Skip to content

Commit

Permalink
Removed dead references (#194)
Browse files Browse the repository at this point in the history
  • Loading branch information
joachimmetz authored Nov 28, 2023
1 parent 15e9567 commit d1a3d8b
Show file tree
Hide file tree
Showing 20 changed files with 176 additions and 405 deletions.
92 changes: 46 additions & 46 deletions docs/academic_forensics_programs_graduate_level.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,67 +5,67 @@ tags:
---
## US Programs

- [American InterContinental University](https://www.aiuniv.edu/degrees/criminal-justice/bachelors-forensic-science)
- [Arizona State University](https://globalsecurity.asu.edu/expertise/cybersecurity-and-trusted-foundations/)
- [Boston University](https://www.bu.edu/met/degrees-certificates/digital-forensics-graduate-certificate/)
- California Sciences Institute
- [Carnegie Mellon University](https://csd.cmu.edu/academics/masters/overview)
- [Champlain College](https://online.champlain.edu/degrees-certificates/masters-digital-forensic-science)
- Dartmouth College
- George Mason University
- George Washington University
- [John Jay College](http://www.jjay.cuny.edu/master-science-digital-forensics-and-cybersecurity)
- [Michigan State University](https://cj.msu.edu/graduates/forensic-science/forensic-home.html)
- [Maryville University](https://online.maryville.edu/online-masters-degrees/cyber-security/)
- Naval Postgraduate School
- Polytechnic Institute of New York University
- Purdue University
- Sam Houston State University
- Stevenson University
- Texas State University
- [University of Alabama-Birmingham](https://businessdegrees.uab.edu/mis-degree-masters/)
- [University of Albany-SUNY](https://www.albany.edu/business/programs/bs-digital-forensics)
- [University of Central Florida](https://www.ucf.edu/online/degree/digital-forensics-m-s/)
- University of Massachusetts, Amherst
- University of New Haven
- [University of New Orleans](https://www.uno.edu/academics/cos/computer-science)
- [University of Rhode Island](https://web.uri.edu/cs/dfcsc/)
- University of Texas at San Antonio
- Utica College
* [American InterContinental University](https://www.aiuniv.edu/degrees/criminal-justice/bachelors-forensic-science)
* [Arizona State University](https://globalsecurity.asu.edu/expertise/cybersecurity-and-trusted-foundations/)
* [Boston University](https://www.bu.edu/met/degrees-certificates/digital-forensics-graduate-certificate/)
* California Sciences Institute
* [Carnegie Mellon University](https://csd.cmu.edu/academics/masters/overview)
* [Champlain College](https://online.champlain.edu/degrees-certificates/masters-digital-forensic-science)
* Dartmouth College
* George Mason University
* George Washington University
* [John Jay College](http://www.jjay.cuny.edu/master-science-digital-forensics-and-cybersecurity)
* [Michigan State University](https://cj.msu.edu/graduates/forensic-science/forensic-home.html)
* [Maryville University](https://online.maryville.edu/online-masters-degrees/cyber-security/)
* Naval Postgraduate School
* Polytechnic Institute of New York University
* Purdue University
* Sam Houston State University
* Stevenson University
* Texas State University
* [University of Alabama-Birmingham](https://businessdegrees.uab.edu/mis-degree-masters/)
* [University of Albany-SUNY](https://www.albany.edu/business/programs/bs-digital-forensics)
* [University of Central Florida](https://www.ucf.edu/online/degree/digital-forensics-m-s/)
* University of Massachusetts, Amherst
* University of New Haven
* [University of New Orleans](https://www.uno.edu/academics/cos/computer-science)
* [University of Rhode Island](https://web.uri.edu/cs/dfcsc/)
* University of Texas at San Antonio
* Utica College
[Online](http://www.onlineuticacollege.com/programs/computer-forensics-specialization.asp)\]
- [Center for Information Security University of Tulsa](http://www.cis.utulsa.edu/)
- [West Virginia University](https://forensics.wvu.edu/)
* [Center for Information Security University of Tulsa](http://www.cis.utulsa.edu/)
* [West Virginia University](https://forensics.wvu.edu/)

