(no subject)

Date: 2004-01-26 03:05 pm (UTC)
I've seen our top forensic expert explain to a system owner in detail the actions that had been (lied about) and taken to hide data, obscure data, and wipe data, the programs the defendant had used to do it, the day and time each action was taken, and what the defendant had said in IM and email right around each action.

Forensic analysis at this level is definitely one my weaker points. While some of this is having the right tools (e.g. EnCase), finding good information on how to do this has been incredibly challenging. Do you (or your expert) have any good pointers?

-Mort
This account has disabled anonymous posting.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

Profile

doc_strange: (Default)doc_strange

April 2025

S M T W T F S
  12345
67891011 12
13141516171819
20212223242526
27282930   

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 3rd, 2025 03:30 pm
Powered by Dreamwidth Studios