BLOGS
Windows Incident Response
Harlan Carveyint for(ensic) {blog}
Andreas SchusterComputer Forensics Blog
Jamie MorrisComputer Forensics/E-Discovery Tips/Tricks and Information
Mark McKinnonComputer Forensics, Malware Analysis & Digital Investigations
Lance MuellerForensic Incident Response
HogflyDidier Stevens on Forensics
UserAssist Research8 bits Forensishc [in Dutch]
Use Google Translate to viewA Day in the Life of an Information Security Investigator
ChiefOracle Forensics
Paul M. WrightComputer Forensics and Incident Response
BillForensic Pagefile
Not much yet; hopefully...Forensic Computing
Mike MurrRide the Lightninng
Sharon Nelsonhttp://geschonneck.com
Alexander GeschonneckForensic.Secure.Net
Mariusz BurdachMySecured.com Blog
Marwan Al-Zarouni and Salvatore FiorilloVolatility - Volatile memory analysis research
AAron WaltersWorld of Replicants
Bill EthridgeA Geek Raised by Wolves
Jesse KornblumAndrew Hay’s Blog
Check out the 'Suggested Blog Reading'e-Discovery Team
Ralph PoseyElectronic Discovery and Evidence
Michael ArkfieldCyb3rCrim3
Susan BrennerNetwork Observations/Security Forensics
Network Instruments
WIKIS
Forensics Wiki
Created by Simson Garfinkel
Computer forensics
From Wikipedia
Sanderson Forensics/Digital-Detective
Registration Required
[Computer] Forensics
From SecuriWiki
1 comment:
Alice:
E-discovery reflects the natural collision of technology and legal practice. As an enterprise creates an ever-growing mountain of records, adversaries of course want access to it. Knowing that litigation and e-discovery are inevitable, an enterprise can use technology proactively to make records more benign. What do you think? --Ben http://hack-igations.blogspot.com/2008/05/nix-smoking-gun-e-discovery.html
Post a Comment