## Europe

- [Cranfield University, UK](http://www.cranfield.ac.uk/cds/postgraduatestudy/forensiccomputing/index.jsp)
- [Limerick Institute of Technology](http://www.lit.ie/departments/IT/MSC_Computing.html)
- [University of Amsterdam](http://www.studeren.uva.nl/ma-forensic-science)
- University of Bradford
- University of East London
- University College Dublin
- [University of Technology, Mauritius](https://www.utm.ac.mu/)
- [University of Strathclyde](http://www.strath.ac.uk/science/forensicinformatics/)
- [University of Glamorgan, Wales, UK](http://www.glam.ac.uk/coursedetails/685/549)
- [University of Applied Sciences Albstadt-Sigmaringen, Germany](http://www.digitaleforensik.com),
* [Cranfield University, UK](http://www.cranfield.ac.uk/cds/postgraduatestudy/forensiccomputing/index.jsp)
* [Limerick Institute of Technology](http://www.lit.ie/departments/IT/MSC_Computing.html)
* [University of Amsterdam](http://www.studeren.uva.nl/ma-forensic-science)
* University of Bradford
* University of East London
* University College Dublin
* [University of Technology, Mauritius](https://www.utm.ac.mu/)
* [University of Strathclyde](http://www.strath.ac.uk/science/forensicinformatics/)
* [University of Glamorgan, Wales, UK](http://www.glam.ac.uk/coursedetails/685/549)
* [University of Applied Sciences Albstadt-Sigmaringen, Germany](http://www.digitaleforensik.com),
Master of Science, Digital Forensics, in cooperation with University of
Mannheim and University of Tübingen, Germany

## Asia

- [Zayed University UAE](http://www.zu.ac.ae/main/en/colleges/colleges/college_information_technology/graduate_certificate_programs/cr_invest/intro.aspx)
* [Zayed University UAE](http://www.zu.ac.ae/main/en/colleges/colleges/college_information_technology/graduate_certificate_programs/cr_invest/intro.aspx)

## Australasia

- [Edith Cowan University, Perth, Western Australia](http://www.ecu.edu.au/future-students/our-courses/browse?sq_content_src=%2BdXJsPWh0dHAlM0ElMkYlMkZ3ZWJzZXJ2aWNlcy53ZWIuZWN1LmVkdS5hdSUyRmZ1dHVyZS1zdHVkZW50cyUyRmNvdXJzZS12aWV3LnBocCUzRmlkJTNEMDAwMDAwMTQ1MSUyNmxvY2F0aW9uJTNEdG9wbGV2ZWwmYWxsPTE%3D)
* [Edith Cowan University, Perth, Western Australia](http://www.ecu.edu.au/future-students/our-courses/browse?sq_content_src=%2BdXJsPWh0dHAlM0ElMkYlMkZ3ZWJzZXJ2aWNlcy53ZWIuZWN1LmVkdS5hdSUyRmZ1dHVyZS1zdHVkZW50cyUyRmNvdXJzZS12aWV3LnBocCUzRmlkJTNEMDAwMDAwMTQ1MSUyNmxvY2F0aW9uJTNEdG9wbGV2ZWwmYWxsPTE%3D)

## Africa

- [University of Cape Town](http://www.commerce.uct.ac.za/InformationSystems/Courses/inf4016w/)
* [University of Cape Town](http://www.commerce.uct.ac.za/InformationSystems/Courses/inf4016w/)

