|
Interview with Andrew Rector, Digital Forensics Student, Bloomsburg University |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Interview with Andrew Rector, Digital Forensics Student, Bloomsburg University Par Forensic Focus BlogLe [2014-02-10] à 15:51:54
Présentation : Andrew RectorAndrew, you re currently studying Digital Forensics at Bloomsburg University. Could you tell us more about the course and what drew you to it Digital Forensics is the acquisition and analysis of any digital medium for the purpose of finding and reporting evidence to Government agencies, police, and or private contractors. At Bloomsburg University we are taught first to have a low-level understanding of what we will be looking at Binary Hexadecimal, File System Analysis, and Windows Artifacts , and then we are taught how to use our skills to do real Forensics cases using the prevalent Digital Forensics tools FTK, EnCase, X-Ways . What really drew me to Digital Forensics the most was the investigative mindset you have to have. When you are doing a case, it s almost like a chess match between you and the bad guy . For me, that s very exciting, every case is different, and has its own brand of excitement. You re also Lab Manager at the Pennsylvania Center for Digital Forensics, doing research on GPS devices and mobile telephones. How did you become interested in this area and what can you tell us about your research Cell phones and GPS devices were one of my first major areas of research. They interest me a lot because of the challenge they present, cell phones especially. Forensically analyzing a phone is completely different than analyzing a HDD Hard Disk Drive . For one, the sheer volume of types of phones make it a challenge, not to mention the different operating systems on each one. Each phone is a new challenge. One of my most exciting research projects with the PACDF was the analysis of a Garmin Nuvi GPS. By analyzing the Garmin forensically, I was able to completely retrace a person s whereabouts, down to the exact time, date, and location. It s really very amazing the data that can be found on those types of devices... Read More
Les mots clés de la revue de presse pour cet article : interview Les videos sur SecuObs pour les mots clés : interview Les éléments de la revue Twitter pour les mots clé : interview
Les derniers articles du site "Forensic Focus Blog" :
- Interview with Andrew Rector, Digital Forensics Student, Bloomsburg University - Webinar Geolocation Artifacts and Timeline Analysis in Digital Forensics - Webinar online now Pitfalls of Interpreting Forensic Artifacts in the Windows Registry - Guidance Software Releases EnCase Forensic v7.05 - Webinar Pitfalls of Interpreting Forensic Artifacts in the Windows Registry - Generating computer forensic supertimelines under Linux A comprehensive guide for Windows-based disk images - Forensic Examination of FrostWire version 5 - Book Review Mastering Windows Network Forensics Investigations - Introduction to Penetration Testing Part 3a Active Reconnaissance - Retrieving Digital Evidence Methods, Techniques and Issues
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|