skip to main | skip to sidebar

Jarape Forense "INFORMATICA, DIGITAL Y TELECOMUNICACIONES"

A todos los vínculos de este blog se puede acceder gratis vía Google o Yahoo. All the links in this blog can be freely accessed through Google or Yahoo.

Observatorio Forense de Jarape

No hay comentarios:
Inicio
Suscribirse a: Entradas (Atom)

A página principal

  • Jarape Forense

Archivo del blog

  • ▼  2008 (1)
    • ▼  febrero (1)
      • Observatorio Forense de Jarape

Buscar - Search

Datos personales

jarapeforense
Jairo Peláez Rincón, químico Universidad Nacional de Colombia. Perito Laboratorio de Evidencias Traza, Instituto Nacional de Medicina Legal y Ciencias Forenses (Bogotá, Colombia)
Ver todo mi perfil

Música


Red-shifted Harmonies by DAC Crowell

Seguidores

Locations of visitors to this page
 

CASES - CASOS

  • The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues (Craig Valli y Andrew Woodward)
  • Trouble in Florida: The genesis of phishing attacks on australian banks (Stephen McCombie)

CRYPTOGRAPHY - CRIPTOGRAFIA

  • Digital evidence obfuscation: recovery techniques (J. Philip Craiger et al)
  • Practical approaches to recovering encrypted digital evidence (Eoghan Casey)
  • Survey and future trends of efficient cryptographic function implementations on GPGPUs (Adrian Boeing)

DIGITAL EVIDENCE - EVIDENCIA DIGITAL

  • Election Forensics: Quantitative methods for electoral fraud detection (Lucas Lacasa y Juan Fernández García) [Forensic Sci. International, 2019]
  • Open source digital forensics tools (Brian Carrier)
  • The rising cost of digital evidence and its hidden fees (Hisham Abbas) {J. For. Research, 2015}

DIGITAL WATERMARKING

  • Methodologies in digital watermarking: Robust and reversible watermarking techniques for authentication, security and privacy protection (Xin Cindy Guo)

DRIVES

  • The impact of U3 devices on forensic analysis (R. Tank y P. Williams)

E-MAIL - CORREO ELECTRÓNICO

  • Email 'Message-IDs' helpful for forensic analysis? (Satheesaan Pasupatheeswaran)

ESPIONAGE

  • Industrial espionage from residual data: Risks and countermeasures (Iain Sutherland y Andy Jones)

GENERAL

  • A ten step process for forensic readiness (Robert Rowlingson)
  • Computer science in forensic research (Bartosz Kowalski et al) {Problems of Forensic Sciences, 2014}
  • Cyber crime psychology - Proposal of an offender psychological profile (Jakub Lickiewicz) {Problems of Forensic Sciences. 2011}
  • Digital forensics research: The next 10 years (Simson L. Garfinkel) [Digital Investigation, 2010]
  • Forensic investigation of peer-to-peer file sharing networks (Marc Liberatore et al) [Digital investigation, 2010]
  • Investigating computer crimes in organisations: A question of collaboration between the investigator and the information system security manager (Solange Ghernaouti-Hélie et al) {Problems of Forensic Sciences. 2001}
  • Space transition theory of cyber crimes (Jaishankar Karuppannan) [Crimes of the internet. F. Schmalleger, F; M, Pittaro (ed). Pearson, 2008]
  • The meaning of linkfiles in forensic examination (Harry Parsonage) {2010}
  • The perpetrators of computer crimes as a heterogeneous group (Jakub Lickiewicz) {Problems of Forensic Sciences, 2013}
  • Virtual intelligence the ninth family of intelligences to be added to Howard Gardner's list ( Nadine Touzeau) [J. Criminology and Forensic Studies, 2018]

GUIDELINES - GUÍAS

  • A police officer's guide: Seizure, handling and storage of computer evidence (Franklin Clark)
  • Best practices for computer forensics [SWGDE]
  • Computer forensics guidelines (Andrew Whitehead)
  • Electronic crime scene investigation - A guide for first responders [NIJ]
  • Guidelines for best practice in the forensic examination of digital technology [IOCE]
  • Guidelines on cell phone forensics. Recommendations of the NIST (Wayne Jansen y Rick Ayers)
  • Guidelines on PDA forensics. Recommendations of the NIST (Wayne Jansen y Rick Ayers)

IMAGE - IMAGEN

  • Detecting cyclostationarity in re-captured LCD screens (Babak Mahdian et al) {J. Forensic Research, 2015}

