If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
You need a JavaScript-enabled browser to view this Publication
Please follow these steps to view the Publication:
Enable JavaScript in your browser
Refresh this page
Best regards
Zmags
The Quarterly Magazine for Digital Forensics Practitioners
ISSN 9 772042 061110
Competition!
Win one of 3 copies of WinHex Professional
ISSUE 08
AUGUST 2011
INSIDE
/ e-Discovery Tools
/ Image Processing
/ Hacking the Cloud
/ Digital Forensics in Sri Lanka
LATENT SEMANTIC INDEXING
Dr Michael R Taylor explains why conceptual search is vital in the analysis of large multi lingual data sets
/ REGULARS / FROM THE LAB / INTRODUCING
/ Book Reviews
Robservations, 360, Ted Smith looks at our new FEATURE ON Digital Forensics
news, irq & more…
X-Ways Forensics
Biometrics & Forensics with Open Source Tools
Shape your future
Forensic Computing MSc Forensic Computing BSc Honours
Computer Security MSc Computer Security BSc Honours
To find out more visit dmu.ac.uk/technology or contact us:
T: (0116)
The Quarterly Magazine for Digital Forensics Pract
Shape your future Forensic Computing MSc Fo
EDITORIAL When we decided to have an issue of D
CONTENTS / DIGITAL FORENSICS MAGAZINE
/ NEWS NEWS Digital Investigations accelerated
Three computer forensic experts, Det. Sandra
Mobile Development from Apress The lar
/ FEATURE E-DISCOVERY TOOLS IN A FORENSIC INV
/ FEATURE
We generated bit-stream copies (images) of m
/ FEATURE documents about political parties.
/ LETTERS 360° TYour chance to have your say …
are having issues logging in or problems viewing
Cell site analysis Computer forensics Audio vi
/ LEAD FEATURE WHAT LIES BENEATH? In an incr
/ LEAD FEATURE / Do You Google? The majority of
/ Explosion of electronically searchable inform
/ LEAD FEATURE searching using LSI has been a
Fast-forward even 5 or 10 years later, and th
/ LEAD FEATURE / Email the primary source for e
once-academic technology a very real and practica
/ FEATURE HACKING THE CLOUD – SOCIAL ENGINEERI
Although we believe we have made a conscious deci
/ FEATURE · Attack – for us, in a test sc
/ Evidence Challenges Your first objective is ofte
/ ROBSERVATIONS ROBSERVATIONS Accur – Casey Tb
Reviewing the latest sports highlights
/ LEGAL EDITORIAL LEGAL EDITORIAL Welcome back
/ LEGAL FEATURE EXPLORING THE E-DISCOVERY PROC
(i) [outside the scope of this discussion] (ii) a
/ LEGAL FEATURE MODERN COMPUTER FORENSIC INVEST
After the examinations have been completed, t
/ LEGAL NEWS ALERT LEGAL NEWS ALERT Spring of
/ COMPETITION COMPETITION / this issue, we hav
/ MEET THE PROFESSIONALS MEET THE DF PROFESSIO
of us this is like speaking a foreign language. T
/ FEATURE BIOMETRICS AND DIGITAL FORENSICS Ju
/ FEATURE / Defining a biometric match A key qu
usability may prefer a relaxed configuration, whil
/ FEATURE In this respect, we are perhaps
/ CSA investigations Transaction times are an imp
ASSESSMENT VENDOR INDEPENDENCE t
/ APPLE AUTOPSY APPLE AUTOPSY Apple continues to
/ FEATURE E-DISCOVERY & THE MAC Since the las
Therefore we see these programs and services beco
/ FEATURE · From an Forensic Image like a .dm
· “Discovery Assistant” will then scan and bring
/ FEATURE DISCOVERING THE EASE OF X-WAYS FOREN
/ Creating a Case and Adding an Image Once that l
/ FEATURE depending on what options you have
represent the fact that they are now bookmarked.
/ FEATURE Figure 10. Directory browser
Forensic Computing 12-month stu
/ FEATURE VIDEO & IMAGE FORENSICS Johann Hofma
Teddy Cerra, President of Division Security C
/ FEATURE Figure 1. 01 – Seized
Figure 3. The first image on each row is the query
/ FEATURE / Frame extraction: Intelli- gent vs.
/ NEXT ISSUE COMING SOON… A Roundup of Feat
/ FEATURE
/ WHERE PROFILING COMES INTO THE GAME PROS & C
/ FEATURE For decades, authorship analysi
strategic information like defence engineering da
Maximise Prioritise Visualise Call IntaForen
FILE INTEGRITY MONITORING Scott Zimmerman continu
/ FEATURE Figure 1.
Figure 3. The “/etc/fstab” file is returned to its
/ FEATURE / Tips for Deployment File Integrity
Digital ForensicS / magazine BACK ISSUES Digita
/ FEATURE DIGITAL FORENSICS IN SRI LANKA A loo
Established and maintained by the ICTA, the S
/ FEATURE that due to the limited communicati
/ Sri Lanka's ICT Literacy Through a variety of s
/ BOOK REVIEWS BOOK REVIEWS Kingpin: How One H
We have to correct an error from Issue 7 where we
/ COLUMN IRQ IThe best laid plans... 'm
With today’s ever-changing technologies and env