Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

2006

Discipline
Keyword
Publication

Articles 61 - 63 of 63

Full-Text Articles in Engineering

“El Tribunal De Justicia De Las Comunidades Europeas Confirma La Validez Del Reglamento Nº 261/2004 (Compensación En Caso De Denegación De Embarque Y De Cancelación O Gran Retraso De Un Vuelo)”, Luis González Vaqué Dec 2005

“El Tribunal De Justicia De Las Comunidades Europeas Confirma La Validez Del Reglamento Nº 261/2004 (Compensación En Caso De Denegación De Embarque Y De Cancelación O Gran Retraso De Un Vuelo)”, Luis González Vaqué

Luis González Vaqué

The fact that the validity of a Community act is contested before a national court is not in itself sufficient to warrant referral of a question to the Court of Justice for a preliminary ruling.

Courts against whose decisions there is a judicial remedy under national law may examine the validity of a Community act and, if they consider that the arguments put forward before them by the parties in support of invalidity are unfounded, they may reject them, concluding that the act is completely valid, given that, in so doing, they are not calling into question the existence of …


Mac Os X Forensics, Philip Craiger, Paul Burke Dec 2005

Mac Os X Forensics, Philip Craiger, Paul Burke

J. Philip Craiger, Ph.D.

This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal.


Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger Dec 2005

Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke, Philip Craiger

J. Philip Craiger, Ph.D.

Secure deletion programs purport to permanently erase files from digital media. These programs are used by businesses and individuals to remove sensitive information from media, and by criminals to remove evidence of the tools or fruits of illegal activities. This paper focuses on the trace evidence left by secure deletion programs. In particular, five Windows-based secure deletion programs are tested to determine if they leave identifiable signatures after deleting a file. The results show that the majority of the programs leave identifiable signatures. Moreover, some of the programs do not completely erase file metadata, which enables forensic investigators to extract …