Computer and Hacking Forensics Notes

investigation tools

-MD5 ******* -checking data integrity -cryptography [view]

By: abijithsasikumar16 | Related Lesson: | Modified: June 21, 2016

modern forensics

process *********** -identify -preservation -extraction -interpretation -documentation -presentation ***************************************** -crime happens -identify crime -seize evidence -transporting and making copies -storage -analyze -report -f [view]

By: abijithsasikumar16 | Related Lesson: | Modified: June 21, 2016

Digital Evidence

Anti Digital Evidence – (zeroize) Types: voiltile/non volitile transient data fragile data temporary data active data archive data backup data   [view]

By: jslewis88 | Related Lesson: | Modified: June 20, 2016

Search & Seizure

18 USC 2510-2522 Title III (Wiretap Statue) 2518 – Interception pursuant 3121-3127 Pen Registers Tap & Trace Voluntary Disclosure (Cable Act 47 USC 551) Rule 41 = Return of Property   [view]

By: jslewis88 | Related Lesson: | Modified: June 20, 2016

md5calc Lab

The MD5 Calculator is a program that will enable you to right click any file and select ”MD5 Calculator” from the context menu. This will calculate the MD5 value of the selected file. You can compare the calculated value to a value given [view]

By: jslewis88 | Related Lesson: | Modified: June 20, 2016

Investigative Process

LAWS** 18 usc 1361 Malicious Mischef ** 18 USC 1029  Fraud Access Dev. ** 18 USC 1030  Fraud Computers Rule 402 Admissable evidence Rule 901 ID & Authentication Rule 608 Conduct of Witness Rules 609 Impeachment of Evidence Rule 502 Attorney Cli [view]

By: jslewis88 | Related Lesson: | Modified: June 20, 2016

Modern Forensics

1822-1911 Fingerprints 1887-1954 Blood grouping 1891-1955 Firearms 1858-1946 Documentation 1847-1915 Criminal Invest 132 – FBI 1984 – Computer analysis/response team 1993 – 1st international conf 2 types of attacks (Internal / Exter [view]

By: jslewis88 | Related Lesson: | Modified: June 20, 2016

Forense Moderno

– Encontrar a verdade – Evidencias – Contaminação – Processo [view]

By: alaxgomes | Related Lesson: | Modified: June 20, 2016

EFSinfo.exe

It would tell you who can decrypt this file. [view]

By: Spock49 | Related Lesson: | Modified: June 19, 2016

COMPUTER FORESICS

MODULES * [view]

By: robinwilliamjohn1996 | Related Lesson: | Modified: June 18, 2016

« First ‹ Previous 1 299 389 397 398 399 400 401 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel