Welcome to E8 :: [eon8]

Register now to gain access to all of our features. Once registered and logged in, you will be able to contribute to this site by submitting your own content or replying to existing content. You'll also be able to use the shoutbox, customize your profile, change themes, gain reputation points for submitting content, while also communicating with other members via your own private messenger, plus much more!

 

This message will be removed once you have signed in.

ArturInderike

Member
  • Content count

    7
  • Joined

  • Last visited

About ArturInderike

  • Rank
    Neophyte
  • Birthday
  1. FarStone TotalRecovery 8 PRO FOR FREE!!!

    The last chance to get FarStone TotalRecovery 8 PRO for FREE!! Visit: http://eforensicsmag.com/totalrecovery-8-pro-free-download/
  2. A few articles for beginners!

    DIGITAL FORENSICS IN A NUTSHELL by Barry Kokotailo Before 1999, formal dedicated digital forensics toolkits did not exist. Then came the first free open source tool to perform digital forensics: The Coroners Toolkit created by Dan Farmer and Wietse Venema (http://www.porcupine.org/forensics/tct.html). This sparked a massive revolution in the science and art of digital forensics. This article will deal with the stages in a digital forensics examination, the tools used by most forensics people, and some final thoughts on the world of forensics. A STEP BY STEP GUIDE TO BEGINNING COMPUTER FORENSICS by David Biser We live in an era of digital connectivity such as the world has never known. Each age has one symbol that seems to identify it to all other time periods, for instance Roman is known by the Imperial Eagle, the Industrial Revolution by the machines that were developed and used, our age can probably be symbolized by 1s and 0s. Nearly everyone is connected to the Internet in some form or manner, by smart phone, tablet or laptop. With such connectivity comes crime which brings the need for investigators with a specific skill set to be able to investigate, track and apprehend criminals in the digital world. This is where the exciting and ever changing world of computer forensics begins. As a computer forensic examiner you will find yourself tracking child pornographers, cyber thieves and terrorists, responding to the worst of crimes, all in an effort to deter and stop cyber crime. A very exciting field indeed! UNDERSTANDING FILE METADATA by Chris Sampson Metadata exists throughout data storage systems, from the creation and modification dates stored within the file system, through to specific information embedded within the content of a file. Metadata can be hugely important to any forensic investigation, knowing how to extract this information and spot when it has been manipulated can prove very important. This article, aimed at those new to forensics, looks at various forms of metadata and provides examples of the way in which we can manually retrieve this information using the information that is available within our operating systems and moving on to other tools which can be used to extract this data from many different file types. THE INTERVIEW WITH JAMES E. WINGATE, VICE PRESIDENT OF BACKCONE SECURITY by Gabriele Biondo and Kishore P.V. DOWNLOAD IT FOR FREE: http://eforensicsmag.com/computer-forensics-jumpstart-vol-1-free-teaser/ FORENSICS ON LINUX by Barry Kokotailo The majority of forensics examinations conducted today comprise Windows machines. Considering that the vast majority of desktops in use today are Windows based, this should not be of a surprise. However a good majority of servers and workstations are Linux based and running interesting services such as databases, web and file services. During the career span of a forensics professional you will need to perform a forensic examination of a Linux machine. This article will give you the step by step procedure in order to acquire an image, analysis, and report on the findings. EDISCOVERY 101: AN INTRODUCTION TO EDISCOVERY by Dauda Sule Volonino and Redpath (2010) quoted Judge Shira A. Scheindlin as follow: “We used to say there’s e-discovery as if it was a subset of all discovery. But now there’s no other discovery.” The Law has been taking its course, technology has been developing; the result is the evolution of Law to keep up with technological advancements. THE INTERVIEW WITH TERRY TANG, FOUNDER OF WISECLEANER by Aby Rao TWELVE OPEN-SOURCE LINUX FORENSIC TOOLS by Priscilla Lopez There are several open-source Linux forensic tool suites and tools such as Kali Linux, DEFT, HELIX, Backtrack, CAINE, Knoppix STD, FCCU, The Penguin Sleuth Kit, ADIA, DFF, SMART, and SIFT. This article will give you a brief overview of the available tool suites. Afterwards, I will show you step-by-step how to install one of the tool suites and run a practice case sample. WINDOWS MEMORY FORENSICS & MEMORY ACQUISITION by Dr Craig S. Wright, GSE, GSM, LLM, MStat This article takes the reader through the process of imaging memory on a live Windows host. This is part one of a six part series and will introduce the reader to the topic before we go into the details of memory forensics. The first step in doing any memory forensics on a Windows host involves acquisition. If we do not have a sample of the memory image from a system we cannot analyze it. This sounds simple, but memory forensics is not like imaging an unmounted hard drive. Memory is powered and dynamic, and changes as we attempt to image it. This means it is not a repeatable process. Not that there is a requirement at all times for the results of a forensic process to provide the same output; in this it is not necessary to be able to repeat a process and obtain exactly the same results. It does not mean we cannot use a variable process in a forensic investigation. What it does mean is we have a set of steps that will allow us to image memory but that every time we do those the results will change. DOWNLOAD IT FOR FREE: http://eforensicsmag.com/computer-forensics-jumpstart-vol-2-free-teaser/
  3. Information Source for infosec expert