## See Also

- [AAFS](http://www.aafs.org/default.asp?section_id=resources&page_id=colleges_and_universities)
- [Digital Forensics Association List](http://www.digitalforensicsassociation.org/formal-education/)
- [Forensics Focus List](https://forensicfocus.com/computer-forensics-education-directory)
- [Master's Thesis: The Development of a Standard Digital Forensics Master's Curriculum](http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1010&context=techmasters&sei-redir=1#search=%22katie%20strzempka%20thesis%22)
* [AAFS](http://www.aafs.org/default.asp?section_id=resources&page_id=colleges_and_universities)
* [Digital Forensics Association List](http://www.digitalforensicsassociation.org/formal-education/)
* [Forensics Focus List](https://forensicfocus.com/computer-forensics-education-directory)
* [Master's Thesis: The Development of a Standard Digital Forensics Master's Curriculum](https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1010&context=techmasters&sei-redir=1#search=%22katie%20strzempka%20thesis%22)
2 changes: 0 additions & 2 deletions docs/adrian_santangelo.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,6 @@ adrian_santangelo.

## External Links

* [ISC Unlimited (no longer maintained)](https://www.interpretingtech.com/)
* [Interpreting Technology](https://www.interpretingtech.com/)
* [LinkedIn Profile](https://www.linkedin.com/in/AdrianSantangelo/)
* [Business Facebook Page](https://www.facebook.com/InterpretingTech)
* [Personal Facebook Page](https://www.facebook.com/adrian.santangelo/)
Expand Down
2 changes: 1 addition & 1 deletion docs/bibliography.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ tags:

- [SSD Forensics 2014. Recovering Evidence from SSD Drives: Understanding TRIM, Garbage Collection and Exclusions](https://belkasoft.com/ssd-2014),
by Yuri Gubanov and Oleg Afonin, 2014
- [Why SSD Drives Destroy Court Evidence, and What Can Be Done About It](http://forensic.belkasoft.com/download/info/SSD%20Forensics%202012.pdf),
- [Why SSD Drives Destroy Court Evidence, and What Can Be Done About It](https://belkasoft.com/why-ssd-destroy-court-evidence),
by Oleg Afonin and Yuri Gubanov, 2012
- [Disk Imaging: A Vital Step in Data Recovery](https://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf),
DeepSpar Data Recovery Systems, November 2006. An in depth look at the
Expand Down
2 changes: 1 addition & 1 deletion docs/caine_live_cd.md
Original file line number Diff line number Diff line change
Expand Up @@ -184,7 +184,7 @@ at the University of Udine.
- [Softpedia](https://news.softpedia.com/news/CAINE-3-0-a-Tool-for-Digital-Forensics-297461.shtml)
- [gustavopimental.com.ar](http://gustavopimentel.com.ar/)
- [concise-courses.com](https://www.concise-courses.com/hacking-tools/top-ten/)
- [ilsoftware.it](https://www.ilsoftware.it/articoli.asp?tag=CAINE-progetto-italiano-per-la-computer-forensics_5656)
- [ilsoftware.it](https://www.ilsoftware.it/caine-progetto-italiano-per-la-computer-forensics_5656)
- [dragonjar.org](https://www.dragonjar.org/distribucion-live-cd-analisis-forense.xhtml)
- [Attestato Marenostrum V.F.F.](http://nannibassetti.com/dblog/articolo.asp?articolo=156)
- [LinuxFormat](https://www.linuxformat.com/archives?issue=151)
Expand Down
2 changes: 1 addition & 1 deletion docs/cloud_forensics_research.md
Original file line number Diff line number Diff line change
Expand Up @@ -235,7 +235,7 @@ location="Monterey, CA",
` year={2010},`
` address={New York, NY, USA},`
` organization={ACM},`
` url="`[`http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf`](http://bbcr.uwaterloo.ca/~rxlu/paper/asiaccs185-lu.pdf)`"`
` url="`[`https://dl.acm.org/doi/10.1145/1755688.1755723`](https://dl.acm.org/doi/10.1145/1755688.1755723)`"`

}

Expand Down
45 changes: 18 additions & 27 deletions docs/extended_file_system_(ext).md
Original file line number Diff line number Diff line change
Expand Up @@ -9,48 +9,39 @@ of: ext, ext2, ext3, ext4

## Ext2

**ext2** or the **second extended file system** is a
[Linux](linux.md) filesystem designed as a replacement for ext.
Note that ext3 is mostly compatible with ext2.
**ext2** or the **second extended file system** is a [Linux](linux.md)
file system designed as a replacement for ext.