INFORMATICA / INFORMATICS

  • "Complete Delete" and other patterns for information eradication (Simon L. Garfinklel)
  • "Every contact leaves a trace": Computers forensics and electronic textuality (Matthew G. Kirschenbaum)
  • A forensic analysis of a distributed two-stage web-based spam attack (Daniel V. Klein)
  • A forensic analysis of the Windows registry (Derrick J. Farmer)
  • A graphical representation of file statistics for computer forensics (Sheldon B. Teerlink)
  • A hypothesis-based approach to digital forensic investigations (Brian D. Carrier)
  • A las puertas de una nueva especialización: La informática forense (Alberto David Airala y Osvaldo Horacio Rapetti)
  • A look at crime in the age of technology (Amber Ennis)
  • A method-based whole-program watermarking scheme for Java class files (Anshuman Mishra et al)
  • A new approach to complex digital investigations (Peter Stephenson)
  • A portable network forensic evidence collector (Bruce J. Nikkel)
  • A road map for digital forensic research {DFRWS]
  • A ten step process for forensic readiness (Robert Rowlingson)
  • A web service for file fingerprints: The good, the bads, and the unknowns (Simon L. Garfinkel)
  • ACES Software Write Block Tool Report: Writeblocker windows XP v6.10.0 [NIJ]
  • ACES software Write Block Tool Test Report: Writeblocker windows 2000 v5.02.00 [NIJ]
  • Admisibilidad de la evidencia digital: Algunos elementos de revisión y análisis (Jeimy José cano Martínez)
  • Admission of forensic animation (Steven P. Breaux)
  • AFF: A new format for storing hard drive images (Simon L. Garfinkel)
  • An evaluation of personal health information in second-hand personal computer disk drives (Khaled El Emam et al)
  • An examination of digital forensic models (Mark Reith et al)
  • An explanation of computer forensics (Judd Robbins)
  • An introduction to investigating IPv6 networks (Bruce J. Nikkel)
  • An overview of steganography for the computer forensic examiner (Gary C. Kessler)
  • Análisis forense de PDA [Canal PDA]
  • Animated crash scenes can often give more complete view, understanding of events preceding collision [ARC]
  • Anti-forensics: Techniques, detection and countermeasures (Simon L. Garfinkel)
  • Appropriate standards and controls in computer forensics (John J. Barbara)
  • Asklepios. La base de datos forense (Juan A. Cobo Plana)
  • Automated mapping of large binary objects using primitive fragment type classification (Gregory Conti et al) [Digital Investigation, 2010]
  • Basic computer forensic concept (Sang Young)
  • Basic steps in forensic analysis of Unix Systems (Ray Link)
  • Before bytes: Collecting physical computer evidence (Emie Hamm)
  • Being prepared for intrusion (Dan Farmer y Wietse Venema)
  • Blogs de Google para peritos forenses [Don Perito]
  • Bluepipe: A scalable architecture for on-the-spot digital forensics (Yun Gao et al)
  • Bring out your dead. The ins and outs of data recovery (Dan Farmer)
  • Calculator Forensics (Mike Sebastian)
  • Carving contiguous and fragmented files with fast object validation (Simon L. Garfinkel)
  • Casting votes in the auditorium (Daniel Sandler y Dan S. Wallach)
  • Clean Delete (Simon L. Garfinkel)
  • Computación forense, análisis de "cadáveres" virtuales (Ana María Restrepo)
  • Computational forensics: Towards hybrid-intelligent crime investigation (Katrin Franke y Sargur N. Srihari)
  • Computer forensic "expert" witnesses - Do you know who is representing you? (CY4OR)
  • Computer forensic analysis in a virtual environment (Derek Bem y Ewa Huebner)
  • Computer forensic investigations (Michael Barba)
  • Computer forensic standards: National Software Reference Library, Computer forensics tool testing, Computer forensics reference data sets, PDA forensics research (Barbara Guttman)
  • Computer forensics - Overcoming the "after-the-fact" approach (P. Dennis Newson)
  • Computer forensics [US-CERT]
  • Computer forensics field triage process model (Marcus K. Rogers et al)
  • Computer forensics in the campus environment (Scott L. Ksander)
  • Computer forensics tool testing at NIST (Jim Lyle)
  • Computer forensics: Hiding in plain sight (Kara L. Nance)
  • Computer forensics: The key to solving the crime (Lisa Oseles)
  • Computer forensics: The need for standardization and certification (Matthew Meyers y Marc Rogers)
  • Computer forensics: Training and education (Robert F. Erbacher)
  • Computer forensics. Detecting the imprint (Illena Armstrong)
  • Conceptos y retos en la atención de incidentes de seguridad y la evidencia digital (Jeimy José cano Martínez)
  • Content-based information retrieval from forensic image databases (Zeno Geradts)
  • Contribución de la informática forense a la seguridad (Diofanor Rodríguez)
  • Converting the Culprits/Reducing International Cyber Security Vulnerability: Garnering Hacker Allegiance Within and Across Borders (Georgie Ann Weatherby) [Mathews Journal of Forensic Research, 2018]
  • Covert channel forensics on the internet: Issues, approaches, and experiences (Ashish Patel et al)
  • Credenciales para investigadores forenses en informática. Certificaciones y entrenamiento (Jeimy Cano Martínez)
  • Cutting edge 3-D reconstruction (Craig Fries)
  • Cyber-criminals and data sanitization: A role for forensic accountants (Dale L. Lunsford y Walter A. Robbins)
