A list of puns related to "Computer Forensics"
Hats off to the other techies I've seen on the sub, feel free to join in! I currently work as a forensics examiner for hacking investigations but spent a few years on the law enforcement side. Personally I've never been to court to testify. It's kind of a bummer but I've been loving the details that are coming out, it's been a good brain teaser.
I found MB's testimony interesting. I've always wondered how a analyst be for the defense works in these cases. I've never met a defense analyst. I've heard they are hard to come by because no one wants that job.
As others have said she's trying to cloud the waters. But, she's trying to be honest while doing it so one can't look down on her from a forensic community standpoint.
For instance, she laments how she wishes they got the router logs so they could check into remote access. This throws shade at the govt, making them look shitty for not getting data from everything, but you should be able to find evidence of remote access to an extent on the actual system. That partition was only a few days old so it should have had logs on it.
She focuses on the whole Dell_one name. It is an interesting point. They are right, it's an HP not a Dell - where did that come from?The Dell_One being from the mystery thumb drive could be, but It wouldn't auto generate a username from the mystery thumb drive though. That doesn't make sense, it's not how that works. I think he either downloaded a prebuilt Ubuntu or he had a Dell at some point and it broke so he moved it all to this work computer.
Linux usually has a log of what was last typed in terms of commands. All this weird theorizing she did about how it's weird he didn't google commands is pointless. Ubuntu is pretty user-friendly, if he installed a prebuilt system he wouldn't need to do any commands. Did she check the command log?
It's a little funny she points out there was one zip file that had no evidence that they were viewed. Like is she trying to minimize his actions? She also tries to say Faulkner's noted 'worst of the worst' was not on there. That's ballsy. Did she not see them? Where did they go? Or is she saying they weren't that bad? I'm just confused. The govt usually submits a spreadsheet with every file on the system as evidence. He can't lie about them being there.
She claims she can boot up and access a partition remotely. I'm curious what truth she's stretching there.. I hope the prosecution can get her to elaborate because I'm seriously running
... keep reading on reddit β‘Does anyone have experience with Siforce forensic workstations? How do they compare to Sumuri Talinos?
Iβm trying to see where to go because when I took computer science in high school and my first class in community college C plus plus I didnβt like it as much what would you recommend?
Greetings!
Your advice is much appreciated.
I just completed C702 and now I am going to take the CHFI exam. Are you aware of any Quizlet that I can use to study for the exam?
Currently, I have completed all the quizes at the end of each section, the pre-assessment, and the final assessment for C702.
Any advice is much appreciated.
I am planning to take either of the two courses. I want to compare both courses on three criteria:
Jaejong Baek is teaching Computer Forensics, and there's no mention of the professor for Computer Network Security in ASU class search.
I would really appreciate any inputs from the folks who have taken either of the classes.
Hi everyone, I am in my last year of college before I am choosing to go to uni. I canβt decide if I should do a general Computing Degree or a specific Computer Forensics Degree. I love how computer forensics sounds and it seems like a career path I am interested in but I need more info on it. Would anyone be able to tell me what it is really like to work in this field? And also if you need the specific degree for it or would the general computing degree be better. Thanks :)
Hello, I am currently about halfway through an associates degree in cybersecurity and information assurance at my local community college. I donβt hate cybersecurity but it is definitely lack luster. I have been looking into computer/digital forensics as something that I may be able to pursue after I complete my associates. I have some questions. Would it be an easy transition from cybersecurity to digital forensics? Should I pursue a more specific bachelors or just go for the certifications and find some real life experience? What has your experience in the field been like/ what is your day to day like? Do you enjoy it? I know it is most definitely not like Hollywood portrays it but do you feel like you are helping people and making a difference? Would you do it all over again? And finally Any advice you can offer?
Thank you in advance!!
Edit: I forgot to mention that I currently am a government contractor for the Department of homeland security Iβm just an office clerk but would it be worth it to try and stay here while I am trying to go into computer forensics? Or should I focus on school.
I'm interested in any cases that anyone who studies the law would know about in particular where computer forensics played a huge part in a conviction or court decision. Thanks!
Hey, Iβm a grade 12 student interested in attending Trent. Iβm thinking about applying to the Computer Science and Forensics program. There isnβt much about this specific joint-program on their website. Is anyone currently in this program, that could lend me some insight into it?
Also, howβs the student life at Trent? Iβll have to live on residence, so how is residence life there? Also, what exactly are Living Learning Communities?
Thanks in advance:))
Hello everyone! I'm currently in my 4th year studying Computer Science and enrolled in the subject Seminars and Field Study. As a requirement we are holding a webinar series on emerging trends in ICT. Our group in this class is tasked to host a webinar to any topics related to Computer Forensics/Digital Forensics to the class of 28 students on November 19 at 1PM (GMT +8). We would like to invite a speaker here who would be willing to give a talk on the said schedule. This webinar may be short depending on the presentation of the topic of the speaker. Our university department will be providing a certificate as a token of appreciation for accepting our request and for sharing your expertise.
Please let me know if you're willing and available or have any recommendations where to find any speaker.
Thank you!
Also Can I do remote work?
