Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Forensics (3)
- Digital forensics (3)
- Digital evidence (2)
- Evidence (2)
- ACPO (1)
-
- ACR (1)
- ADSL routers (1)
- Admissibility (1)
- Android (1)
- Attribution (1)
- Automatic Crash Recovery (1)
- BitMatch (1)
- Browsing history (1)
- Bytecode (1)
- Cloud computing (1)
- CodeMatch (1)
- CodeSuite (1)
- Communities of practice (1)
- Compound files. (1)
- Computer forensics (1)
- Copying (1)
- Curriculum (1)
- Cyber safety (1)
- Cyber security (1)
- DNS (1)
- Decision support (1)
- Decompiling (1)
- Digital Examiner (1)
- Digital Forensics (1)
- Digital Investigation Guidelines (1)
Articles 31 - 33 of 33
Full-Text Articles in Engineering
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Automatic Crash Recovery: Internet Explorer's Black Box, John Moran, Douglas Orr
Automatic Crash Recovery: Internet Explorer's Black Box, John Moran, Douglas Orr
Journal of Digital Forensics, Security and Law
A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of …
Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley
Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley
Journal of Digital Forensics, Security and Law
Web based email systems may be a source of pristine digital evidence because of the perceived difficulty of client tampering with messages stored inside the email account. We demonstrate that such assumption is wrong in the case of Windows Live Hotmail®1 . Windows Live Mail®1 synchronises message on client-side computers with the Hotmail® server, benefiting users wishing to synchronise their email accounts and personal devices. However, this synchronisation opens an exploit for wrongdoers to tamper with existing email messages and attachments as well as facilitating the insertion of fabricated messages. The exploit process enables persistent storage of tampered and fabricated …