The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows operating system, such as the Registry, slack space and the Windows event log. In order to achieve the main aim of this research, cybercrime activities such as automated password guessing attack and hacking was emulated on to a Windows operating system within a virtual network environment set up using VMware workstation. After the attack the event logs on the victim system was analysed and assessed for its admissib...
This article presents results of a research project that attempted to create a model of forensics in...
In today digital investigation, forensic application level information (FALI) has become an importan...
Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-...
In modern digital investigations, forensic sensitive information can be gathered from the physical m...
© 2007 Dr. Atif AhmadThe application of investigative techniques within digital environments has lea...
This paper presents the method of identifying and finding forensic evidence from the volatile memory...
Digital evidence is increasingly used in juridical proceedings. In some recent legal cases, the verd...
This chapter presents the use of digital evidence to reconstruct actions taken in furtherance of a c...
With the recent escalating rise in cybercrime, firewall logs have attained much research focus in as...
In today digital investigation, forensic time aspect of information has become an important part of ...
Objectives: This paper investigates the amount of user input that can be recovered from the volatile...
The recovery of digital evidence of crimes from storage media is an increasingly time consuming proc...
Digital forensics is the science involved in the discovery, preservation, and analysis of evidence o...
Despite the widespread use of computing in almost all functions of contemporary society and the cons...
Digital forensics are becoming increasingly important for the investigation of computer-related crim...
This article presents results of a research project that attempted to create a model of forensics in...
In today digital investigation, forensic application level information (FALI) has become an importan...
Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-...
In modern digital investigations, forensic sensitive information can be gathered from the physical m...
© 2007 Dr. Atif AhmadThe application of investigative techniques within digital environments has lea...
This paper presents the method of identifying and finding forensic evidence from the volatile memory...
Digital evidence is increasingly used in juridical proceedings. In some recent legal cases, the verd...
This chapter presents the use of digital evidence to reconstruct actions taken in furtherance of a c...
With the recent escalating rise in cybercrime, firewall logs have attained much research focus in as...
In today digital investigation, forensic time aspect of information has become an important part of ...
Objectives: This paper investigates the amount of user input that can be recovered from the volatile...
The recovery of digital evidence of crimes from storage media is an increasingly time consuming proc...
Digital forensics is the science involved in the discovery, preservation, and analysis of evidence o...
Despite the widespread use of computing in almost all functions of contemporary society and the cons...
Digital forensics are becoming increasingly important for the investigation of computer-related crim...
This article presents results of a research project that attempted to create a model of forensics in...
In today digital investigation, forensic application level information (FALI) has become an importan...
Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-...