Feed on
Posts
Comments

Monthly Archive for February, 2007

In swedish newspapers there have been a prolonged discussion regarding young girls beeing harassed or threatend to be harassed if they do not do guys homework, do this or that on a party or whatever the culprit is after. Sadly the reaction has been way to mild and possibly this is due to little or […]

Read Full Post »

A few simple words. How do you create a security architecture? The answer is: You don´t! What you really do is to take an architecture that shows the businessflow, information flow or the technical infrastructure and adds security properties on all and every object while you look on the three different phases information could reside […]

Read Full Post »

Some tools

Every investigator needs access to several tools. One of the most important is you investigationapplication, for example Encase. In this you´ll do the mainpart of your analysis and there you´ll find deleted files, encrypted files, check timestamps, views pictures and so forth. Every investigation will generate a lot fo files that you need to examine further […]

Read Full Post »

What is Computer Forensics?

Computer Forensics (CF) is the art of securing evidence in an computer to be able to give answers when an incident happens. Depending on the case different kinds of computers and devices has to be copied to the investigation.  Note the word copied. To make sure that all information is available, that an investigation in any […]

Read Full Post »

« Prev