## Ext3

**ext3** or the **third extended file system** is a
[Linux](linux.md) filesystem. Its main advantage over ext2 is
journalling which improves reliability and eliminates the need to check
the file system after an unclean shutdown.
**ext3** or the **third extended file system** is a [Linux](linux.md)
file system. Its main advantage over ext2 is journalling which improves
reliability and eliminates the need to check the file system after an unclean
shutdown.

Note that ext3 is mostly compatible with ext2.

## Ext4

...
**ext4** or the **fourth extended file system** is a [Linux](linux.md)
file system.

## External Links

### Ext2

- [Wikipedia article on EXT2](https://en.wikipedia.org/wiki/Ext2)
- [Layout of the EXT2 Filesystem](http://www.nongnu.org./ext2-doc/ext2.html)
- [Linux Ext2fs Undeletion mini-HOWTO](http://fedora.linuxsir.org/doc/ext2undelete/Ext2fs-Undeletion.html)
- [Using ext2 on other systems](http://blog.boreas.ro/2007/11/ext2-filesystem-for-linux-and-solaris.html)
* [Wikipedia article on ext2](https://en.wikipedia.org/wiki/Ext2)
* [Layout of the ext2 Filesystem](http://www.nongnu.org./ext2-doc/ext2.html)
* [Linux Ext2fs Undeletion mini-HOWTO](http://fedora.linuxsir.org/doc/ext2undelete/Ext2fs-Undeletion.html)
* [Using ext2 on other systems](http://blog.boreas.ro/2007/11/ext2-filesystem-for-linux-and-solaris.html)

### Ext3

- [Wikipedia article on EXT3](https://en.wikipedia.org/wiki/Ext3)
- [Why Recovering a Deleted Ext3 File Is Difficult (by Brian Carrier)](http://linux.sys-con.com/node/117909)
* [Wikipedia article on ext3](https://en.wikipedia.org/wiki/ext3)

## Tools

Tools that can be used to perform recovery of data from an EXT2 file
system

- [The Sleuth Kit](the_sleuth_kit.md)
- R-Studio

Data carving tools that support the ext2 file system:

- [Belkasoft Evidence Center](belkasoft.md)
- [Foremost](foremost.md)
- [Scalpel](scalpel.md)
Tools that can be used to perform recovery of data from an ext2 file system.

**Note that it is unclear what is meant with "support" here this needs some
elaboration.**
* [The Sleuth Kit](the_sleuth_kit.md)
* R-Studio
11 changes: 4 additions & 7 deletions docs/famous_cases_involving_digital_forensics.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ relationship between Theer and Diamond, and messages documenting the
conspiracy to murder Theer's husband. Theer was found guilty on December
3, 2004 of murder and conspiracy and sentenced to life in prison[^2].

### 2002 [Scott Tyree](http://en.wikipedia.org/wiki/Scott_Tyree)
### 2002 Scott Tyree

*Postings on Yahoo reveal a kidnapping*

Expand All @@ -34,12 +34,9 @@ who had used the screen name, then contacted Verizon to learn the name
and physical address of the Verizon subscriber to whom that IP address
had been assigned. It was Scott William Tyree.

