ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between revisions of "Real cases"

From ForensicsWiki
Jump to: navigation, search
Line 4: Line 4:
 
* [http://www.securityfocus.com/infocus/1676 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot]
 
* [http://www.securityfocus.com/infocus/1676 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot]
  
 +
[[Category:Investigation]]
 
[[Category:Law]]
 
[[Category:Law]]

Revision as of 06:35, 16 August 2012

Publicly known cases or incidents where computer forensics methods were used.