Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This paper reviews the performance of six counter-forensic tools and highlight operational shortfalls that could permit the recovery of significant evidentiary data. In addition, each tool creates a distinct operational fingerprint that an analyst may use to identify the application used and, thus, guide the search for residual data.
https://www.dfrws.org/2005/proceedings/geiger_couterforensics.pdf
Urs
Comments
- Anonymous
August 27, 2012
We provide forensic science training courses and education by online/distance mode with real court cases practice which include analysis of handwriting, fingerprint science, forensic biology, DNA Fingerprinting, Cyber Forensics, ethical hacking, Forensic Graphology,Forensic Psychology.