This is a free and open peer to peer medium for digital and computer forensics professionals and students. Please help us maintain it by contributing and perhaps linking to us from your own website.
Computer forensic techniques could also be useful in the event of a security breach. Gathering as much information about an exploit that was used or a setup that was flawed will always help in the se ...