30.11.04
27.11.04
24.11.04
Financial Times - If Existing IP Policy is Broken, Don't Adopt it - "[C]opyrighting the alphabet will not produce more books, patenting E=MC2 will not yield more scientific innovation. Intellectual property creates barriers to, as well as incentives towards, innovation."
PETCO settles Federal Trade Commission action over the SQL Injection security hole on it's e-commerce site that left as many as 500,000 customer credit card numbers exposed
23.11.04
Unix Wars: Amicus Brief from AT&T V Berkeley
22.11.04
WebJob is a Client Server Evidence Collection Application - Link from TimK
21.11.04
Judge rules that keyloggers do not violate federal wiretap laws (ECPA). The court based it's decision on US V Councilman.
"[T]his court finds it difficult to conclude that the acquisition of internal computer signals that constitute part of the process of preparing a message for transmission would violate the Act. The network connection is irrelevant to the transmissions, which could have been made on a stand-alone computer that had no link at all to the internet or any other external network," Feess wrote. "Thus, although defendant engaged in a gross invasion of privacy ... his conduct did not violate the Wiretap Act. While this may be unfortunate, only Congress can cover bases untouched."
17.11.04
15.11.04
14.11.04
13.11.04
12.11.04
11.11.04
10.11.04
Forensic Tool Comparison - The National Institute of Justice has done evaluations on a number of digital forensic tools:
Partial Results from Prototype Testing Efforts for Disk Imaging Tools: SafeBack 2.0
Test Results for Disk Imaging Tools: dd GNU fileutils 4.0.36, Provided withCRed Hat Linux 7.1
Test Results for Disk Imaging Tools: dd Provided with FreeBSD 4.4
Test Results for Disk Imaging Tools: EnCase 3.20
Test Results for Disk Imaging Tools: safeBack 2.18
From Tim
HoneyNet Scan of the Month 29 Analysis - From Tim
9.11.04
8.11.04
7.11.04
5.11.04
4.11.04
3.11.04
Sleuthkit Informer Newsletter from Tim
The Federal Judicial Center Materials on Electronic Discovery:
Civil Litigation
Search and Seizure of Computers and Data in Criminal Cases