± Forensic Focus Partners

± Your Account



Site Members:

New Today: 5 Overall: 33319
New Yesterday: 8 Visitors: 257

± Follow Forensic Focus

Forensic Focus Facebook Page Forensic Focus on Twitter Forensic Focus LinkedIn Group Forensic Focus YouTube Channel

RSS feeds: News Forums Articles

± Latest Articles

± Latest Webinars

Reviews

Reviews

2009


2009

Digital Safety Conference, London, 19th June

Graham Brown-Martin, Digital Safety Conference
Reviewed by Jan Collie.


Cyberstalking is the new urban terror – the message rang home loud and clear at the Digital Safety Conference in London last week (Friday).

For although, in Cyberspace, no-one hears you scream, increasing numbers of people are getting off on imagining it.

The evils of instant communication – texting, live chat, social networking – were laid out in lurid detail before delegates meeting in a brick-lined space known as The Brewery, near the city’s Barbican.

Tales of horror: physical threats and psychological manipulation, poured out. The family pursued relentlessly via emails, bulletin board postings and websites dedicated to damaging their names for more than five years. The teenager who suffered Post Traumatic Stress Syndrome following a campaign of anonymous texts. The Information Age exposed in all its gory.   more ...

2009

e-fense Live Response

e-fense Live Response
Product Information

Vendor: e-fense®
Product: Live Response®
Version: 2009 Release 3
Price: $499.95 (16GB version)
http://www.e-fense.com/live-response.php

e-fense is best known for the Helix3 Incident Response and bootable Live CD. Helix3, created by forensic specialist Drew Fahey, was a donation-ware Linux LiveCD distribution designed specifically for digital forensics and based on the popular Knoppix and then Ubuntu distributions. It contained many forensic and security related tools designed to aid in the recovery and analysis of digital evidence in live and post-mortem (powered off) computer examinations. There were tools to analyze Windows and Linux file systems like Ext2/Ext3, and even the less common Reiser FS, JFS and XFS.   more ...

2009

MacLockPick II

MacLockPick II
Reviewed by Austin W. Troxell, MSc, CISSP of Cyber Investigation Services .


Introduction

In today's computing environment of tera-byte hard drives and encrypted file systems, the practice of 'pull the plug, image at the lab' is becoming impractical, if not risky. To address these and other challenges, live acquisition is gaining in popularity. Indeed, every digital forensics examiner should become proficient in the techniques of what has come to be the latest buzz-phrase in the industry: “field triage.”


Overview/Features

To meet the needs of non-technical first-responders such as law-enforcement, parole officers, private investigators, etc., SubRosaSoft (subrosasoft.com/OSXSoftware/index.php) has introduced MacLockPick II, a USB stick loaded with a suite of acquisition and reporting utilities that will extract pertinent data from Apple Macintosh, Windows (XP and Vista) and Linux systems.   more ...

2009

Paraben Forensic Innovation Conference (PFIC)

Paraben
Reviewed by Greg Kelley, EnCE of Vestige, Ltd


Full disclosure - I was a speaker at PFIC.

I recently attended PFIC 2008 ( www.pfic2008.com ), hosted by Paraben. I found it to be on par with other conferences (CEIC, TechnoForensics) except it was free. Kudos to Paraben.

Their lab machines consisted of mostly Macs. They were donated, I believe, by BlackBag. They were dual boot allowing one to run either in the Mac environment or Windows environment. If you could get past the change in keyboard (which made shortcuts using CTRL or ALT difficult) and the yoga maneuver required for right clicking, they worked very well. But with that being said, I think it is good for forensic examiners to get out of their comfort zone and work with hardware and software with which they do not have a lot of experience.   more ...

2009

X-Ways Forensics Training, London, 30 March-3 April

X-Ways Forensics
Reviewed by Jonathan Krause of Forensic Control.


As a contractor who has to fund his own training (and also loses out on income for the duration of a course) I need to pick my courses carefully. Having heard many positive stories about X-Ways Forensics I had little hesitation in signing up for the five day course which recently ran in London. Monday through to Wednesday covered the application while Thursday and Friday offered an in-depth look at various file systems. To whet your appetite, the full course content can be viewed on the X-Ways’ web page .

The week’s training was delivered by the creator of X-Ways Forensics, Stefan Fleischmann, so understandably his knowledge of the application is unsurpassed. I’ve been on quite a few forensics courses over the past five years and have met and worked with many key players and Stefan’s understanding of file systems and their interaction with operating system artefacts is second to none. He lives and breathes his subject!

To set some perspective, this is not a review of the X-Ways Forensics application, but rather of the training course itself. However, for the uninitiated, X-Ways Forensics is very impressive indeed and I felt that as someone who has not previously used the tool that the course only touched on its potential. Compared to its competitors, the program is tiny, its resource requirements small and its system requirements happily far behind that demanded of a product like FTK 2.   more ...



Build a Mobile Site
View Site in Mobile | Classic
Share by: