Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli
After Conversation - A Forensic Icq Logfile Extraction Tool, Kim Morfitt, Craig Valli
Research outputs pre 2011
Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the logfiles from such programs are of forensic interest. This paper outlines research in progress that has resulted in the development of a tool for the extraction of ICQ logfile entries. Detailed reconstruction of data from logfiles was achieved with a number of different ICQ software, with other programs still to be tested. There are several limitations including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to address …
Issues Relating To The Forensic Analysis Of Pda And Telephony (Pdat) Enabled Devices, Craig Valli
Issues Relating To The Forensic Analysis Of Pda And Telephony (Pdat) Enabled Devices, Craig Valli
Research outputs pre 2011
An emergent technology is the PDAT (Personal Digital Assistant & Telecommunicator) a hybrid of a mobile phone and coupled with a PDA's computing and storage abilities. Potentially every mobile phone is now an alternate or possibly primary computing and data repository for individuals. This paper explores current issues relating to its merger with mobile phone technology.