank you for your answer.I suggested to the defence counselor to call the ISP administrator, and the administrators of both servers. I don't know if she will do it, or if it is possible in this case. Regards Flavio On 5/29/07, Angelacci, Anna M CTR SPAWAR, J616 <anna.angelacci (at) navy (dot) mil [email concealed] [ more ] [ reply ] Re: Determining that someone is not the author of an offensive email 2007-05-30 Flavio Silva (flavioabs gmail com) (1 replies) Hi Gleyson, thanks for your answer. On 5/29/07, Gleyson Melo <gleysonmelo (at) gmail (dot) com [email concealed]> wrote: > Hi Flavio, > > I'm not really an expert, but I tought some things about the case. > > 1) I guess you tought in this but.. You may see with defense layer if > S is really innocent. Otherwise, I don't guess [ more ] [ reply ] Re: Determining that someone is not the author of an offensive email 2007-05-30 Gleyson Melo (gleysonmelo gmail com) recommendations/experience with CD/DVD autoloader 2007-05-29 Glenn Dardick (gdardick dardick net) (1 replies) As the drives are getting larger and larger it is becoming more of a pain to submit forensic images on optical media. Any thoughts/experience with the following: 1) preference/insistence by courts of forensic images on specific type of media (hard disk drive, optical media, tape) 2) pricing/relia [ more ] [ reply ] Re: Doing Forensics on a bit torrent posts. 2007-05-29 ediscovery inicom net Terry It should be possible to analyse the torrent seed or the tracker logs if you can get access to those. I briefly looked up the specs of torrent files and there could be some information in there. Have a look at the below link, grab the torrent file (before it gets out of hand and several peo [ more ] [ reply ] Determining that someone is not the author of an offensive email 2007-05-28 Flavio Silva (flavioabs gmail com) (3 replies) Hi all! I am trying to help a defence lawier in this situation. Someone sent an anonimous email to a lot of destinations. The message (M) is offensive to a company (C) president (P). After 3 months, a lawier company (L) specialized in Internet cases made C: 1st. to request an analysis from a speci [ more ] [ reply ] Re: Determining that someone is not the author of an offensive email 2007-05-29 Gleyson Melo (gleysonmelo gmail com) RE: Determining that someone is not the author of an offensive email 2007-05-29 Glenn Dardick (gdardick dardick net) Re: Determining that someone is not the author of an offensive email 2007-05-29 Justin Alcorn (justin jalcorn net) Doing Forensics on a bit torrent posts. 2007-05-27 Terry Cutler (jedi31337 gmail com) (2 replies) hi Everyone, I was wondering if it's possible to find out where an upload originated from. Example, My employer's courseware was pirated on Bit Torrent and I'd like to know who uploaded it or at least knoq what area it came from. Any tips ? thanks in advance ! -- ./Terry Cutler Master CNE , CDE [ more ] [ reply ] Re: Doing Forensics on a bit torrent posts. 2007-05-28 Simson Garfinkel (simsong acm org) (1 replies) DFRWS Forensics Challenge Update / Reminder 2007-04-27 Brian Carrier (carrier digital-evidence org) The DFRWS 2007 Forensics Challenge was announced a couple of months ago and this e-mail is to remind you and to notify you that we changed the rules slightly. The 2007 challenge is about data carving, which is a file recovery technique that is frequently used during digital investigations. [ more ] [ reply ] Intensive Training Program 2007-04-15 Eoghan Casey (eco digital-evidence net) As some of you already know, I have developed a new training program for digital forensic examiners and computer security professionals. This unique series of workshops emphasizes the role of digital forensics in an organization's information assurance efforts, teaching practitioners the sk [ more ] [ reply ] RE: message-id formatting 2007-03-30 Glenn Dardick (gdardick dardick net) All, My apologies, I thought I had sent out the following to the list, but it only went to Santiago. It is a summary of what we found. Also, the famkruithof.net links were very informative as well as Wiki entries on UUIDs and GUIDs Regards, Glenn ================================================= [ more ] [ reply ] |
Privacy Statement |
On 5/29/07, Robert Turner <Rturner (at) hollandhospital (dot) org [email concealed]> wrote:
>
> It seems as all the evidence found could have been spoofed or faked. Email
> addresses and IPs and time stamps on files can be changed to both hide the
> original sender as well as implicate a th
[ more ] [ reply ]