Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital...
23 KB (2,453 words) - 00:09, 29 July 2025
Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis. Anti-forensics has only recently[when?] been recognized...
24 KB (2,933 words) - 17:47, 26 February 2025
devices involved: computer forensics, network forensics, forensic data analysis, and mobile device forensics. The typical forensic process encompasses...
57 KB (6,085 words) - 06:49, 28 July 2025
mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes...
11 KB (662 words) - 20:02, 15 May 2025
Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information...
10 KB (1,218 words) - 04:33, 4 March 2024
Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions...
41 KB (5,161 words) - 11:47, 11 May 2025
Rebecca Mercuri (category American computer security academics)
Rebecca Mercuri is a computer scientist specializing in computer security and computer forensics. She is considered a leading expert on electronic voting...
7 KB (569 words) - 07:39, 24 June 2025
The Open Computer Forensics Architecture (OCFA) is a distributed open-source computer forensics framework used to analyze digital media within a digital...
2 KB (145 words) - 14:31, 24 July 2025
recognition is adding firms in fraud cases. Electronic data processing Computer forensics Data analysis Helpdesk and incident reporting auditing Change management...
26 KB (3,335 words) - 13:26, 26 July 2025
Forensic search is an emerging field of computer forensics. Forensic search focuses on user created data such as email files, cell phone records, office...
16 KB (2,160 words) - 12:13, 11 August 2023
Cybercrime (redirect from Computer crime)
lost. In a criminal investigation, a computer can be a source of evidence (see digital forensics). Even when a computer is not directly used for criminal...
97 KB (9,907 words) - 03:53, 17 July 2025
The Certified Forensic Computer Examiner (CFCE) credential was the first certification demonstrating competency in computer forensics in relation to Windows...
5 KB (603 words) - 03:38, 6 January 2025
Dave Kleiman (section Computer security & cryptography)
Dave Kleiman (22 January 1967 – 26 April 2013) was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker...
11 KB (1,077 words) - 04:26, 15 June 2025
Code to Counter Police Forensics". Wired.com. Retrieved 15 December 2009. Official website "Microsoft Computer Online Forensic Evidence Extractor (COFEE)"...
11 KB (944 words) - 02:52, 17 July 2025
Greg Hoglund (section Physical memory forensics)
and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds...
13 KB (1,421 words) - 03:51, 5 March 2025
Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced cyberattacks which are stealthy...
7 KB (722 words) - 04:11, 30 April 2025
conducting a computer forensic examination", the employment of digital forensics good practice and methodologies in the investigation by computer forensics experts...
25 KB (3,336 words) - 22:18, 27 December 2024
exploitation, and counterterrorism. The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, repairs damaged devices and...
12 KB (1,241 words) - 10:22, 12 February 2025
Forensic Toolkit, or FTK, is computer forensics software originally developed by AccessData, and now owned and actively developed by Exterro. It scans...
3 KB (259 words) - 22:21, 13 November 2024
Forensic data analysis (FDA) is a branch of digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to...
3 KB (396 words) - 13:55, 6 February 2024
Society Computer forensics – Branch of digital forensic science Crime science Diplomatics – Academic study of the protocols of documents (forensic paleography)...
96 KB (11,047 words) - 16:36, 17 July 2025
is a Taiwanese applied mathematician known for his use of computer forensics and computer simulation to recreate what may have occurred in aviation accidents...
6 KB (510 words) - 00:08, 14 November 2024
previously attached to the Forensic Services Division, but moved to the new unit due to the overlap between computer forensics and e-crime investigations...
3 KB (284 words) - 05:30, 7 June 2025
Digital Forensics Framework (DFF) is a discontinued computer forensics open-source software package. It is used by professionals and non-experts to collect...
10 KB (826 words) - 03:26, 31 July 2024
Certified computer examiner is a digital forensics professional recognised by International Society of Forensic Computer Examiners (ISFCE), established...
5 KB (400 words) - 13:42, 13 April 2025
EnCase (redirect from EnCase Forensic)
products designed for forensic, cyber security, security analytics, and e-discovery use. EnCase is traditionally used in forensics to recover evidence from...
10 KB (875 words) - 19:11, 28 October 2024
chaos" within the scene. The defence questioned the forensics of the case to Robinson, a forensic scientist who had attended the scene, asking him about...
178 KB (25,357 words) - 00:35, 26 May 2025
Printer tracking dots (redirect from Forensic printer marks)
arrange yellow dots in seemingly random point clouds. According to the Chaos Computer Club in 2005, color printers leave the code in a matrix of 32 × 16 dots...
16 KB (1,627 words) - 06:22, 15 June 2025
The Hacker's Handbook (category Hacking (computer security))
Forensics at Birmingham City University, and frequently appears in the United Kingdom courts as an expert on digital evidence and computer forensics for...
2 KB (264 words) - 20:55, 14 June 2023
"Validation of IsoBuster v1.0" (PDF). digital-forensics.sans.org. SANS Institute. "Computer Forensics Investigations". IsoBuster.com. Smart Projects...
6 KB (398 words) - 11:28, 12 May 2025