ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.
Revision as of 21:34, 2 May 2006 by Uwe Hermann (Real case: IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot.)
Publicly known cases or incidents where computer forensics methods were used.
- Tracking down the author of the Melissa virus - Usenet discussion which revealed lots of information about the author of the Melissa worm/virus.
- IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot