April 17th, 2006, 08:16 PM
Ok
I have been using version 5 for about 4 months ... it doesnt support freebsd at the moment although there are plans to change that in the future... the updates from them is very good and...
April 17th, 2006, 07:04 PM
I was wondering whether any users had experience of using core impact penetration tetsing software.
We have purchased a copy of the latest version and have started using the software in house to...
April 17th, 2006, 06:36 PM
April 17th, 2006, 06:20 PM
HI there
Encase is the preferred tool that we use and yes it is expensive , but when used with other tools such as FTK, Histex and net analysis the results are usually clear and consise.
The...
April 17th, 2006, 04:59 PM
Hi
Thanks for that Deeboe
Yes i agree with your statement about more detail required it was meant as a checklist and i will be producing a more detailed checklist including the scripts ran and...
April 17th, 2006, 04:36 PM
This is our tried and tested procedures when conducting a forensic analysis using our preferred tools which include encase ver 4.22a , AccessData forensic toolkit and various other tools.
1 -...
April 17th, 2006, 03:54 PM
Hi
if anyone is interested i have produced a forensic checklist that i can post to the forum
let me know
8lgm
April 17th, 2006, 03:49 PM
HI
i was reading your post on disk cloning... I would just like to point a few things out as this is what i have to do day in day out..
1 where possible removed the suspect disk and use...
April 17th, 2006, 03:42 PM
I am looking forward to passing on my knowledge and also gaining knowledge regarding computer security. I predominantly work in computer forensics, but have been intrigued by computer security for a...