Tuesday, May 15, 2007

"I ENJOYED FORENSIC COMPUTING"

Wow I can't believe the semester is almost over, finals are coming and I have to say goodbye to this class, feel a little sad but we have to continue our lives. To you professor Levy many thanks you made this class very enjoyable and learned some new stuff that had not idea how it worked but now I do. For all my classmates just a good wish to Have a Fun Summer and maybe I will see you in the fall.

GOOD LUCK TO ALL

'STEGANOGRAPHY AND DATA HIDING"


I thought this may be interesting for you as it was for me. I was just browsing the web, looking for something to write and I found the following website where you can see many related topics about embedding and hiding data for many purposes. So if you have a little free time maybe you can read it. So here it is



Sunday, April 29, 2007

"THE OTHER SIDE OF THE STORY OF KEVIN MITNICK'


While browsing the internet, I was loooking for more answer about Kevin Mitnick story, I found and interview done by a Polish journalist name Mateusz Stępień on february 24, 2007, where Mr. Mitnick answers many questions that can help you in writing your paper. It help me so, you may find it interesting, as I did.
Just click the following you'll find more about it.

Tuesday, April 24, 2007

"KEVIN MITNICK INTERVIEW WITH 60 MINUTES"

Surfing in the net, I found more interviews related to the famous hacker Kevin Mitnick who, was convicted for hacking into the interne and was and still consider the cyber thief. if you want to know more about you can go to the link below and listen to the video interview. Hope it will be interesting to you as it was for me and maybe will help you write the paper for forensic computing.


http://www.youtube.com/watch?v=8_VYWefmy34

Wednesday, April 18, 2007

"TO PUBLISH A BOOK NEXT STEP FOR KEVIN MITNICK"


More news about Kevin Mitnick, now his next step will be to publish his autobiography where he will share his secrets of hacking in cyberspace. After seven years of waiting he will be able to write his side of the story that he could not do before because of the government.

If you want to find out more you can click the link below.




MORE ABOUT KEVIN MITNICK EX-HACKER


While brousing on the web, I encounter an article where Kevin Mitnick shares his secrets of deception and I thought that was very interesting and decided to posted in my blog for everyone to see it and it may help you to write the paper for our forensic computing class. You can copy and paste the link below and you'll will find it.
I think this is very cool too.

http://www.sfgate.com/cgi-bin/article.cgi
file=/chronicle/archive/2002/10/28/BU162351.DTL&type=tech

Wednesday, April 11, 2007

STRUCTURE QUERY LANGUAGE(SQL)

Structured Query Language (SQL) is the most popular computer language that is used to create, retrieve, update and delete data from relational database management.
Also allows many companies to use it for their business by creating a database like inventory of merchandise that they buy and sell to the public.
If you want to know more about it and how to use this query language so you can go to the following websites:

http://en.wikipedia.org/wiki/SQL
www.microsoft.com/sql
www.sql.org

INTERNET CRIMES AGAINST CHILDREN TASK FORCE PROGRAM

The U.S. Department of Justice, Office of Juvenile Justice and Delinquency Prevention started a National program due to the increasing rate of offender using the internet and other technologies to exploit children.

In September 1998, the NYS Division of Criminal Justice Services (DCJS) successfully competed for OJJDP funding to establish a multi-agency ICAC Task Force in New York State. This resulted in a formal partnership between DCJS, the New York State Police (NYSP) and the NYS Attorney General (NYSAG). Each of the agencies have assigned staff to work exclusively on ICAC Task Force initatives.

Their primary responsibities of this task force includes:
Conducting investigations and prosecuting offenders.
It Provides training for law enforcement officers and prosecutors.
Fostering continual statewide and regional coordination, collaboration, information sharing, networking and service integration.
Also providing investigative and prosecutorial assistance to police agencies and prosecutors (e.g., forensic analysis of computers seized as evidence).

This program focus in the promotion of child safety . It is very important that parents supervised their children while they are in the Internet if they do not want their children to be victims.

Sunday, April 8, 2007

"COMPUTER CRIMES AGAINST CHILDREN

In our days of the computer technology, many of our children are being target by predators so the law enforcement has many goals to deal with this problem by creating computer crimes units. Specifically, the goals of the Computer Crimes Unit are to aggressively investigate on-line computer crimes, to forensically analyze computers to find evidence and to assist in educating the community and our children on how to avoid becoming a victim in the first place.

The Law enforcement have trained specialist that are certified to do this type of investigation, they are in charge of finding out if a crime was committed by analyzing the data in the computer because many frauds, hacking and children pornography is done using in computer. Also they have created some children safety sites where they can get information to prevent them to fall into the trap of predators.

Children Safety Sites


http://www.netsmartz.org/

This is very cool .

Wednesday, March 21, 2007

"WHO IS KEVIN MITNICK"


He was a very good hacker and a computer security consultant, who was born in August 6, 1963 and got caught and sent to jail for five years and was put in solitary confinement for eight months. Mitnick was release on January 21, 2000 but he was supervised until 2003, he wasn't allow to work in communications technology other than a landline telephone.

