When performing a forensics analysis, what device is used to prevent the system from recording data on an evidence disk?
You are called by an author who is writing a book and he wants to know how long the copyright for his book will last after he has the book published?
When investigating a network that uses DHCP to assign IP addresses, where would you look to determine which system (MAC address) had a specific IP address at a specific time?
What group is actively providing tools and creating procedures for testing and validating computer forensics software ?