  • Data collection mechanisms for intrusion detection systems (Eugene Spafford y Diego Zamboni)
  • Data forensics - The smoking gun may be a click away (Paul Lewis)
  • Defeating script injection attacks with browser-enforced embedded policies (Trevor Jim et al)
  • Defining digital forensics (Ken Zatyko)
  • Delitos high-tech, las ciencias forenses tocan las computadoras - Entrevista a Andrés Velázquez
  • Detección estadística de intrusiones en redes de datos (J. D. Britos)
  • Developer's guide to web application security (Michael Cross)
  • Diebold TSx evaluation. Security alert: may 11, 2006 (Harri Hursti)
  • Different interpretations of ISO9660 file systems
  • Digital data acquisition tool test assertions and test plan [NIST]
  • Digital evidence - A review: 2001 to 2004 (Anthony DiClemente et al)
  • Digital evidence - A review: 2004 to 2007 (Paul Reedy et al)
  • Digital evidence accreditation (John J. Barbara)
  • Digital evidence accreditation: Part 2 (John J. Barbara)
  • Digital evidence and computer crime (B.J. Gleason)
  • Digital forensic analysis methodology [CCIPS]
  • Digital forensic implications of ZFS (Nicole Lang Beebe et al) {Digital Investigation, 2009}
  • Digital forensics in the twenty-first century (Gavin W. Manes)
  • Digital insider: Some essential tasks performed during analysis (John J. barbara)
  • Disk sanitization and cross drive forensics (Simon L. Garfinkel)
  • Documentación de los procedimientos de análisis forense de computadores (John J. Barbara)
  • Dynamic recreation of kernel data structures for live forensics (Andrew Case et al) [Digital Investigation, 2010]
  • E-forensics steganography system for secret information retrieval (Vidyasagar M. Potdar et al)
  • eDANGER.com (Bruce Gross)
  • El concepto de documento y el real decreto ley 14/1999, de 17 de septiembre, sobre firma electrónica (Gaspar Clavell Vergés)
  • El documento electrónico frente al derecho civil y financiero (Fernando Ruiz)
  • Email forensics - Email discovery [Global Digital]
  • EnCase: A study in computer-forensic technology (Lee Garber)
  • Enhancing the forensic ICQ logfile extraction tool (Kim Morfitt)
  • Estado del arte del peritaje informático en latinoamérica (Jeimy J. Cano)
  • Esteganografía: Doble uso [Kriptópolis]
  • Estrategias anti-forenses en informática: Repensando la computación forense (Jeimy José Cano Martínez)
  • Evaluating commercial counter-forensic tools (Matthew Geiger)
  • Every contact leaves a trace: Computers forensics and electronic textuality (Matthew G. Kirschenbaum)
  • Evidencia digital en Colombia: Una reflexión en la práctica (Diana Bogotá Prieto y Claudia Moreno Peña)
  • Evidentiary implications of potential securiry weaknesses in forensic software (Chris K. Ridder)
  • Examining wireless access points and associated devices (Christopher Then)
  • Exploiting the rootkit paradox with Windows memory analysis (Jesse D. Kornblum)
  • Extracting Windows command line details from physical memory (Richard M. Stevens y Eoghan Casey) [Digital Investigation, 2010]
  • FATKit: Detecting malicious library injection and upping the "Anti" (Aaron Walters)
  • File recovery techniques. Files wanted, dead or alive (Wietse Venema)
  • Filter N. Forensic number filter [NTI]
  • Finding and selecting a computer forensic expert (Gregory L. Fordham)
  • Firmas digitales y autenticación de evidencia electrónica (Julio A. Torres González)
  • First responders guide to computer forensics (Richard Nolan et al)
  • First responders guide to computer forensics: Advanced topics (Richard Nolan et al)
  • Forensic acquisition utilities (George M. Garner Jr)
  • Forensic analysis for epidemic attacks in federal networks (Yinglian Xie et al)
  • Forensic analysis of a compromised intranet server (Roberto Obialero)
  • Forensic analysis of a SQL server 2005 database server (Kevvie Fowler)
  • Forensic analysis of computer programs. Part I - Dynamic malware analysis (Nick Harbour)
  • Forensic analysis of Microsoft Windows Recycle Bin records (Keith J. Jones)
  • Forensic analysis using correlation of Unix logs (Asier Gutiérrez)
  • Forensic animation - its origins, creation, limitations and future (Stuart Gold)
  • Forensic animation and forensic multimedia (Stuart Gold)
  • Forensic computer analysis: An introduction (Dan Farmer y Wietse Venema)
  • Forensic computer investigation brings notorious serial killer BTK to justice (Erica B. Simons)
  • Forensic data recovery from flash memory (Marcel Breeuwsma et al)
  • Forensic data validation and integrity logging (Jason Coombs)
  • Forensic databases: Paint, shoe prints, and beyond (Robin Bowen y Jessica Schneider)
  • Forensic examination of digital evidence: A guide for law enforcement [NIJ]
  • Forensic feature extraction and cross-drive analysis (Simon L. Garfinkel)
  • Forensic imaging goes digital (Jason Schneider)
  • Forensic information management system (Rashpal S. Ahluwalia y Arunshankar Srinivasan)
  • Forensic investigation and its relationship with information assurance and corporate governance (Maarten Van Horenbeeck)
  • Forensic investigation of the Nintendo Wii: A first glance (Benjamin Turnbull)
  • Forensic investigation process model for Windows mobile devices (Anup Ramabhradran)
