Log in

No account? Create an account
Podcast: Digital Forensics and Hacking Investigations, Part 2 - I Spy — LiveJournal [entries|archive|friends|userinfo]

[ userinfo | livejournal userinfo ]
[ archive | journal archive ]

Podcast: Digital Forensics and Hacking Investigations, Part 2 [Feb. 24th, 2006|10:30 pm]
In Part 2 of this series, we discuss definitions for intellectual property; concepts for authentication of suspect data; introduction to hashing algorithms; electronic discovery protocols; definitions and standards for digital evidence acquisition, capture, and authentication; cyberstalking and online social networks; data protection and privacy regulations; federal powers and the Interstate Commerce Clause; introduction to federal rules governing computer crime and intellectual property theft; FOIA and Sunshine Laws; the process of building a computer crime case; identification of suspect evidence, including form factors and formats used for storage containers; building a forensics toolkit; write blocking devices and the ideal disk imaging system; introduction to Host Protected Area (HPA) analysis; introduction to BIOS and firmware-based rootkits and trojan technology; and more.

This LiveAmmo Podcast is in .mp3 format (~11MB), and is approximately 45 minutes in duration.

Copy and paste our Podcast feed URL into your Podcasting client to subscribe:


For past episodes, visit the LiveAmmo Podcast Archives.

New to Podcasting? Download a free software client today and tune in on your MP3 player or PC:

Apple iTunes (Windows or Mac)
Doppler (Windows, Windows PocketPC, Windows Mobile)
Juice (Windows, Mac, FreeBSD, and Linux)

[listen to .mp3]