The United States Computer Emergency Readiness Team (CERT) defines computer forensics as βthe discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law.β
Since forensics by itself is defined as scientific tests and techniques used to detect and solve crimes, you can see where the worlds of science, law enforcement, and computers neatly intersect. When we consider the ever-increasing incidences of cybercrime, itβs unsurprising that computer forensics is garnering increased interest and attention.
In simple, real-life terms, computer forensics is the digital version of a long-respected procedure for solving computer-related crimes.
Computer forensics gathers and preserves evidence from devices related to the legal matter at hand. Investigators perform a structured investigation while keeping a documented chain of evidence to ascertain what happened on the device in question and who initiated it.
Computer forensics investigators employ many proprietary software forensic applications and techniques to examine a copy of the targeted systemβs storage media, looking for hidden folders and unallocated disk space for instances of damaged, deleted, or encrypted files. If investigators find any evidence on the digital copy, itβs carefully recorded in a document called a "finding report." This information then gets verified with the original data in preparation for possible legal proceedings involving deposition, discovery, or actual litigation.
Anyone whoβs seen crime dramas in movies and television knows that investigators must exercise care when handling evidence, lest it gets somehow compromised and useless in the criminal investigation. Preparation and readiness are the best ways to avoid this pitfall. Investigators need to be trained, tested, verified on their equipment and software and make sure their tools and applications are sufficient for the task. They also must know the boundaries of the law and how to handle surprises (e.g., investigators found child pornography on a hard drive when looking for insider trading).
[Full Article](https://tutorialboy24.blogspot.com/2021/09/what-is-computer-f
... keep reading on reddit β‘Hey,
Just talked with my co worker the other day and we want to see if we can find a safe and secure way of doing remote computer forensics. We have a machine in our lab and we are trying to figure out a way to be able to remote into that machine when doing analysis instead of everyone doing the 45 minute drive to the lab. Iβve voiced my concerns about the dangers of it, but we still want to at least see if itβs a possibility. Our customers data takes top priority so if we come to the conclusion it isnβt doable in a safe way, we will just continue with our current methods. But I at least wanted to research out to see if/how others were doing this.
I know some field tests were performed or analyzed, but to what extent did we have forensic or computer testing (excuse the terms) to determine the potential physical damage to the school, had the propane bombs went off?
I'm curious as to what the actual structural damage would have been, rather then estimating a death count. Sometimes disasters are recreated by engineers or scientists through computer simulations, but I can find anything like that with respect to the cafeteria bombs. Either way, documents would suffice as well.
I reread the 2006 NY Magazine article. Link: https://nymag.com/news/features/17336/
A couple of paragraphs stood out to me:
"Ron hired a private investigator, former FBI special-operations agent Ken Gallant, who scoured Snehaβs favorite hangouts, interviewed employees at bars and hotels near Century 21, and talked to Snehaβs friends, family, and co-workers. Gallant brought photos of Sneha to ferry docks, looking for people who remembered her fleeing on the 11th or being dragged out on the 10th. He even recommended a psychic whom the family flew in from Pennsylvania.
Gallant also raised the possibility that Sneha might be alive and living a new life somewhere. He oversaw a forensic examination of Snehaβs computer, searching for evidence of a secret lover, an upcoming tryst. But he found nothing, and the fact that Sneha left behind her glasses, passport, driverβs license, and credit cards (with the exception of Ronβs AmEx) seemingly ruled out the theory that she intentionally disappeared."
If an ex-FBI agent can't find any evidence of her running away, is it really viable? She didn't do anything online to prepare to flee?
Hi guys!
I know there's been some sort of questions related to these two, but they're not really on par with my question, so I figured I'd throw it out there.
I graduated with my MSW, have some post-grad certificates related to statistics/STEM. Decided I don't want to do direct practice after spending the pandemic working as an ED SW (i'm exhausted).
I've been interested in more analytical things lately - used GIS to map overdoses for targeted community outreach, analyzed outpatient retention during the pandemic, created reports to audit physician adherence to a new protocol, can use Excel / SPSS / SAS / SQL decently, and enjoy the more admin side of SW. I've been toying with a CS degree to set up a foundational knowledge in CS, and maybe move more into intelligence / crime analysis or cybersecurity (I have a crime analysis cert). I'd like to still use SW, but my thinking is a bit narrow and was wondering if anyone has any ideas or thoughts on combining the two - most of the CS folks at my job(s) don't have a clinical background, and the clinical folks don't have a STEM background. Not sure how I could blaze my own path.
Hello, I am currently about halfway through an associates degree in cybersecurity and information assurance at my local community college. I donβt hate cybersecurity but it is definitely lack luster. I have been looking into computer/digital forensics as something that I may be able to pursue after I complete my associates. I have some questions. Would it be an easy transition from cybersecurity to digital forensics? Should I pursue a more specific bachelors or just go for the certifications and find some real life experience? What has your experience in the field been like/ what is your day to day like? Do you enjoy it? I know it is most definitely not like Hollywood portrays it but do you feel like you are helping people and making a difference? Would you do it all over again? And finally Any advice you can offer?
Thank you in advance!!
Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.