  • Forensic physical memory analysis: an overview of tools and techniques (Gabriela Limon García)
  • Forensic Tower II Quick Guide
  • Forensically sound examination of a Macintosh - Part 1 (Ryan R. Kubasiak)
  • Forensically sound examination of a Macintosh - Part 2 (Ryan R. Kubasiak)
  • From log files to litigation. Making electronic evidence count (Larry Gagnon)
  • From logs to logic: Best practices for security information management (Gretchen Hellman)
  • Full guide on cyber crimes in India (Mayur S. Joshi)
  • Functionality test of the UltraBlock forensic card reader [Marshall University Forensic Science Center]
  • Fundamental computer investigation guide for Windows [Microsoft]
  • Generación de sistemas seguros a partir de ataques (Alberto Machado García) [MoleQla, 2019]
  • Guía operativa para procedimientos judiciales con secuestro de tecnología informática (Leopoldo Sebastián Gomez)
  • Guide to integrating forensic techniques into incident response - Computer security [NIST]
  • Guidelines on PDA forensics (Wayne Jansen y Rick Ayers)
  • H. P. P. The hacker's profiling project: a general overview (Raoul Chiesa y Stefania Ducci)
  • Hash based disk imaging using AFF4 (Michael Cohen y Bradley Schatz) [Digital investigation, 2010]
  • Hints and tricks for getting the hidden guard digits (Mike Sebastian)
  • Honeytraps, a network forensic tool (Alec Yasinsac y Yanet Manzano)
  • Honeytraps, a network forensic tool (Alec Yasinsac y Yanet Manzano)
  • How to assess a forensic animation - offensive and defensive strategies (Steven P. Breaux)
  • Identificacao da autoria (Carolina Chaves)
  • Identifying authorship by byte-level N-Grams: The source code author profile (SCAP) method (Georgia Frantzeskou et al)
  • IIS security and programming countermeasures (Jason Coombs)
  • Improving evidence acquisition from live network source (Bruce J. Nikkel)
  • In Colombia computer evidence helps crack criminal cases (Kevin Whitelaw)
  • Informador forensics [ComputerForensics]
  • Informática forense (Giovanni Zuccardi y Juan David Gutiérrez)
  • Information assurance education and the protection of U.S. critical infrastructures (Marie Wright)
  • Insider threat study: Computer system sabotage in critical infrastructure sectors (Michelle Keeney et al)
  • Insider threat study: Illicit cyber activity in the banking and finance sector (Marisa Reddy Randazzo et al)
  • Introducción a la informática forense (Jeimy J. Cano)
  • Introducción a la informática forense (Santiago Acurio del Pino)
  • Introduction to computer forensics (Jagdish S. Gangolly)
  • Investigations involving the internet and computer networks [NIJ]
  • iPod forensics (Christopher V. Marsico y Marcus K. Rogers)
  • Issues in computer forensics (Sonia Bui et al)
  • La auditoría informática en Cuba. Una visión desde la investigación judicial (Enrique Cordoves)
  • La delincuencia informática transnacional y la UDIMP (Santiago Martín Acurio del Pino)
  • La evidencia electrónica y la autenticación de correos electrónicos (Vivian I. Neptune Rivera)
  • La falsificación de documento [en la ley especial contra los delitos informáticos] (Beatríz di Totto Blanco]
  • La firma electrónica y las entidades de certificación (Alfredo A. Reyes Krafft)
  • La práctica de la prueba por soportes informáticos y audiovisuales en el proceso penal (Josep Manel Medrano i Molina)
  • La seguridad informática y el ataque del 11 de septiembre a las Torres Gemelas de Nueva York
  • La seguridad: una herramienta en el combate de los delitos informáticos (Antonio Araujo Brett)
  • Large scale fraud cases and the issues surrounding e-discovery investigations (CY4OR Limited)
  • Las pruebas en el comercio electrónico (Monica Viloria)
  • Learning the computer forensic way (Kelly J. Kuchta)
  • Looking forward to a career in digital forensics (James Hooker)
  • Los computadores son embargables? (Carlos Ferreyros)
  • Los documentos electrónicos y sus efectos legales en Colombia (Alexander Diaz Garcia)
  • Los mensajes de datos y la prueba de los negocios, actos y hechos con relevancia jurídica soportados en formatos electrónicos (Monica Viloria)
  • Low down and dirty: Anti-forensic rootkits (Darren Bilby)
  • Making your case: Computer forensics in action {The Digital Discoverer}
  • Malware forensics - Investigating and analyzing malicious code (Cameron H. Malin)
  • Malware forensics: Detecting the unknown (Martin Overton) (IBM. 2008)
  • Manual básico de cateo y aseguramiento de evidencia digital (Gabriel Andres Campoli)
  • Metodología para la admisibilidad de las evidencias forenses (José Ebert Bonilla)
  • Mining e-mail content for author identification forensics (O. de Vel et al)
  • Mobile phone forensics tool testing: A database driven approach (Ibrahim M. Baggili)
  • New approach for detecting unknown malicious executables (Boris Rozenberg et al) {J. Forensic Research. 2010. Audio available}
  • New vision of computer forensic science: Need of cyber crime law (Pradeep Tomar et al)
  • Non-classical computer forensics (Neal Krawetz)
  • O e-mail como prova no direito brasileiro (Amaro Moraes e Silva Neto)
  • On-demand view materialization and indexing for network forensic analysis (Roxana Geambasu et al)
  • Open source digital forensics tools - The legal argument (Brian Carrier)
