Lacunae in privacy laws and the ubiquitous USB memory stick
K K Mookhey, NII Consulting Two recent events bring to light how the lacunae in India’s privacy laws are now hitting where it hurts most – the bottomline. According to [more]
K K Mookhey, NII Consulting Two recent events bring to light how the lacunae in India’s privacy laws are now hitting where it hurts most – the bottomline. According to [more]
By Chetan Gupta, NII Consulting A supposedly nightmarish tool for the investigator community! Recently this tool was released at the metasploit anti-forensics site and is available here. Like the website [more]
by Chetan Gupta, NII Consulting I was looking for a utility which allows me to remotely access running processes’ list of a suspect machine running Windows OS. I found this [more]
by Chetan Gupta, NII Consulting Windows XP has a built-in feature – UserAssist, that acts as a monitoring tool and greatly aids in the forensic investigation of Windows operating systems. [more]
by Chetan Gupta, NII Consulting How many times in an investigation does a forensic investigator come across the problem of acquiring data from a suspect’s laptop? The answer to this [more]
by Khushbu Jithra, NII Consulting The expertise involved in a forensic investigation is best showcased through the documentation of the evidence and the recording of the techniques used for forensic [more]
By K. K. Mookhey, NII Consulting The Information Technology Act 2000 is India’s only act dealing with computer crime. For companies doing business in India, it is worthwhile to know [more]
Copyright © 2024 | WordPress Theme by MH Themes