The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
The permeation of technology into our daily lives has resulted in new types of criminal activity and new ways of committing old crimes. As with traditional crime, fundamental to t...
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Despite the widespread use of computing in almost all functions of contemporary society and the consequently large number of forensic investigations where computing has been invol...