|Podcast: Digital Forensics and Hacking Investigations, Part 2
||[Feb. 24th, 2006|10:30 pm]
In Part 2 of this series, we discuss definitions for intellectual property; concepts for authentication of suspect data; introduction to hashing algorithms; electronic discovery protocols; definitions and standards for digital evidence acquisition, capture, and authentication; cyberstalking and online social networks; data protection and privacy regulations; federal powers and the Interstate Commerce Clause; introduction to federal rules governing computer crime and intellectual property theft; FOIA and Sunshine Laws; the process of building a computer crime case; identification of suspect evidence, including form factors and formats used for storage containers; building a forensics toolkit; write blocking devices and the ideal disk imaging system; introduction to Host Protected Area (HPA) analysis; introduction to BIOS and firmware-based rootkits and trojan technology; and more.
This LiveAmmo Podcast is in .mp3 format (~11MB), and is approximately 45 minutes in duration.
Copy and paste our Podcast feed URL into your Podcasting client to subscribe:
For past episodes, visit the LiveAmmo Podcast Archives.
New to Podcasting? Download a free software client today and tune in on your MP3 player or PC:
Apple iTunes (Windows or Mac)
Doppler (Windows, Windows PocketPC, Windows Mobile)
Juice (Windows, Mac, FreeBSD, and Linux)
[listen to .mp3