• Anticomputer forensics or counter-forensics are techniques used to obstruct forensic analysis. Anti-forensics has only recently[when?] been recognized...
    24 KB (2,933 words) - 17:47, 26 February 2025
  • Thumbnail for Mobile device forensics
    Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions...
    41 KB (5,161 words) - 11:47, 11 May 2025
  • mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes...
    11 KB (662 words) - 20:02, 15 May 2025
  • Code to Counter Police Forensics". Wired.com. Retrieved 15 December 2009. Official website "Microsoft Computer Online Forensic Evidence Extractor (COFEE)"...
    11 KB (948 words) - 20:20, 4 March 2025
  • discovered on hard drives found in Agbogbloshie.[citation needed] Anti-computer forensics Crypto-shredding Data recovery Data remanence Electronic waste...
    31 KB (3,085 words) - 14:00, 26 May 2025
  • mentioned in the acknowledgements of Stephenson's Cryptonomicon. Anti-computer forensics This article incorporates material from the Citizendium article...
    52 KB (5,439 words) - 03:24, 26 May 2025
  • Physical information security (category Computer security)
    inspections/tests and preventive maintenance. Paper shredder Physical security Anti-computer forensics Granger, Sarah (2001-12-18). "Social Engineering Fundamentals,...
    9 KB (1,092 words) - 18:45, 15 May 2024
  • WindowsSCOPE (category Computer forensics)
    WindowsSCOPE is a memory forensics and reverse engineering product for Windows used for acquiring and analyzing volatile memory. One of its uses is in...
    3 KB (226 words) - 17:53, 27 December 2024
  • Host protected area (category Computer forensics)
    interest to government and police computer forensics teams. Some rootkits hide in the HPA to avoid being detected by anti-rootkit and antivirus software...
    6 KB (567 words) - 11:44, 11 May 2025
  • Psychology Principles and Practice of Accounting Computer and digital forensics Fraud Auditing and Forensic Accounting Criminal Investigations Studies on...
    25 KB (3,093 words) - 15:13, 6 May 2025
  • it. Some other methods of carrying out these include: Disk and memory forensics DoS attacks Frameworks such as: Metasploit Network Security Reverse engineering...
    18 KB (1,870 words) - 03:36, 6 June 2025
  • Fileless malware (category Computer forensics)
    battery from laptop computers. Unplug the power and other devices from sockets on the computer itself Fileless malware subverts the forensics models, as evidence...
    14 KB (1,472 words) - 17:21, 12 September 2024
  • Thumbnail for Forensic accounting
    Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in...
    23 KB (2,505 words) - 10:40, 31 May 2025
  • Thumbnail for Computer security
    Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215. Computer security at the Encyclopædia Britannica Tate...
    220 KB (22,314 words) - 07:16, 2 June 2025
  • Dave Kleiman (22 January 1967 – 26 April 2013) was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker...
    11 KB (1,080 words) - 16:16, 26 February 2025
  • Systems Security Studies and Research Forensic Toolkit: by AccessData, used by law enforcement Open Computer Forensics Architecture: An open-source program...
    30 KB (3,635 words) - 22:35, 5 June 2025
  • branch of the Garda Síochána that investigates computer crime, including providing digital forensics. The unit was established in 1991 as part of the...
    5 KB (392 words) - 18:55, 25 December 2023
  • Thumbnail for Audio forensics
    Audio forensics is the field of forensic science relating to the acquisition, analysis, and evaluation of sound recordings that may ultimately be presented...
    20 KB (2,590 words) - 14:26, 24 May 2025
  • and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds...
    13 KB (1,421 words) - 03:51, 5 March 2025
  • to defend from the attack. Billion laughs Computer crime Smurf attack EC-Council (2009). Computer Forensics: Investigating Network Intrusions and Cyber...
    3 KB (346 words) - 16:20, 26 February 2022
  • Thumbnail for Forensic biology
    Programs". www.ojp.gov. Retrieved 2023-06-08. "Alternate Light Sources | Forensics | Forensic Supplies | Sirchie". www.sirchie.com. Retrieved 2023-06-08. National...
    52 KB (6,017 words) - 20:14, 6 March 2025
  • conducting a computer forensic examination", the employment of digital forensics good practice and methodologies in the investigation by computer forensics experts...
    25 KB (3,336 words) - 22:18, 27 December 2024
  • Thumbnail for BusKill
    BusKill (category Anti-forensic software)
    be used to ensure the confidentiality of data or be used as a counter-forensics device. Free and open-source software portal Dead man's switch USBKill...
    13 KB (1,042 words) - 12:27, 22 May 2025
  • Thumbnail for Cybercrime
    Cybercrime (redirect from Computer crime)
    lost. In a criminal investigation, a computer can be a source of evidence (see digital forensics). Even when a computer is not directly used for criminal...
    97 KB (9,867 words) - 03:54, 2 June 2025
  • Thumbnail for USBKill
    USBKill (category Anti-forensic software)
    USBKill is anti-forensic software distributed via GitHub, written in Python for the BSD, Linux, and OS X operating systems. It is designed to serve as...
    13 KB (1,510 words) - 09:11, 2 June 2025
  • form of anti-spyware tools. Anti-spyware has become a new area of online vending with fierce competition. These tools purported to clean computers from spyware...
    78 KB (8,732 words) - 21:22, 31 May 2025
  • Fuzzy hashing (category Digital forensics)
    (2010). "Data Fingerprinting with Similarity Digests". Advances in Digital Forensics VI. IFIP Advances in Information and Communication Technology. Vol. 337...
    9 KB (815 words) - 07:57, 6 January 2025
  • Thumbnail for Ministry of Justice Investigation Bureau
    Its services include: computer forensics, digital data storage media forensics, mobile device forensics, multimedia file forensics, and damaged hard drive...
    13 KB (1,239 words) - 11:22, 15 May 2025
  • An anti-keylogger is a piece of software specifically designed to detect keyloggers on a computer, typically comparing all files in the computer against...
    45 KB (5,266 words) - 04:22, 5 June 2025
  • Thumbnail for Printer tracking dots
    arrange yellow dots in seemingly random point clouds. According to the Chaos Computer Club in 2005, color printers leave the code in a matrix of 32 × 16 dots...
    16 KB (1,627 words) - 19:04, 20 May 2025