Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis. Anti-forensics has only recently[when?] been recognized...
24 KB (2,933 words) - 17:47, 26 February 2025
Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions...
41 KB (5,161 words) - 11:47, 11 May 2025
mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes...
11 KB (662 words) - 20:02, 15 May 2025
Code to Counter Police Forensics". Wired.com. Retrieved 15 December 2009. Official website "Microsoft Computer Online Forensic Evidence Extractor (COFEE)"...
11 KB (948 words) - 20:20, 4 March 2025
Data erasure (redirect from Computer and electronic data destruction)
discovered on hard drives found in Agbogbloshie.[citation needed] Anti-computer forensics Crypto-shredding Data recovery Data remanence Electronic waste...
31 KB (3,085 words) - 14:00, 26 May 2025
mentioned in the acknowledgements of Stephenson's Cryptonomicon. Anti-computer forensics This article incorporates material from the Citizendium article...
52 KB (5,439 words) - 03:24, 26 May 2025
Physical information security (category Computer security)
inspections/tests and preventive maintenance. Paper shredder Physical security Anti-computer forensics Granger, Sarah (2001-12-18). "Social Engineering Fundamentals,...
9 KB (1,092 words) - 18:45, 15 May 2024
WindowsSCOPE (category Computer forensics)
WindowsSCOPE is a memory forensics and reverse engineering product for Windows used for acquiring and analyzing volatile memory. One of its uses is in...
3 KB (226 words) - 17:53, 27 December 2024
Host protected area (category Computer forensics)
interest to government and police computer forensics teams. Some rootkits hide in the HPA to avoid being detected by anti-rootkit and antivirus software...
6 KB (567 words) - 11:44, 11 May 2025
Psychology Principles and Practice of Accounting Computer and digital forensics Fraud Auditing and Forensic Accounting Criminal Investigations Studies on...
25 KB (3,093 words) - 15:13, 6 May 2025
it. Some other methods of carrying out these include: Disk and memory forensics DoS attacks Frameworks such as: Metasploit Network Security Reverse engineering...
18 KB (1,870 words) - 03:36, 6 June 2025
Fileless malware (category Computer forensics)
battery from laptop computers. Unplug the power and other devices from sockets on the computer itself Fileless malware subverts the forensics models, as evidence...
14 KB (1,472 words) - 17:21, 12 September 2024
Forensic accounting, forensic accountancy or financial forensics is the specialty practice area of accounting that investigates whether firms engage in...
23 KB (2,505 words) - 10:40, 31 May 2025
Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215. Computer security at the Encyclopædia Britannica Tate...
220 KB (22,314 words) - 07:16, 2 June 2025
Dave Kleiman (section Computer security & cryptography)
Dave Kleiman (22 January 1967 – 26 April 2013) was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker...
11 KB (1,080 words) - 16:16, 26 February 2025
Data recovery (redirect from Forensic data recovery)
Systems Security Studies and Research Forensic Toolkit: by AccessData, used by law enforcement Open Computer Forensics Architecture: An open-source program...
30 KB (3,635 words) - 22:35, 5 June 2025
branch of the Garda Síochána that investigates computer crime, including providing digital forensics. The unit was established in 1991 as part of the...
5 KB (392 words) - 18:55, 25 December 2023
Audio forensics is the field of forensic science relating to the acquisition, analysis, and evaluation of sound recordings that may ultimately be presented...
20 KB (2,590 words) - 14:26, 24 May 2025
Greg Hoglund (section Physical memory forensics)
and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds...
13 KB (1,421 words) - 03:51, 5 March 2025
to defend from the attack. Billion laughs Computer crime Smurf attack EC-Council (2009). Computer Forensics: Investigating Network Intrusions and Cyber...
3 KB (346 words) - 16:20, 26 February 2022
Programs". www.ojp.gov. Retrieved 2023-06-08. "Alternate Light Sources | Forensics | Forensic Supplies | Sirchie". www.sirchie.com. Retrieved 2023-06-08. National...
52 KB (6,017 words) - 20:14, 6 March 2025
conducting a computer forensic examination", the employment of digital forensics good practice and methodologies in the investigation by computer forensics experts...
25 KB (3,336 words) - 22:18, 27 December 2024
BusKill (category Anti-forensic software)
be used to ensure the confidentiality of data or be used as a counter-forensics device. Free and open-source software portal Dead man's switch USBKill...
13 KB (1,042 words) - 12:27, 22 May 2025
Cybercrime (redirect from Computer crime)
lost. In a criminal investigation, a computer can be a source of evidence (see digital forensics). Even when a computer is not directly used for criminal...
97 KB (9,867 words) - 03:54, 2 June 2025
USBKill (category Anti-forensic software)
USBKill is anti-forensic software distributed via GitHub, written in Python for the BSD, Linux, and OS X operating systems. It is designed to serve as...
13 KB (1,510 words) - 09:11, 2 June 2025
Spyware (redirect from Anti-spyware software)
form of anti-spyware tools. Anti-spyware has become a new area of online vending with fierce competition. These tools purported to clean computers from spyware...
78 KB (8,732 words) - 21:22, 31 May 2025
Fuzzy hashing (category Digital forensics)
(2010). "Data Fingerprinting with Similarity Digests". Advances in Digital Forensics VI. IFIP Advances in Information and Communication Technology. Vol. 337...
9 KB (815 words) - 07:57, 6 January 2025
Its services include: computer forensics, digital data storage media forensics, mobile device forensics, multimedia file forensics, and damaged hard drive...
13 KB (1,239 words) - 11:22, 15 May 2025
Keystroke logging (redirect from Anti-Keylogging)
An anti-keylogger is a piece of software specifically designed to detect keyloggers on a computer, typically comparing all files in the computer against...
45 KB (5,266 words) - 04:22, 5 June 2025
Printer tracking dots (redirect from Forensic printer marks)
arrange yellow dots in seemingly random point clouds. According to the Chaos Computer Club in 2005, color printers leave the code in a matrix of 32 × 16 dots...
16 KB (1,627 words) - 19:04, 20 May 2025