Anti Virus Section Authors Books Email Security Test ... Security Library Site Search Anti Virus Section By Authors By Topics Authors ... Windows Security Featured product Recommended links Computer Crime Investigator's Toolkit Date: Oct 16, 2002 Section: Misc Author: Ronald L. Mendell Also Practical explanation. Unix, DOS, Windows, Browsers, e-mail and networks covered. What I've tried to do is devise a summary of basic, practical knowledge, "tricks," if you like, that should interest all computer crime investigators. While they may not be the final word in preparing for an examination, these techniques will provide some insight into the ways and means of computer criminals. I hope to get you into the spirit of the hunt. Learning to think how a criminal looks at twisting, altering, hiding, and diverting information will definitely make the game more interesting. This is a pathfinder, a starting point to discovering other resources. Part One will cover: DOS Tricks Unix Tricks Part Two continues with: Windows Tricks Browsers Passwords Part Three will discuss: Perl Scripting Networking Fundamentals Tracing Email Part Four concludes with: Understanding Slack Files Understanding Cryptography Basics Not So Dead DOS For those who grew up in the IT field with MS-DOS, they found Unix and scripting not all that cryptic. Knowing command line instructions gives one a backstage pass to what's happening behind the GUI. Understanding how to examine a computer using MS-DOS with Windows 95 and 98 gives an investigator a firm foundation for other tricks of the trade. When users get cute with trying to hide information, MS-DOS can uncover the hidden structure. So, forget any notion that MS-DOS is dead; it will be a valuable forensic tool for some time to come. | |
|