- [article on the
abduction](https://www.covenanteyes.com/2012/01/13/caught-by-a-predator-10-years-after-her-abduction/)
- [Popular Mechanics
article](https://www.popularmechanics.com/technology/security/how-to/a630/2672751/)
- [Congressional testimony of Alicia
Kozakiewicz](http://notonemorechild.org/map/9)
* [article on the abduction](https://www.covenanteyes.com/2012/01/13/caught-by-a-predator-10-years-after-her-abduction/)
* [Popular Mechanics article](https://www.popularmechanics.com/technology/security/how-to/a630/2672751/)
* [Congressional testimony of Alicia Kozakiewicz](http://notonemorechild.org/map/9)

### 2005 [Dennis Rader](https://en.wikipedia.org/wiki/Dennis_Rader) --- The "BTK" Serial Killer

Expand Down
7 changes: 3 additions & 4 deletions docs/fernico.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,8 @@
---
tags:
- Organization
- Articles that need to be expanded
- Organization
- Articles that need to be expanded
---
## External Links

- [Official website](https://www.fernico.com/)

* [Official website](https://www.fernico.us/)
21 changes: 0 additions & 21 deletions docs/fernico_zrt.md

This file was deleted.

8 changes: 4 additions & 4 deletions docs/international_business_machines_corporation.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
---
tags:
- Articles that need to be expanded
- Organization
- Articles that need to be expanded
- Organization
---
**International Business Machines Corporation** (**IBM**) is a computer
hardware and software vendor.

## External Links

- [Official website](https://www.ibm.com/ch-de)
- [Wikipedia: IBM](https://en.wikipedia.org/wiki/IBM)
* [Official website](https://www.ibm.com/)
* [Wikipedia: IBM](https://en.wikipedia.org/wiki/IBM)
6 changes: 2 additions & 4 deletions docs/ivpn.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
tags:
- No Category
- Software
---
**iVPN.net** is a commercial VPN service focused on multihop
[VPN](vpn.md) connections. Traffic is routed via multiple
Expand All @@ -14,6 +14,4 @@ to their customers activities.

## External Links

- [Official website](https://www.ivpn.net/)
- [Comparison of VPN
protocols](https://www.ivpn.net//pptp-vs-lt2p-vs-openvpn.php)
* [Official website](https://www.ivpn.net)
16 changes: 4 additions & 12 deletions docs/linux_memory_analysis.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,10 +22,9 @@ Active Open Source Projects:
number of features, as well as its own acquisition tools. It is usable
as a library and is used as such in the GRR remote live forensics
project.
- The [Red Hat Crash Utility](http://people.redhat.com/anderson/) is an
extensible Linux kernel core dump analysis program. Although designed
as a debugging tool, it also has been utilized for memory forensics.
See, for example, the [2008 DFRWS challenge write-up by AAron Walters](http://volatilesystems.blogspot.com/2008/07/linux-memory-analysis-one-of-major.html).
- The Red Hat Crash Utility is an extensible Linux kernel core dump analysis
program. Although designed as a debugging tool, it also has been utilized for
memory forensics. See, for example, the [2008 DFRWS challenge write-up by AAron Walters](http://volatilesystems.blogspot.com/2008/07/linux-memory-analysis-one-of-major.html).
(Availability/License: GNU GPL)

Commercial Products:
Expand Down Expand Up @@ -53,8 +52,7 @@ Inactive Open Source and Research Projects:
- [Volatilitux](https://code.google.com/archive/p/volatilitux) is another Linux
memory forensics tool written in Python. (Availability/License: GNU
GPL)
- Idetect (Linux) <http://forensic.seccure.net/> is an older
implementation of Linux memory analysis.
- Idetect is an older implementation of Linux memory analysis.

## Linux Memory Analysis Challenges

Expand All @@ -68,12 +66,6 @@ Inactive Open Source and Research Projects:
included forensic analysis of a memory image from a potentially
compromised Linux server.

## Linux Memory Images

Aside from those in the challenges referenced above, sample Linux memory
images can also be found on the Second Look website at
<https://secondlookforensics.com/images.html>.

