Difference between revisions of "Real cases"

From ForensicsWiki
Jump to: navigation, search
Line 4: Line 4:
 
* [http://www.securityfocus.com/infocus/1676 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot]
 
* [http://www.securityfocus.com/infocus/1676 IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot]
  
[[Category:Investigation]]
+
[[Category:Investigations]]
 
[[Category:Law]]
 
[[Category:Law]]

Revision as of 02:35, 16 August 2012

Publicly known cases or incidents where computer forensics methods were used.