  • Oracle forensics Part 1: Dissecting the Redo logs (David Litchfield)
  • Oracle forensics Part 2: Locating dropped objects (David Litchfield)
  • Oracle forensics part 3: Isolating evidence of attacks against the authentication mechanism (David Litchfield)
  • Oracle forensics Part 4: Live response (David Litchfield)
  • Oracle forensics Part 5: Finding evidence of data theft in the absence of auditing (David Litchfield)
  • Oracle forensics part 6: Examining undo segments, flashback and the oracle recycle bin (David Litchfield)
  • Oracle forensics. Dissection of an Oracle attack in the absence of auditing (David Litchfield)
  • PDA forensic tools: An overview and analysis (Rick Ayers y Wayne Jansen)
  • PDF Forensics: Uncovering MYD files (Ray Yepes) {ISSA Journal, 2008}
  • Perl scripting for IT security (Harlan carvey)
  • Potential impacts of Windows Vista on digital investigations (Christopher Hargreaves y Howard Chivers)
  • Practical computer forensics using open source tools (Bruce Nikkel)
  • Practical strategies for digital discovery: Evidentiary considerations (Eric van Buskirk)
  • Preventing web attack with Apache (Ryan C. Barnett)
  • Principles-driven forensic analysis (Sean Peisert et al)
  • Proactive & reactive forensics. Forensics, antiforensics & automation (Jess García)
  • Programas informáticos para el manejo de referencias bibliográficas (Héctor Wilson Hernández)
  • Questioning the Role of Requirements Engineering in the Causes of Safety-Critical Software Failures (C. W. Johnson y C. M. Holloway)
  • Recovering and examining computer forensic evidence (Michael G. Noblett et al)
  • Reducing computer evidence processing backlogs (Michael Anderson)
  • Reflections on a first computer forensic investigation (Brian Marofsky)
  • Reflections on a first computer forensic investigation (Brian Marofsky)
  • Reflexiones sobre los registros de auditoría (Jeimy José cano Martínez)
  • Rigorous development of automated inconsistency checks for digital evidence using the B method (Pavel Gladyshev y Andreas Enbacka)
  • Roaming PKIs: Harbinger of virtual VPNs? (Gary C. Kessler)
  • Scene of the cybercrime (Michael Cross)
  • Search and seizure from a digital perspective: A reflection on Kerr´s Harvard Law. Review article (Ibrahim Baggili)
  • Secure USB bypassing tool (Jewan Bang et al) [Digital investigation, 2010]
  • Self-protecting digital content (Paul Kocher et al)
  • Shadow data. The fifth dimension of data security risk (Curt Bryson y Michael R. Anferson)
  • Software forensics: Extending authorship analysis techniques to computer programs (Andrew Gray et al)
  • Standards and controls in computer forensics (John J. Barbara)
  • Statistical tools for digital forensics (Alin C. Popescu y Hanry Farid)
  • Steganalysis based on JPEG compatibility (Jessica Fridrich et al)
  • Steganography: Implications for the prosecutor and computer forensics examiner (Gary C. Kessler)
  • Strangers in the night (Wietse Venema)
  • Structured investigation of digital incidents in complex computing environments (Peter Stephenson)
  • Test results for digital data acquisition tool: DCCIdd (version 2.0) [NIJ]
  • Test results for digital data acquisition tool: EnCase 4.22a [NIJ]
  • Test results for digital data acquisition tool: EnCase Linen 5.05f [NIJ]
  • The CFReDS project [NIST]
  • The economics of digital forensics (Tyler Moore)
  • The liturgical forensic examination: Tracing activity on a Windows-based desktop (Robert S. Greenfield)
  • The Normalised Compression Distance as a file fragment classifier (Stefan Axelsson) [Digital Investigation, 2010]
  • The role of digital forensics within a corporate organization (Bruce J. Nikkel)
  • The sauce on source codes: Obtaining DUI dismissals from software non-disclosure (Patrick T. Barone)
  • Thumbs DB files forensic issues (Dustin Hurlbut)
  • Time stamps and timing in audit-based digital forensic systems examination (Terrance A. Roebuck)
  • Time: the currency of computer crime [Symmetricom]
  • Treasure and tragedy in kmem_cache mining for live forensics investigation (Andrew Case et al) [Digital Investigation, 2010]
  • Understanding e-mail: A primer for local prosecutors (Jason Scott)
  • Understanding the FDA´s current thinking on security and access control requirements for computarized systems (R. D. McDowall)
  • Unique file identification in the National Software Reference Library (Steve Mead)
  • Using artificial neural network for forensic file type identification (Ryan M. Harris)
  • Using cartoons to teach internet security (Sukamol Srikwan y Markus Jakobsson)
  • Using purpose-built functions and block hashes to enable small block and sub-file forensics (Simson Garfinkel et al) [Digital Investigation, 2010]
  • Virtual forensics - A discussion of virtual machines related to forensics analysis (Brett Shavers)
  • vmware as a forensic tool (Brett Shavers)
  • Web forensics (Jeff García)
  • What are MACtimes? (Dan Farmer)
  • Who wrote sobig? [Copyright 2003-2004 Authors]
  • Windows operating systems agnostic memory analysis (James Okolica y Gilbert L. Peterson) [Digital Investigation, 2010]
  • Windows Vista - Notes for forensic examiners: Part 1 (Jamie Morris)
  • Windows Vista - Notes for forensic examiners: Part 2 (Jamie Morris)

