clipped from www.cmswire.com
|
Thursday, April 26, 2007
eDiscovery Law Review
Tuesday, April 24, 2007
Web threats to surpass e-mail pests
clipped from news.zdnet.com
|
Monday, April 23, 2007
Cyberspies exploit Microsoft Office
clipped from www.usatoday.com
|
Friday, April 20, 2007
Forensics and eDiscovery explosion
clipped from www.law.com
|
Eight in ten major Web sites highly vulnerable to attack
clipped from www.computerworld.com
|
Thursday, April 19, 2007
Software that runs home routers, cell phones and personal digital assistants is rife with security bugs
clipped from news.zdnet.com VANCOUVER, B.C.--Software that runs home routers, cell phones and personal digital assistants is rife with security bugs, an expert said Thursday.
|
EnCase Forensic Review
clipped from eddblogonline.blogspot.com Of the straight (i.e., not over-the-network) computer forensic tools we examined, EnCase has made the most noticeable changes since last year. However, a few changes simply are cosmetic. That said, we liked EnCase better this year than last for one important reason: it has kept pace well with the needs of users.There are some familiar things missing in this release. For example, the DOS version no longer is supported, but imaging a computer can now use a Linux boot disk that you must create by downloading a Linux distribution and creating a bootable CD. |
AccessData FTK review
clipped from eddblogonline.blogspot.com AccessData is one of the venerable developers of computer forensic software. The company’s biggest strength is that it is — and has been since its inception — the go-to supplier of password recovery tools. AccessData has packaged its complete tool set in one product called the Ultimate Toolkit. In addition to the Forensic Tool Kit, referred to by forensic analysts simply as FTK, the Ultimate Toolkit contains the full suite of password recovery tools, drive and media wipers, a registry viewer and other useful products. |
Monday, April 16, 2007
Texas Investigative Licensing Requirements
clipped from www.txdps.state.tx.us
|
Friday, April 13, 2007
Black hatters do, gray hatters are stopped
clipped from news.zdnet.com Security holes in online applications may go unfixed because well-intended hackers are afraid to report bugs.
|
Thursday, April 12, 2007
WEP cracked in 3 sec
clipped from www.computerworld.com
|
CCE
Wednesday, April 11, 2007
Reconnaissance
http://all-nettools.com
http://www.tamos.com/products/smartwhois/
http://www.dnsstuff.com/
http://samspade.org/
Find stuff about people
clipped from zabasearch.com
|