If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
You need a JavaScript-enabled browser to view this Publication
Please follow these steps to view the Publication:
Enable JavaScript in your browser
Refresh this page
Best regards
Zmags
Digital
The Quarterly Magazine for Digital Forensics Practitioners
Competition!
ForensicS
Books, books and
yet more books…
ISSUE 06
/ magazine 1 FEBRUARY 2011
INSIDE
/ Scott Zimmerman ON
Search & Seizure
/ Wi-Fi Forensics
/ Criminal Profiling
/ Operational Forensics
on the Mac
CYBER SECURITY
SITUATIONAL AWARENESS
Ian Murphy looks at how Digital Forensics techniques 01
& tools are used as a result of Situational Awareness
9 772042 061110
Issue 6 / £11.99 TR Media
/ REGULARS / INTRODUCING / Book Reviews / FROM THE LAB
LEGAL NEWS, 360, ROB LEE'S brand new
Digital The Quarterly Magazine for Digital Fore
Shape your future Forensic Computing MSc Fo
EDITORIAL T
Reviewing the latest sports highlights
CONTENTS / DIGITAL FORENSICS MAGAZINE
/ NEWS NEWS F3 Conference This yea
made to begin closing its services over time. The
Mobile Development from Apress The lar
360° HGet Involved aving receiv
/ LETTERS Comment on RAM Capture Article I agr
/ FEATURE ON TRIAL – IMAGING TOOL PERFORMANCE
/ FEATURE Requirements Description DI-RM-
Functionalities FTK Imager Version 2.9.0
Cell site analysis Computer forensics Audio vi
/ ROBSERVATIONS ROBSERVATIONS Challenge: What
/ FEATURE NETFLOW FORENSICS Innocent or Guil
Internet Protocol (IP) address, or search for all
/ FEATURE
/ FEATURE an external IP address, service or
COMPETITION / This issue we have four great books
/ FEATURE CYBER SECURITY SITUATIONAL AWARENES
Being able to provide this “view from the bri
/ FEATURE / Data Fusion So what is data fusion?
Figure 2 – Data Fusion Level table. An int
/ FEATURE
/ LEGAL EDITORIAL LEGAL EDITORIAL Welcome aga
/ LEGAL FEATURE PREPARING FOR SEARCH & SEIZURE
From the victim's point of view, this is the leas
/ LEGAL FEATURE Note that the third colu
A journaling filesystem records commands destined
/ LEGAL NEWS ALERT LEGAL NEWS ALERT A View fro
Expert Witnesses May be About to Lose Immunity fr
/ FEATURE WIFI FORENSICS Wireless Forensic In
· rogue access points – access points that do
/ FEATURE · How many clients where communicat
Forensic Computing 12-month stu
Ready for the Cloud access HTTPS web console,
/ FEATURE COMBAT FORENSICS – AN UNMET NEED M
Nation state activity is very different from
/ FEATURE and on-going information security t
the US. Federal law enforcement typically has mor
/ MEET THE PROFESSIONALS MEET THE DF PROFESSIO
How do you see the future of your research as it
Digital ForensicS / magazine Digital Forensics m
/ FEATURE WARPS – A FRAMEWORK FOR TIMELY INFOR
/ FEATURE Internet incident in the previous y
have been instances where the security patches th
/ FEATURE service that they might exchange da
/ APPLE AUTOPSY APPLE AUTOPSY Welcome to our n
/ FEATURE MAC OS X NETWORK PRIMER With the co
but this magic is just DDNS and some caching on t
/ FEATURE Figure 1. Simple Serv
online web store. Although the application needs
/ FEATURE FINDING A ROOTKIT & HIDDEN PROCESS W
(first 512 bytes) of a system boot disk, such that
/ FEATURE Figure 4.
IPSpooferExtreme.exe process is still running. In
/ FEATURE thinking it is loading a device dri
the PID's are set to 0. These processes have been
/ FEATURE Figure 15. Sus
/ FEATURE CRIMINAL PROFILING ALL PHASES OF A C
/ FEATURE / The Process to Choose a Target This
In the case of a mass attack, there is probably n
/ FEATURE tools can be detected through monit
BLADE FORENSIC DATA RECOVERY BLADE is a Wind
/ NEXT ISSUE COMING SOON… A roundup of featu
/ FEATURE STEGANOGRAPHY APPLICATION ARTIFACT D
/ FEATURE appending a file beyond the end-of-fi
Figure 1: Steganography application In the c
/ FEATURE Essentially, the difference bet
Digital ForensicS / magazine BACK ISSUES Issue
/ FEATURE DEALING WITH DIGITAL EVIDENCE BACKLO
on the specifics, including tactics and methods, o
/ FEATURE some lower-level work to field inves
the evidence. Time becomes of the essence to coll
/ BOOK REVIEWS BOOK REVIEWS Dissecting the Hac
introduces why I believe the book is excellent va
MD5 are recognised as one of the leading digital
/ GET INVOLVED GET INVOLVED / Authors As we c
/ COLUMN IRQ Opinions and conflicts and standards
BLADE FORENSIC DATA RECOVERY BLADE is a Wind
Digital Forensics for an Evolving World May 201