INTERNET AND NETWORKS

  • “Some Behavior Differences between Bullying and Cyber Bullying and Impacts on Adult Victims” (Nadine Touzeau) [J. Criminology and Forensic Studies, 2018]
  • A forensic examination of online search facility URL record structures (Graeme Horsman) [J Forensic Sciences, 2018]
  • Analysis: The forensics of internet security (Carole Fennely) {CNN, 2000}
  • Issues in acquiring digital evidence from the cloud (Gaurav Chaurasia) {Journal of Forensic Research, 2015}
  • Social media and the new generation of "Computerated" criminals (Heath Grant y Cathryn Lavery) [J. Criminology and Forensic Studies, 2019]

LEGAL

  • Digital forensics and the legal system: A dilemma of our times (James Tetteh Ami-Narh y Patricia Williams)
  • Legal view of digital evidence
  • Possibility of the criminal regulation against anti-forensic tools in Japan. So-called "Winny" case as a clue (Tetsuya Ishii)
  • Subverting National Internet Censoship - An investigation into existing tools and techniques (Jason Smart et al)

MULTIMEDIA

  • A Study of Digital Forensic: Process and Tools (Sandhya Dahake y Shubhangi Daware) {International Journal of Computer Applications, 2012}
  • Efficient Spatiotemporal Matching for Video Copy Detection in H.264/AVC Video (Mohammad Athar Ali y Eran A. Edirisinghe) {International Journal of Computer Applications, 2012}
  • Multimedia forensics is not computer forensics (Rainer Bohme et al)

