Forensic Acquisition of a Virtual Machine with Access to the Host
Someone recently asked about an easy way to create a RAW image of virtual machine (VM) disks, so here is a quick how-to.<div class="separator" style="clea...
Someone recently asked about an easy way to create a RAW image of virtual machine (VM) disks, so here is a quick how-to.<div class="separator" style="clea...
Webinar: Industrial Espionage, Weaponized Malware, and State-Sponsored Cyber Attacks: How to Identify, Counter, and ReactDate: 31 July, 2012Time: 15:00 PT (2...
Almost a decade ago, the Computing Research Association published Four Grand Challenges in Trustworthy Computing. Working in a rapidly-evolving digital field...
The IRISSCERT Cyber Crime Conference will be held November 22, 2012 in Dublin, Ireland. More information can be found here.They are currently running a call ...
[Edit] A recording of the webinar can be found here: http://www.forensicfocus.com/DF_Multimedia/page=watch/id=79/d=1/Resingle from: http://www.forensicfocus....