A Day of Cyber InvestigationPart 2
The Computer Crime Files - Recent Cases
Outline of this section...
A simple terrorist threat?
A mailing list forgery
A spam list
The procmail copier
Looking for pornography on a ‘cleaned’ system
250 Computers or More Involved...
Lunch!!!