Critical security considerations for server virtualization

Eric Vanderburg Virtualization is an excellent way to make better use of existing IT resources but utilizing them for multiple tasks.  It also allows for hardware and software to be further abstracted so that hardware compatibilities become less of an issue.  Virtual machines can be highly specialized since an entire physical box does not need […]

August 10, 2010 |

MAC times in computer forensics

Written by: Eric Vanderburg MAC times are a form of metadata that record when files were created, modified and accessed and are named as follows: Created time: ctime Modification time: mtime Access time: atime You should be aware that the MAC times differ by file system and operating system and this can impact a forensic […]

October 10, 2009 |

Inside the Hacker’s Head – White paper

Eric Vanderburg It is important to know about hacking because these skills, under controlled circumstances and with the proper authority can be used to determine system vulnerabilities by taking actions a hacker would do.  It is also important to understand this topic to better be able to counter the attempts of others to break into […]

September 2, 2008 |

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology