London, United Kingdom, May 01, 2011 --(PR.com
)-- Digital Forensics Magazine publishers, say that Issue 7 of the magazine promises to be one of the most varied to-date. Within the magazine, aimed at practising forensics experts and students, are features and articles from the varied aspects of digital forensics.
Among the contents that readers will find within the magazines are in-depth articles on:
File Integrity Monitoring - A look at how file integrity tools can help, post intrusion. One of the most difficult issues to resolve when recovering from a system intrusion is answering the questions “What did the intruder change?” and “What did he leave behind?”
Genetic Algorithms & Digital Forensics - An introduction to using evolutionary techniques for forensic investigations. As with any new tool or technique, it is important to be able to identify when to use Genetic Algorithms and what added value they might contribute.
Imaging 1000 Drives - What you need to understand about corporate digital forensic investigations. Imagine yourself doing an investigation on a corporation that has 10,000 workstations when what you’ve got as evidence is only the attackers external IP address.
Cell Site Analysis - Mapping the DNA of the communication infrastructure. Cell site analysis is a specialist branch of telecommunication evidence and is a practice that aims to determine the geographical location of a mobile phone through forensic analysis of the handset memory.
Cloning a Drive with Faulty Sectors - Research and test results in some detail. When acquiring an ATA or SATA hard drive with faulty sectors, cloning system components (operating system, connection interface, dd options, and operating platform) selected may impact acquisition’s forensic soundness.
Imaging a MacBook Air - imaging Macs and the challenges of the new MacBook Air. There has been a lot of talk in Mac forensics circles in reference to the new MacBook Air and so we have taken a more in depth look in this issue at how to image the MacBook Air and identify which of the tools were successful and those that were not.
Wireless Drones & Network Evidence - How to improve forensic readiness using wireless drones. Wireless networks are renowned for security weaknesses and the reluctance of hosts to implement available security capabilities; the consequences are that wireless networks can be both the target of misuse and used for unauthorised acts.
Criminal Profiling - Part 2 of Lucas Donatos’ detailed look at the phases of a computer hacking attack. Lucas takes a detailed look at all phases of a computer intrusion, from the choice of victim through to the removal of traces after the obtainment of “root”, by joining technical and psychological approaches in an unprecedented way.
Digital Forensics Magazine is available in print and as an online version. It has recently become available as a multi-user subscription offering to libraries, universities and larger organisations.
Digital Forensics Magazine issue 7 comes out on May the 1st online and individual digital subscriptions start at under UK£30.
To subscribe to Digital Forensics Magazine please visit www.digitalforensicsmagazine.com
About Digital Forensics Magazine
Digital Forensics Magazine is the flagship publication produced by TR Media, who specialize in publishing academic quality consumer magazines and books for the information security sector. Digital Forensics Magazine combines the depth and research of the best academic journals with the more traditional consumer feel of a trade magazine. For more information, please visit www.digitalforensicsmagazine.com