Under which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
You are called in to assist the police in an investigation involving a suspected drug dealer. The suspects house was searched by the police after a warrant was obtained and they located a floppy disk in the suspects bedroom. The disk contains several files, but they appear to be password protected. What are two common methods used by password cracking software that you can use to obtain the password?
What does the superblock in Linux define?
Which part of the Windows Registry contains the user's password file?
What information do you need to recover when searching a victim’s computer for a crime committed with specific e-mail message?
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
You have completed a forensic investigation case. You would like to destroy the data contained in various disks at the forensics lab due to sensitivity of the case. How would you permanently erase the data on the hard disk?
The MD5 program is used to:
What will the following URL produce in an unpatched IIS Web Server?
http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\
When investigating a Windows System, it is important to view the contents of the page or swap file because: