Menu

geschonneck.com

Private homepage of Alexander Geschonneck (Berlin, Germany).

Facebook Email LinkedIn Instagram Bluesky PGPKeyPGPKey

Secondary Menu

Skip to content
  • Home
  • Über mich
  • Impressum / Datenschutz

Forensic analysis of the stolen laptop

Posted onMontag, 10. Juli 2006Samstag, 19. Januar 2008AuthorAlexander Geschonneck

The Internet Security Zone Blog published an interesting article about the FBI forensic analysis of the stolen veteran’s administration laptop that was recently recovered.

line

  •  

CategoriesForensics, StoriesTagscomputer forensics, digital investigations

Beitrags-Navigation

← Previous Previous post: Cell Phone Forensics Tools
Next → Next post: Skype Protocol Has Been Cracked

© 2003-2022 Alexander Geschonneck.
Feel free to contact me for comments.

The 6th edition of my Book on computer-forensik.org
Cover Computer Forensik

Seiten (alt)

  • Security
    • Computer Forensics
    • Encryption
    • Firewalls
    • Lotus Notes
    • misc.
    • SAP
    • Security Audit
    • Security Management
    • Unix
    • Windows
    • Wireless

Letzte Beiträge

  • digital-forensics.de
  • Windows Memory Forensics Tools [update]
  • new linux incident response script
  • open forensics jobs
  • ch-ch-ch-changes
  • SYSTEM user with Vista
  • Anonymous Quote
  • Stealing Credit and Debit Card Numbers
  • Could have been worse?
  • Trauerrede für meinen Vater
  • 3rd edition of my book
  • wordpress 2.5
  • computer forensics workshops in Berlin and Frankfurt
  • nice geeky captchas
  • Mein Vater, Erwin Geschonneck ist tot

Archive

Kategorien

Resume wireless PEiD statistics Security Audit TV interview password security vulnerability assessment tools Vista RFID private NTFS Pandemia The Sleuthkit wordpress update windows forensics sector inspector Presentation oracle forensics PIN cracking sp Risk Management TxF SAP audit security awareness privat skimming Security XSS privacy vista forensics wordpress web application security tor sql injection Skype WabiSabiLabi SAP security Security in practice NIST Penetrationtesting Wiretapping TSK perl regular expressions once in a lifetime
    © 2003-2025. geschonneck.com. Alle Rechte vorbehalten. Impressum. 136 queries - 1,308 seconds. 7.697.892 Besucher. DNT is OFF. Anmelden
Menu
Scroll Up
  • Home
  • Über mich
  • Impressum / Datenschutz