|
Dell Ships New Ruggedized Notebook for Forensic Evidence Gathering |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Dell Ships New Ruggedized Notebook for Forensic Evidence Gathering Par Hack In The BoxLe [2011-03-28] à 03:07:05
Présentation : Dell on March 24 started shipping a new ruggedized laptop with special features designed specifically for forensic evidence collection by law enforcement or scientific specialists. The Mobile Digital Forensic package, based on the company's location-based Digital Forensics product, is aimed at providing easier and more secure collection and storage of digital evidence at crime scenes or at scientific work sites. The laptop package includes software for speedy analysis of forensic reports following the collection of digital image, document, audio and video files. The new product runs on Dellâ s Latitude E6400 XFR rugged laptop, which has been designed for use in rough circumstances and is equipped with SPEKTOR Forensic Intelligence software from Evidence Talks, one of the U.K.'s digital forensic and intelligence-gathering firms, Joe Trickey, Dell's brand manager for digital forensics, told eWEEK.
Les mots clés de la revue de presse pour cet article : notebook forensic Les videos sur SecuObs pour les mots clés : forensic gathering Les mots clés pour les articles publiés sur SecuObs : forensic Les éléments de la revue Twitter pour les mots clé : forensic
Les derniers articles du site "Hack In The Box" :
- Honda security breach exposes 283,000 customers - Aussie banks cancel 10,000 credit cards - What Your Wireless Carrier Knows About You - Lloyds TSB suffers internet banking problems - Bulging tweet lewd photo leaves politician red-faced - Skype partner update leads to worm fears - Latest hack on PBS news site is the best hack ever - Hackers breached US defense contractors - Hidden URLs in phone and tablet browsers - HITBSecNews - The Revolution Begins 1st June 2011
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|