## Linux Memory Analysis Bibliography

- [Digital Forensics of the Physical Memory](http://forensic.seccure.net/pdf/mburdach_digital_forensics_of_physical_memory.pdf) M.
Expand Down
14 changes: 5 additions & 9 deletions docs/list_of_volatility_plugins.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,14 +51,12 @@ on the [project Googlecode site](https://code.google.com/archive/p/volatility).
(By
[Moyix](https://moyix.blogspot.com/2008/10/plugin-post-moddump.html)) -
Dump out a kernel module (aka driver)
- [Registry
tools](https://sites.cc.gatech.edu/~brendan/volatility/dl/volreg-0.6.tar.gz)
- [Registry tools](https://sites.cc.gatech.edu/~brendan/volatility/dl/volreg-0.6.tar.gz)
(By
[Moyix](https://moyix.blogspot.com/2009/01/memory-registry-tools.html)) -
A suite of plugins for accessing data from the registry, including
password hashes, LSA secrets, and arbitrary registry keys.
- [Modified Regripper & Glue
Code](https://sites.cc.gatech.edu/~brendan/volatility/dl/volrip-0.1.tar.gz)
- [Modified Regripper & Glue Code](https://sites.cc.gatech.edu/~brendan/volatility/dl/volrip-0.1.tar.gz)
(By
[Moyix](https://moyix.blogspot.com/2009/03/regripper-and-volatility-prototype.html)) -
Code to run a modified RegRipper against the registry hives embedded
Expand Down Expand Up @@ -115,13 +113,11 @@ on the [project Googlecode site](https://code.google.com/archive/p/volatility).
[Scudette](http://scudette.blogspot.com/2008/10/pstree-volatility-plugin.html)) -
Produces a tree-style listing of processes
- [vol2html](http://gleeda.blogspot.com/2009/03/briefly-vol2html-update.html)
(By [Jamie Levy AKA
Gleeda](http://gleeda.blogspot.com/2008/11/vol2html-perl-script.html)) -
(By [Jamie Levy AKA Gleeda](http://gleeda.blogspot.com/2008/11/vol2html-perl-script.html)) -
Converts volatility output to HTML. Not technically a plugin, but
useful nonetheless.
- [SQLite](http://jls-scripts.googlecode.com/files/vol_sql-0.2.tgz) (By
[Jamie Levy AKA
Gleeda](http://gleeda.blogspot.com/2010/01/volatilitys-output-rendering-functions.html)) -
- SQLite,
by [Jamie Levy AKA Gleeda](http://gleeda.blogspot.com/2010/01/volatilitys-output-rendering-functions.html) -
Allows one to place Volatility output into a SQLite3 Database

## Other Helper Tools
Expand Down
2 changes: 0 additions & 2 deletions docs/mac_os_x.md
Original file line number Diff line number Diff line change
Expand Up @@ -252,8 +252,6 @@ Mac OS.
* [NSKeyedArchiver files – what are they, and how can I use them?](https://digitalinvestigation.wordpress.com/2012/04/04/geek-post-nskeyedarchiver-files-what-are-they-and-how-can-i-use-them/)
* [Command Line ALF on Mac OS X](https://krypted.com/mac-os-x/command-line-alf-on-mac-os-x/)
* [mac-security-tips](https://code.google.com/archive/p/mac-security-tips/wikis/ALL_THE_TIPS.wiki)
* [Mac OS X Forensics](https://www.ma.rhul.ac.uk/static/techrep/2015/RHUL-MA-2015-8.pdf),
by Joaquin Moreno Garijo, March 4, 2015
* [Hidden backdoor API to root privileges in Apple OS X](https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/),
by Emil Kvarnhammar, April 9, 2015
* [Max OS X Internals book (1st ed)](http://newosxbook.com/1stEdIsFree.html) by Jonathan Levin PDF
Expand Down
Loading

0 comments on commit d1a3d8b

Please sign in to comment.