Just found a great article (.PDF) on Limewire Forensics by Joseph Lethwaite and Victoria Smith:
http://www.dfrws.org/2008/proceeding...lewthwaite.pdf
It includes great info about fileurns.cache and limewire.props
Hope you find it useful...
Printable View
Just found a great article (.PDF) on Limewire Forensics by Joseph Lethwaite and Victoria Smith:
http://www.dfrws.org/2008/proceeding...lewthwaite.pdf
It includes great info about fileurns.cache and limewire.props
Hope you find it useful...
That's cute... Windows XP strikes again. Noobies use Limewire and Bearshare. TOR networks are the coolest. You can write President Bush email with that network. huh? *checkmate*
I really don't see what this has to do with.......... it is about FORENSICS............. that's where an investigator is faced with a fait accompli not a choice. So, if Limewire or Bearshare is what youv'e got, that's what you run with.Quote:
Windows XP
As for Tor............. this is what they have to say about themselves:
Ipse Dixit?Quote:
There are three pieces of fine print you need to know about.
- Tor does not protect you if you do not use it correctly. Read our list of warnings and make sure to follow the instructions for your platform carefully.
- Even if you configure and use Tor correctly, there are still potential attacks that could compromise Tor's ability to protect you.
- No anonymity system is perfect these days, and Tor is no exception: you should not rely solely on the current Tor network if you really need strong anonymity.
Forensics, eh? More like think like a theif. One can tell every bootleg or Commericial encrypted DVD inserted into a Linux Machine. Here's a free answer......look inside directory .dvdcss. Everything which was written using Intermediate Programming can be decoded and analyzed (ie, .net framework\ java...etc). Cops are script kiddies....programmers are serial killers in their little world.
I don't need a keyboard nazi to provide me with a definition.
:argue: and so it begins
Did you read the article?
What does this statement have to do with anything? It's completely irrelevant.Quote:
One can tell every bootleg or Commericial encrypted DVD inserted into a Linux Machine. Here's a free answer......look inside directory .dvdcss. Everything which was written using Intermediate Programming can be decoded and analyzed (ie, .net framework\ java...etc).
Been a while since I've been called that... However, I will admit that I'm a n00b, and will be for the rest of my life. There is no such thing as an expert, and anyone who tells you otherwise is selling something. BTW, only a skiddie would start a flame war over a forensics article. :rolleyes:Quote:
Cops are script kiddies....
My world is quite far-reaching, thank you.Quote:
programmers are serial killers in their little world.
I think if there's anyone on here who doesn't fit the definition of a nazi, it would be Nihil...Quote:
I don't need a keyboard nazi to provide me with a definition.
Please, do us a favor and just... don't post anymore. Whatever your "actual" situation may be, you are presenting yourself only as an idiot.
Now now.
Let's keep the personal stuff out of the thread please. Personal Attacks are not tolerated and if it continues then some members will be put in time-out for a while.:mad:
With that said everyone is entitled to there own opinion, but sometimes it's just best to remember if you do not have something nice to say then don't say it. ;)
t34b4g5... :drink:
... So anyways, back on to the thread subject...
This is a pretty cool document. I took a couple computer forensics classes in college (Stuff like storing info in the unused parts of floppies and programs etc) and i thought they were awesome and wanted to get more into it but never found that outlet. Limewire forensics was definitely not covered in those classes though but it is a pretty interesting read.
Thanks!
Very true,
This is the Computer Forensics forum, so forensics discussions belong, and are welcome here?
:confused:
We still have to accept that >90% of humanity uses Windows, so I would suggest that the article has current relevance on the grounds that this is the most likely operating system for a forensics investigator to encounter.
Well, I found it to be both informative and humerous...of course I'm also bored out of my mind.
Also, my hex > your binary.
:p
Hmmmmm,
Looks like some failed banana republic bank card to me.................. ah! I forgot........... we have those in New York and London these days?Quote:
576869746568617
:lildevil:
Happy New Year :halo: