3rd Edition of “Computer-Forensik. Computerstraftaten erkennen, ermitteln, aufklären.” The new revised edition of my book on computer forensics in German language is available. For detailed information and the TOC check out computer-forensik.org or go directly to amazon.
I just installed WordPress 2.5. I hope everything works fine.
In collaboration with the german IT journal iX I’m going to give again computer forensics lessons in Frankfurt and Berlin.
If you are good at math, you wont have problems signing in at the Ruđer Bošković Institute
Letzte Nacht ist mein Vater im Alter von 101 Jahren in Berlin verstorben. Er konnte auf ein langes Leben zurückblicken, welches angefüllt war mit Leid während der Nazizeit aber auch mit großen Erfolgen und Anerkennung nach dem Krieg.
I pulished my Vista Forensics slides on my german computer forensics website.
You know them from a security incident follow up meeting, a security audit exit meeting or a vendor prensentation: excuses for not caring about security the right way. You can now choose your excuse from
Lance Mueller published a good article about bypassing a Windows login password with forensic tools . You can use his instructions if you plan to boot an Windows image within a virtual machine and like to login.
Cool stuff from Princeton researchers. They published a paper “Cold Boot Attacks on Encryption Keys” and showed that whole disk encryption can be defeated by relatively simple methods. They demonstrated their methods by using them to defeat three disk encryption products: BitLocker,
CERT and the United States Sectret Service published an insider threat research that focuses on both technical and behavioral aspects of actual compromises. The key findings are Current and former employees carried out insider activities in nearly equal numbers. Sixty-three percent of the insiders held technical positions within the targeted organizations.