ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between revisions of "Real cases"

From ForensicsWiki
Jump to: navigation, search
(Real case: IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot.)
Line 3: Line 3:
 
* [http://groups.google.com/group/alt.comp.virus/browse_frm/thread/f5d9d7c71c6fb540/e0e9a7986d4df76b?tvc=1 Tracking down the author of the Melissa virus] - Usenet discussion which revealed lots of information about the author of the [http://en.wikipedia.org/wiki/Melissa_%28computer_worm%29 Melissa worm/virus].
 
* [http://groups.google.com/group/alt.comp.virus/browse_frm/thread/f5d9d7c71c6fb540/e0e9a7986d4df76b?tvc=1 Tracking down the author of the Melissa virus] - Usenet discussion which revealed lots of information about the author of the [http://en.wikipedia.org/wiki/Melissa_%28computer_worm%29 Melissa worm/virus].
 
* [http://www.securityfocus.com/infocus/1676 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot]
 
* [http://www.securityfocus.com/infocus/1676 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot]
 +
 +
[[Category:Law]]

Revision as of 06:34, 16 August 2012

Publicly known cases or incidents where computer forensics methods were used.