    Three magazines for FREE! Lean more about hacking, pentesting and forensic science. -> How to Disassemble and Debug Executable Programs on Linux, Windows and Mac OS X? -> How to Defeat Code Obfuscation While Reverse Engineering? -> How to Reverse the Code? And find more articles here: http://hakin9.org/how-to-reverse-the-code-exploting-software-102012-digest/ -> Social Engineering and Phishing Attacks Using Android Device -> Wireless Penetration Testing: Beyond the IEEE 802.11 Family of Standards -> Hacking a Bank And find more articles here: http://pentestmag.com/pentesting-tricks-pentest-open-0513/ -> RAID 5 DATA RECOVERY – A GUIDE FOR THE RAID OWNER -> WIRE-SPEED CAPTURES WITH PORTABLE DEVICES -> WEB ATTACKS: ERROR BASED ASPX SQL INJECTION And find more articles here: http://eforensicsmag.com/lets-play-forensic-tools-eforensics-open/ Do you like those magazines? You can have a full access to all previous and future issues and ebooks only for $350! Write "ITPACK" to artur.inderike@eForensicsMag.com Special offer will be available until August 7. Have a nice reading! :)
  4. Hi, For someone who just start his or her computer examiner carier it's very important to have a good basics. That was our main intent! In July we will publish special edition of eForensics Magazine about Computer Forensics JumpStart and we will continue this series until the end of the year. We gonna publish something that will help you every month! Think about it... Do you want to know about expert's real life experience or just theory from the books? Here is the link for Computer Forensics JumpStart Vol. 2 PREorder: http://eforensicsmag.com/computer-forensics-jumpstart-vol-2-preorder/ The unique opportunity to have Vol. 1 and Vol. 2 in the price of one! I wich you all the best, Artur Editor at eForensics Magazine
  5. Digital Forensics News

    We've just published new eBook which is avvailable for FREE!! Upgrade your skils with eForensics Magazine! http://eforensicsmag.com/real-life-computer-forensics-ebook/ But... with annual subscription you'll have even more! Write "WANT35" to artur.inderike@eforensicsmag.com and take an advantage of 35% discount for annual subscription.
  6. Digital Forensics News

    Hello everyone :) Have you thought about how we can stay up to date and get only the freshest news about the industry? eForensics Magazine is the best solution! You haven't heard about it before? Check this FREE issue out! http://eforensicsmag.com/lets-play-forensic-tools-eforensics-open/ If you would be interested in regular subscription or special IT PACK offer just write "WANT" in subject to artur.inderike@eforensicsmag.com. Do not miss your chance!!
  7. STAY UP TO DATE WITH CYBER SECURITY

    Hello everyone :) Have you thought about how we can stay up to date and get only the freshest news about the industry? eForensics Magazine is the best solution! You haven't heard about it before? Check this FREE issue out! http://eforensicsmag.com/lets-play-forensic-tools-eforensics-open/ If you would be interested in regular subscription or special IT PACK offer just write "WANT" in subject to artur.inderike@eforensicsmag.com. Do not miss your chance!!