Kevin Mitnick fought in court and got the judge to release his restriction and now he can access the internet. He was very clever before his downfall. He change his name many times by accessing the identification system in the United States and using the names of babies that were born in one state but died in another one. At the time of his downfall, the police found him with all the false id's he used to get jobs.

There are more information about him in the web, I think the following can help you to know more about him just click below.

http://www.cbsnews.com/stories/2003/02/11/tech/main540191.shtml
http://www.freekevin.com/060799defmot.html


Wednesday, March 14, 2007

"PERL ANOTHER PROGRAM PEOPLE USE"

While browsing around google, I found something interesting and I thought you may be able to use in the future. In our days many companies uses this software. If you click the link below it will take you to a site where you can see the perl documentation and some commands.

Just tought this was kind of cool.



http://perldoc.perl.org/functions/-X.html

Wednesday, February 28, 2007

"GUIDE FOR COMPUTER COMMANDS'

If you need some information on how to copy, remove, concatenate files and many other definitions. I found something that may be of your interest and I decided to blogged it. Here are some examples and you can look for more if you click in the link below. It is a cool website!

UNIX a popular operating system (of which there are many, e.g., GNU, Solaris, Linux, AIX, FreeBSD) that runs on many kinds of computers. It is a multi-user, time-sharing operating system more than 30 years old. It has been developed by many programmers in an open-source model of shared source code and cross-platform portability.

URL Uniform Resource Locator a simple extension of the standard filename concept. It can be used to point to files and directories on any machine connected to the network. It can be accessed through several different methods, e.g., ftp, gopher and HTTP.

Click Me for more
http://www.eos.ncsu.edu/guide/files.html

Tuesday, February 27, 2007

What is Forensic Computing?

Is an application in computer technology that is used for the investigation of computer based crimes that has been arising in the field of forensic computing. Furthermore is a process that preserves, analyses, identifies and presents digital evidence in a way that is acceptable by the law. Criminals are using this digital technology to commit crimes and hide their criminal evidence. Everyday this criminals find ways to get digital data and communications that they
think is harmless but in reality they can ruin businesses and commerce. The Federal Government is addressing the computer crimes through a research group called the model criminal code process which is trying to look into the law enforcement and how they can protect the digital commerce against these criminals.

What is Forensic Computing?

Is an application in computer technology that is used for the investigation of computer based crimes that has been arising in the field of forensic computing. Furthermore is a process that preserves, analyses, identifies and presents digital evidence in a way that is acceptable by the
law. Criminals are using this digital technology to commit crimes and hide their criminal evidence. Everyday this criminals find ways to get digital data and communications that they
think is harmless but in reality they can ruin businness and commerce. The Federal Government is addressing the computer crimes through a research group called the model criminal code process which is trying to look into the law enforcement and how they can protect the digital commerce against this criminals.

Tuesday, February 20, 2007

"Internet Crimes against Children and Teenagers"

In todays world children and teenagers are in more danger environments because they are being target by unfamiliar strangers and predators that go online. This predators look for naive, curious, trusting children so they can commit criminal acts. Many children and Teenagers are looking for attention and affection and they want to get that by chatting on the internet. This kind of perpetrators spend a lot of time with the children, this way they win their trust and later around they can harm them . Parents should be aware of what their children are doing in the internet so in the future they do not become victims of this perpetrators.

Wednesday, February 14, 2007

"INTERNET FRAUD"

There are many ways that you can be defrauded by using the internet. Out there there are individuals that make a living out of internet fraud. Some make believe that there are a corporation and they offer you a job, others claimed that you have inherit some money from relatives in Nigeria or another country and further more they even post that you have won some kind of Lottery and that you have to contact them. All this is done by email, I had read some of them and that the stories they tell are very convincing, they even offered you a percentage either to help them to claim the inherit money of people that have die but had not heirs to claim the fortune.
Just wanted to make everyone aware and not to believe this people even if you are in financial distress because you will be in a lot of trouble. Do not email them back or call them. "Be Aware of Internet Fraud" it could ruin your life.

Tuesday, February 13, 2007

Forensic Computing

Did you know about the Melissa virus that can infect files stored on and MacOS based systems. There are many first-hand reports of more than 300 organizations affected, covering more than 100,000 individual hosts.
Melissa was different from other macro viruses because of the speed at which it had spread. The first confirmed reports of Melissa were received on Friday, March 26, 1999. By Monday, March 29, it had reached more than 100,000 computers. Some sites had to take their mail systems off-line. One site reported receiving 32,000 copies of mail messages containing Melissa on their systems within 45 minutes.
Melissa was relatively non-destructive and very easily detected. Variants could be significantly more destructive or stealthy. We strongly encourage you to be aware of the risks posed by viruses and other computer security concerns at all times. There are other variants like Papa
which there have not been many reports about it.
if you fail to clean up the virus correctly and completely (for example, by not cleaning the If you practice antivirus precautions on a regular basis, you can protect yourself against Papa and other variants of Melissa. normal.dot file) you may expose confidential information at a later time. Now this virus Melissa macros is being rename as an .RTF extension. which not affect macros.

Thursday, February 8, 2007

whatever

nothing