TELECOMUNICACIONES / TELECOMMUNICATIONS

  • A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing (Suleman Khan et al) {The Scientific World Journal, 2014}
  • An evidence‐based forensic taxonomy of Windows phone dating apps (Niken Dwi Wahyu Cahyani et al) [J Forensic Sciences, 2018]
  • An overview of mobile embedded memory and forensic methodology (Haitham Al-Hajri)
  • Análisis forense a dispositivos móviles - Motorola [Conexioninversa]
  • Cell phone forensic tools: An overview and analysis (Rick Ayers et al)
  • Cell phone forensic tools: An overview and analysis update (Rick Ayers et al)
  • Cell phone forensics (Marty Musters)
  • Comportamiento epidemiológico de la dependencia del teléfono móvil: Una perspectiva criminológica (Edmundo Denis et al) [Colombia Forense. 2018]
  • Computer tips - WordPerfect 6.1 tips and techniques-tables (Judy Johnson)
  • Fit a doin'? (John Butler)
  • Forensic acquisition and analysis of the Tom Tom One satellite navigation unit (Peter Hannay)
  • Forensic analysis of mobile phone internal memory (Svein Y. Willassen)
  • Forensic examination of a RIM (Blackberry) wireless device. June, 2002 (Michael W. Burnette)
  • Forensic software tools for cell phones (Wayne Jansen)
  • Guidelines on cell phone forensics. Recommendations of the NIST (Wayne Jansen y Rick Ayers)
  • iPhone forensic methodology and tools (Haitham Al-Hajri y Krishnun Sansurooah)
  • Live memory forensics of mobile phones (I. Vrizlynn et al) [Digital investigation, 2010]
  • Loose‐lipped mobile device intelligent personal assistants: A discussion of information gleaned from Siri on locked iOS devices (Graeme Horsman) [J Forensic Sciences, 2018]
  • Mobile forensics... A new challenge
  • Paraben cell seizure [Wikipedia]
  • The inbuilt recorder of mobile phones - possibilities of forensic speaker identification (Agata Trawinska y Mateusz Kajstura)
  • Wireless forensics: Tapping the air - Part 1 (Raul Siles)
  • Wireless forensics: Tapping the air - Part 2 (Raul Siles)

PDAs

  • Data recovery from PalmmsvgV001 (Satheesaan Pasupatheeswaran)
  • PDA forensic tools: An overview and analysis (Rick Ayers y Wayne Jansen)

PROCEEDINGS - MEMORIAS

  • Proceedings of the 6th australian digital forensics conference. 2008

QUALITY CONTROL - CONTROL DE CALIDAD

  • Quality assurance practices for computer forensics - Part 1 (John J. Barbara)

REPORTES / REPORTS

  • Interpol's forensic report on FARC computers and hardware seized by Colombia [Interpol]
  • Joe Bloggs Expert technical report and findings (Simon Steggles)
  • Joe Jacobs's case computer forensics report (Eloy Paris)
  • Pat Smith - Acme Industries Computer forensics report (Chris Simone)

RED Y DERECHOS / WEB AND RIGHTS

  • Computational forensic techniques for intellectual property protection (Jennifer L. Wong et al)
  • Fingerprinting and forensic analysis of multimedia (Daniel Schonberg y Darko Kirovski)

SECURITY - SEGURIDAD

  • Issues common to Australian critical infrastructure providers SCADA netwoks discovered through computer and network vulnerability analysis (Craig Valli)
  • Preventing the acquisition of data from virtual machine based secure portable execution environments (Peter James)
  • Using computer forensics when investigating system attacks (Joel Weise y Brad Powell)
  • Virtual environments support insider security violations (I. Swanson y P. Williams)

SOFTWARE ANALYSIS - ANÁLISIS DE SOFTWARE

  • Extraction of user activity through comparison of Windows Restore points (Damir Khavedzic y Tahar Kechadi)
  • Forensic analysis of Windows Registry against intrusion (Haoyang Xie et al) {International Journal of Network Security & Its Applications (IJNSA), 2012}
  • Research Issues on Windows Event Log (P. K. Sahoo et al) {International Journal of Computer Applications, 2012}
  • The malware analysis body of knowledge (MABOK) (Craig Valli y Murray Brand)

VALIDATION STUDIES - VALIDACIONES

  • Computer forensics: The need for standardization and certification (Matthew Meyers y Marc Rogers)
  • General principles of software validation; Final guidance for industry and FDA staff [CDRH]
  • Independent validation and verification (IV and V) of EnCase Forensic Edition Lae Enforcement and Government Edition version 5 [Marshall University]
  • Validating digital evidence for legal arguments (Richard Boddington et al)

