Sunday, April 29, 2007

"THE OTHER SIDE OF THE STORY OF KEVIN MITNICK'


While browsing the internet, I was loooking for more answer about Kevin Mitnick story, I found and interview done by a Polish journalist name Mateusz Stępień on february 24, 2007, where Mr. Mitnick answers many questions that can help you in writing your paper. It help me so, you may find it interesting, as I did.
Just click the following you'll find more about it.

Tuesday, April 24, 2007

"KEVIN MITNICK INTERVIEW WITH 60 MINUTES"

Surfing in the net, I found more interviews related to the famous hacker Kevin Mitnick who, was convicted for hacking into the interne and was and still consider the cyber thief. if you want to know more about you can go to the link below and listen to the video interview. Hope it will be interesting to you as it was for me and maybe will help you write the paper for forensic computing.


http://www.youtube.com/watch?v=8_VYWefmy34

Wednesday, April 18, 2007

"TO PUBLISH A BOOK NEXT STEP FOR KEVIN MITNICK"


More news about Kevin Mitnick, now his next step will be to publish his autobiography where he will share his secrets of hacking in cyberspace. After seven years of waiting he will be able to write his side of the story that he could not do before because of the government.

If you want to find out more you can click the link below.




MORE ABOUT KEVIN MITNICK EX-HACKER


While brousing on the web, I encounter an article where Kevin Mitnick shares his secrets of deception and I thought that was very interesting and decided to posted in my blog for everyone to see it and it may help you to write the paper for our forensic computing class. You can copy and paste the link below and you'll will find it.
I think this is very cool too.

http://www.sfgate.com/cgi-bin/article.cgi
file=/chronicle/archive/2002/10/28/BU162351.DTL&type=tech

Wednesday, April 11, 2007

STRUCTURE QUERY LANGUAGE(SQL)

Structured Query Language (SQL) is the most popular computer language that is used to create, retrieve, update and delete data from relational database management.
Also allows many companies to use it for their business by creating a database like inventory of merchandise that they buy and sell to the public.
If you want to know more about it and how to use this query language so you can go to the following websites:

http://en.wikipedia.org/wiki/SQL
www.microsoft.com/sql
www.sql.org

INTERNET CRIMES AGAINST CHILDREN TASK FORCE PROGRAM

The U.S. Department of Justice, Office of Juvenile Justice and Delinquency Prevention started a National program due to the increasing rate of offender using the internet and other technologies to exploit children.

In September 1998, the NYS Division of Criminal Justice Services (DCJS) successfully competed for OJJDP funding to establish a multi-agency ICAC Task Force in New York State. This resulted in a formal partnership between DCJS, the New York State Police (NYSP) and the NYS Attorney General (NYSAG). Each of the agencies have assigned staff to work exclusively on ICAC Task Force initatives.

Their primary responsibities of this task force includes:
Conducting investigations and prosecuting offenders.
It Provides training for law enforcement officers and prosecutors.
Fostering continual statewide and regional coordination, collaboration, information sharing, networking and service integration.
Also providing investigative and prosecutorial assistance to police agencies and prosecutors (e.g., forensic analysis of computers seized as evidence).

This program focus in the promotion of child safety . It is very important that parents supervised their children while they are in the Internet if they do not want their children to be victims.

Sunday, April 8, 2007

"COMPUTER CRIMES AGAINST CHILDREN

In our days of the computer technology, many of our children are being target by predators so the law enforcement has many goals to deal with this problem by creating computer crimes units. Specifically, the goals of the Computer Crimes Unit are to aggressively investigate on-line computer crimes, to forensically analyze computers to find evidence and to assist in educating the community and our children on how to avoid becoming a victim in the first place.

The Law enforcement have trained specialist that are certified to do this type of investigation, they are in charge of finding out if a crime was committed by analyzing the data in the computer because many frauds, hacking and children pornography is done using in computer. Also they have created some children safety sites where they can get information to prevent them to fall into the trap of predators.

Children Safety Sites


http://www.netsmartz.org/

This is very cool .