Difference between revisions of "Main Page"

From ForensicsWiki
Jump to: navigation, search
m
m
Line 11: Line 11:
 
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
 
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
 
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> FEATURED FORENSIC RESEARCH </h2>
 
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> FEATURED FORENSIC RESEARCH </h2>
 +
[[Solid State Drive (SSD) Forensics]]<br>
 +
We now have a new page on SSD forensics. The page has some basic information and a growing bibliography. One of the first entries is:
 
<!-- ARTICLE GOES HERE -->
 
<!-- ARTICLE GOES HERE -->
<small>2010-DEC</small>
+
<bibtex>
;[http://www.clir.org/pubs/abstract/pub149abst.html Digital Forensics and Born-Digital Content in Cultural Heritage Collections]
+
@inproceedings{wei2011,
:ABSTRACT
+
  author = {Michael Wei and Laura M. Grupp and Frederick M. Spada and Steven Swanson},
: While the purview of digital forensics was once specialized to fields of law enforcement, computer security, and national defense, the increasing ubiquity of computers and electronic devices means that digital forensics is now used in a wide variety of cases and circumstances. Most records today are born digital, and libraries and other collecting institutions increasingly receive computer storage media as part of their acquisition of "papers" from writers, scholars, scientists, musicians, and public figures. This poses new challenges to librarians, archivists, and curators—challenges related to accessing and preserving legacy formats, recovering data, ensuring authenticity, and maintaining trust. The methods and tools developed by forensics experts represent a novel approach to these demands. For example, the same forensics software that indexes a criminal suspect's hard drive allows the archivist to prepare a comprehensive manifest of the electronic files a donor has turned over for accession.
+
  title = {Reliably Erasing Data from Flash-Based Solid State Drives},
:This report introduces the field of digital forensics in the cultural heritage sector and explores some points of convergence between the interests of those charged with collecting and maintaining born-digital cultural heritage materials and those charged with collecting and maintaining legal evidence.
+
  booktitle={FAST 2011},
 
+
  year = 2011,
 +
  keywords = {erasing flash security ssd},
 +
  added-at = {2011-02-22T09:22:03.000+0100},
 +
  url={http://cseweb.ucsd.edu/users/m3wei/assets/pdf/FMS-2010-Secure-Erase.pdf},
 +
  biburl = {http://www.bibsonomy.org/bibtex/27c408ad559fc19f829717f485707a909/schmidt2}
 +
}
 +
</bibtex>
 
<!--END OF ARTICLE-->
 
<!--END OF ARTICLE-->
 
(Past selected articles [[Past Selected Articles|are archived here]].)
 
(Past selected articles [[Past Selected Articles|are archived here]].)

Revision as of 15:14, 22 March 2011

This is the Forensics Wiki, a Creative Commons-licensed wiki devoted to information about digital forensics (also known as computer forensics). We currently list a total of 712 pages.

Much of computer forensics is focused on the tools and techniques used by investigators, but there are also a number of important papers, people, and organizations involved. Many of those organizations sponsor conferences throughout the year and around the world. You may also wish to examine the popular journals and some special reports.

FEATURED FORENSIC RESEARCH

Solid State Drive (SSD) Forensics
We now have a new page on SSD forensics. The page has some basic information and a growing bibliography. One of the first entries is:

Michael Wei, Laura M. Grupp, Frederick M. Spada, Steven Swanson - Reliably Erasing Data from Flash-Based Solid State Drives
FAST 2011 ,2011
http://cseweb.ucsd.edu/users/m3wei/assets/pdf/FMS-2010-Secure-Erase.pdf
Bibtex
Author : Michael Wei, Laura M. Grupp, Frederick M. Spada, Steven Swanson
Title : Reliably Erasing Data from Flash-Based Solid State Drives
In : FAST 2011 -
Address :
Date : 2011

(Past selected articles are archived here.)

Featured Article

Forensic Linux Live CD issues
Forensic Linux Live CD distributions are widely used during computer forensic investigations. Currently, many vendors of such Live CD distributions state that their Linux do not modify the contents of hard drives or employ "write protection." Testing indicates that this may not always be the case. Read More...


Topics



You can help! We have a list of articles that need to be expanded. If you know anything about any of these topics, please feel free to chip in.



Retrieved from "http://forensicswiki.org/index.php?title=Main_Page&oldid=175"