VIRUSES - VIRUS

  • Malware detection and removal: An examination of personal anti-virus software (Patryk Szewczyk y Murray Brand)
  • Malware, viruses and log visualisation (Iain Swanson)

CONTROVERSY - CONTROVERSIA

  • ABN: Interpol descredita a Colombia en el caso del computador de Raul Reyes (Agencia Bolivariana de Noticias) {Informática Forense. 2008}

ARTICULOS POR SUBSCRIPCION

  • Forensic data recovery from flash memory (Marcel Breeuwsma et al)
  • Forensic information acquisition in mobile networks (D. Irwin y R. Hunt)

REVISTAS / JOURNALS

  • Alfa - Redi
  • DFI News
  • IJDE - International Journal of Digital Evidence
  • IJFSE - International Journal of Forensic Software Engineering
  • Mathews Journal of Forensic Research
  • The digital discoverer
  • The ISSA Journal
  • The Scientific World Journal

LIBROS / BOOKS

  • Computer forensics: Incident response essentials (Warren Kruse y Jay Heiser)
  • Data mining for intelligence, fraud,& criminal detection (Christopher Westphal)
  • File system forensic analysis (Brian Carrier)
  • Guide to computer forensics and investigation (Bill Nelson et al). Reviewed by Gary C. Kessler
  • Hacking exposed: Computer forensics (Chris Davis y Aaron Philipp). Reviewed by Tony Bradley
  • Handbook of computer crime investigation (Academic Press)
  • Investigating high-tech crime (Michael Knetzger y Jeremy Muraski)
  • Policing cyber crime (Petter Gottschalk) [Bookboon - Free book]
  • Profiling hackers (Raoul Chiesa et al)
  • Scene of the cybercrime (Syngress)
  • Understanding surveillance technologies (J. K. Petersen)

SITIOS DE INTERES / INTERESTING SITES

  • AEDEL - Asociación española de evidencias electrónicas
  • Alfredoreino
  • CFTT - Computer Forensics Tool Testing Project - NIST
  • Computer Forensics Knowledge Portal
  • Computer Forensics Recruiter.com
  • Computer forensics web sites
  • Computer Forensics World
  • Computer Forensics, Cybercrime and Steganography Resources
  • Conexioninversa
  • Dan Farmer and Wietse Venema's computer forensics column
  • DFA - Digital Forensics Association
  • DFCB - Digital Forensics Certification Board
  • Digitalforensics.ch
  • E-Evidence Info
  • Forensic Focus
  • Forensic Ideas
  • Forensic Photoshop
  • Inforenses
  • Informatica Forense
  • Institute of Computer Forensic Professionals
  • IOCE - International Organization on Computer Evidence
  • ISSA - Information Systems Security Association
  • NSRL - National Software Reference Library - NIST
  • Open Forensics
  • Oracle Forensics Paul M. Wright
  • SWGDE - Scientific Working Group on Digital Evidence
  • Windows incident response blog

RESOURCES - RECURSOS

  • Belkasoft browser analyzer 1.01
  • Belkasoft Forensic IM extractor 3.01
  • Image to PDF 1.0
  • PDA Forensic software 2.0.1.5
  • PDF protection remover 3.0
  • Pocket PC Forensics Tool 2.0.1.5
  • Pocket PC Investigation Tool 2.0.1.5
  • Web cache illuminator 4.8.2
  • Windows based mobile forensic tool 3.0.1.5

PRESENTATIONS - PRESENTACIONES

  • A crash course in digital forensics (Brian Carrier)
  • Computer forensic investigations (Michael Barba)
  • Identifying computer attacks - Tips, tricks and tools (Kai Axford)
  • Incident handling -I (Kirt Cathey)
  • Incident handling -II (Kirt Cathey)
  • The electronic crime scene Vo3. What is computer forensics (Charles Tendell)

Audio

  • Computer forensics guidelines (Andrew Whitehead)

Videos

  • Computer forensics - Solved
  • Cyber forensic researchers make the call: Crime scene evidence is quickly extracted from mobile phones [ScienceDaily]
  • Forensic recovery of an iPhone 3G[s]
  • High tech crime fighting tool. Computer science analyses and predicts crime [ScienceDaily]
  • How to trace all phone numbers like the FBI
  • How to trace an e-mail sender
  • Recovering deleted email - E-discovery (Steve Burguess)
  • Steps to track the IP address from an email [IP2Location]
  • The electronic crimescene vol 3. What is computer forensics (Charles Tendell)
  • Tracing an Email - Hotmail
  • What happens when you delete a file? (Steve Burgess)