• Thumbnail for Computer forensics
    Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital...
    23 KB (2,453 words) - 00:09, 29 July 2025
  • Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis. Anti-forensics has only recently[when?] been recognized...
    24 KB (2,933 words) - 17:47, 26 February 2025
  • Thumbnail for Digital forensics
    devices involved: computer forensics, network forensics, forensic data analysis, and mobile device forensics. The typical forensic process encompasses...
    57 KB (6,085 words) - 06:49, 28 July 2025
  • mainly focused on computer forensics, although in recent years similar tools have evolved for the field of mobile device forensics. This list includes...
    11 KB (662 words) - 20:02, 15 May 2025
  • Thumbnail for Network forensics
    Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information...
    10 KB (1,218 words) - 04:33, 4 March 2024
  • Thumbnail for Mobile device forensics
    Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions...
    41 KB (5,161 words) - 11:47, 11 May 2025
  • Rebecca Mercuri (category American computer security academics)
    Rebecca Mercuri is a computer scientist specializing in computer security and computer forensics. She is considered a leading expert on electronic voting...
    7 KB (569 words) - 07:39, 24 June 2025
  • The Open Computer Forensics Architecture (OCFA) is a distributed open-source computer forensics framework used to analyze digital media within a digital...
    2 KB (145 words) - 14:31, 24 July 2025
  • recognition is adding firms in fraud cases. Electronic data processing Computer forensics Data analysis Helpdesk and incident reporting auditing Change management...
    26 KB (3,335 words) - 13:26, 26 July 2025
  • Forensic search is an emerging field of computer forensics. Forensic search focuses on user created data such as email files, cell phone records, office...
    16 KB (2,160 words) - 12:13, 11 August 2023
  • Thumbnail for Cybercrime
    Cybercrime (redirect from Computer crime)
    lost. In a criminal investigation, a computer can be a source of evidence (see digital forensics). Even when a computer is not directly used for criminal...
    97 KB (9,907 words) - 03:53, 17 July 2025
  • The Certified Forensic Computer Examiner (CFCE) credential was the first certification demonstrating competency in computer forensics in relation to Windows...
    5 KB (603 words) - 03:38, 6 January 2025
  • Dave Kleiman (22 January 1967 – 26 April 2013) was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker...
    11 KB (1,077 words) - 04:26, 15 June 2025
  • Code to Counter Police Forensics". Wired.com. Retrieved 15 December 2009. Official website "Microsoft Computer Online Forensic Evidence Extractor (COFEE)"...
    11 KB (944 words) - 02:52, 17 July 2025
  • and online game hacking. His later work focused on computer forensics, physical memory forensics, malware detection, and attribution of hackers. He holds...
    13 KB (1,421 words) - 03:51, 5 March 2025
  • Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced cyberattacks which are stealthy...
    7 KB (722 words) - 04:11, 30 April 2025
  • conducting a computer forensic examination", the employment of digital forensics good practice and methodologies in the investigation by computer forensics experts...
    25 KB (3,336 words) - 22:18, 27 December 2024
  • Thumbnail for Department of Defense Cyber Crime Center
    exploitation, and counterterrorism. The Cyber Forensics Laboratory performs Digital and Multimedia (D/MM) forensic examinations, repairs damaged devices and...
    12 KB (1,241 words) - 10:22, 12 February 2025
  • Forensic Toolkit, or FTK, is computer forensics software originally developed by AccessData, and now owned and actively developed by Exterro. It scans...
    3 KB (259 words) - 22:21, 13 November 2024
  • Thumbnail for Forensic data analysis
    Forensic data analysis (FDA) is a branch of digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to...
    3 KB (396 words) - 13:55, 6 February 2024
  • Thumbnail for Forensic science
    Society Computer forensics – Branch of digital forensic science Crime science Diplomatics – Academic study of the protocols of documents (forensic paleography)...
    96 KB (11,047 words) - 16:36, 17 July 2025
  • is a Taiwanese applied mathematician known for his use of computer forensics and computer simulation to recreate what may have occurred in aviation accidents...
    6 KB (510 words) - 00:08, 14 November 2024
  • previously attached to the Forensic Services Division, but moved to the new unit due to the overlap between computer forensics and e-crime investigations...
    3 KB (284 words) - 05:30, 7 June 2025
  • Digital Forensics Framework (DFF) is a discontinued computer forensics open-source software package. It is used by professionals and non-experts to collect...
    10 KB (826 words) - 03:26, 31 July 2024
  • Certified computer examiner is a digital forensics professional recognised by International Society of Forensic Computer Examiners (ISFCE), established...
    5 KB (400 words) - 13:42, 13 April 2025
  • EnCase (redirect from EnCase Forensic)
    products designed for forensic, cyber security, security analytics, and e-discovery use. EnCase is traditionally used in forensics to recover evidence from...
    10 KB (875 words) - 19:11, 28 October 2024
  • chaos" within the scene. The defence questioned the forensics of the case to Robinson, a forensic scientist who had attended the scene, asking him about...
    178 KB (25,357 words) - 00:35, 26 May 2025
  • Thumbnail for Printer tracking dots
    arrange yellow dots in seemingly random point clouds. According to the Chaos Computer Club in 2005, color printers leave the code in a matrix of 32 × 16 dots...
    16 KB (1,627 words) - 06:22, 15 June 2025
  • The Hacker's Handbook (category Hacking (computer security))
    Forensics at Birmingham City University, and frequently appears in the United Kingdom courts as an expert on digital evidence and computer forensics for...
    2 KB (264 words) - 20:55, 14 June 2023
  • Thumbnail for IsoBuster
    "Validation of IsoBuster v1.0" (PDF). digital-forensics.sans.org. SANS Institute. "Computer Forensics Investigations". IsoBuster.com. Smart Projects...
    6 KB (398 words) - 11:28, 12 May 2025