image

Index

Note: Page numbers followed by f and t indicate figures and tables, respectively.

  • > command, 202t

  • 18 U.S.C. 2252B, 170171

  • 32-bit system, 175, 185

  • 64-bit system, 175, 185

  • 802.11a standard, 266

  • 802.11b standard, 266

  • 802.11g standard, 266

  • 802.11n standard, 266

A

B

C

D

E

F

G

H

I

J

K

L

  • L0phtCrack, 300

  • lab manager, 69

  • label, inittab, 211

  • land attack, 259

  • LastWriteTime, 190

  • Lauffenburger, Michael, 54

  • law enforcement criteria, 47

  • law firms, 10

  • laws, 305307

  • layer 1 frames, 21

  • least significant bit (LSB) method, 108

  • legal and procedural trends, digital forensics, 292294

  • legal process in cloud computing, 290

  • Leopard. See Mac OS X

  • libPST package, 165, 167

  • Library_CallHistory_call_history.db, 249

  • Library_Cookies_Cookies.plist, 249

  • life span, 6263

  • Lighttpd web server, 210

  • Lightweight Directory Access Protocol (LDAP), 22, 257

  • Lightweight Directory Access Protocol, Secure (LDAPS), 257

  • LILO. See Linux Loader

  • LinEn boot disk, 71

  • Linux, 19, 145148, 226

  • Linux-based Android, 291

  • Linux basics, 200207

  • Linux boot process, 204206

  • Linux commands, 90, 9899

  • Linux directories, 210213

  • Linux distributions, 207

  • Linux file systems, 207208, 218219

  • Linux history, 200201

  • Linux Loader (LILO), 205

  • Linux logs, 208210

  • Linux shells, 201203, 202t

  • Lion. See Mac OS X

  • Lisa OS, 226

  • ListDLLs, 180, 180f

  • live response technique, 177

  • live system forensics, 14, 178

  • load phase, 176

  • Locard, Edmond, 60

  • Locky virus, 53

  • log file, 208

  • log files as evidence, 265266

  • log records, 209, 210

  • logic bombs, 5455

  • logical analysis, 93, 94

  • logical damage, 150152

  • logical port numbers, 22

  • Logical Volume Manager (LVM), 206207

  • logon screen, 41

  • lone wolves, 172

  • Long Term Evolution (LTE), 239

  • loopholes, 169

  • Lotus Notes, 168

  • low-level format, 18

  • Low Orbit Ion Cannon, 51, 52f

  • ls command, 202t, 218, 233

  • Lsass.exe, 177

  • LSB. See least significant bit

  • ls/dev/disk? command, 234

  • LTE. See Long Term Evolution

  • Lucifer cipher, 124

M

N

O

  • obscured information, 2526

  • Obstruct Terrorism Act of 2001, 171

  • OmniPeek, 260

  • online Flash tutorial, 263

  • open source tools, 150

  • Open Systems Interconnection (OSI) model, 254

  • openfiles command, 85, 86f

  • OpenSuse, 207

  • operating systems, 75, 240243

  • Operating Systems: Design and Implementation (book), 201

  • Ophcrack, 4345, 44f, 132, 132f

  • Ophcrack compact disc (CD), 44

  • opt-out lists, 170

  • optical media, 97

  • ordered (ext4), 208

  • OSForensics, 73, 77, 86, 102103, 139, 144, 145f, 165, 185, 194, 195f, 219, 235, 296

  • Outlook 2010 headers, 160162, 161f, 162f

  • oxygen forensics, 246

P

Q

  • QRNX operating system, 243

  • QuickStego, 109

  • quiescent state, 246

R

S

T

U

V

W

  • wall command, 146

  • “warm” site, 289

  • warrants, 3031

  • Way Back Machine, 301

  • Wayne, Ronald, 226

  • Web Application Firewall (WAF), 271

  • Web sites, 303304

  • Web traffic, 262

  • Web Watcher, 40

  • well-known ports, 271

  • Wheatstone, Charles, 118

  • who command, 218

  • WhoIS, 22, 256

  • whois databases, 168

  • Wi-Fi, 191, 239

  • Wi-Fi scanning, 267

  • Windows, 1819, 136140, 174177, 243

  • Windows, important files, 177

  • Windows 8, 162, 175, 189, 243

  • Windows 10, 175, 189, 243

  • Windows color palette, 108, 108109f

  • Windows details, 174177

  • Windows directories, 185187

  • Windows files and permissions, 188189

  • Windows history, 174175

  • Windows logs, 183185, 184f

  • Windows NT, 174

  • Windows passwords, 44

  • Windows Phone 7, 243

  • Windows Registry, 1819, 71, 190f, 192, 246

  • Windows swap file, 183

  • Windows Sysinternals Administrator’s Reference, 174

  • Windows tools, 139140

  • Windows Volume Shadow Copy, 193

  • Window Washer, 187, 187f

  • WinDump, 260

  • WinHex, 300

  • Winlogon.exe, 177

  • WinUndelete tool, 140, 143f, 144f

  • WinZapper tool, 184

  • wireless, 266267

  • Wireless Communications and Public Safety Act of 1999, 29

  • wireless fidelity (Wi-Fi), 191, 239

  • wireless local area networks (LANs), 266

  • wireless networks, 191

  • Wireshark, 260, 261, 261262f

  • WorkTime, 40

  • Wozniak, Steve, 226

  • writeback, 208

X

  • X-Ways Forensics, 299

  • X-Ways Software Technology AG, 299300

Y

  • Yahoo! email headers, 162, 163f

Z

  • zero-knowledge analysis, 151, 152

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.172.146