April 17th, 2006 08:16 PM
I have been using version 5 for about 4 months ... it doesnt support freebsd at the moment although there are plans to change that in the future... the updates from them is very good and...
April 17th, 2006 07:04 PM
I was wondering whether any users had experience of using core impact penetration tetsing software.
We have purchased a copy of the latest version and have started using the software in house to...
April 17th, 2006 06:36 PM
April 17th, 2006 06:20 PM
Encase is the preferred tool that we use and yes it is expensive , but when used with other tools such as FTK, Histex and net analysis the results are usually clear and consise.
April 17th, 2006 04:59 PM
Thanks for that Deeboe
Yes i agree with your statement about more detail required it was meant as a checklist and i will be producing a more detailed checklist including the scripts ran and...
April 17th, 2006 04:36 PM
This is our tried and tested procedures when conducting a forensic analysis using our preferred tools which include encase ver 4.22a , AccessData forensic toolkit and various other tools.
April 17th, 2006 03:54 PM
if anyone is interested i have produced a forensic checklist that i can post to the forum
let me know
April 17th, 2006 03:49 PM
i was reading your post on disk cloning... I would just like to point a few things out as this is what i have to do day in day out..
1 where possible removed the suspect disk and use...
April 17th, 2006 03:42 PM
I am looking forward to passing on my knowledge and also gaining knowledge regarding computer security. I predominantly work in computer forensics, but have been intrigued by computer security for a...