Comprehensive Digital Forensic Solutions
|
|
|
- Annabelle Malone
- 10 years ago
- Views:
Transcription
1 Comprehensive Digital Forensic Solutions
2 Mobile Device Forensic & Security Concerns
3 Presenter
4 Are we addicted?
5 The Best Approach
6 Cases
7 Devices Everywhere PDA Devices Mobile Phones Hybrids Ultimate Hybrid Android iphone -Pre GPS Vehicles
8 What is mobile forensics? Computer Forensics 1. Storage device requiring file system 2. Device is static 3. Larger storage capacity 4. Forensic: Bit Stream Imaging Mobile/Hybrid/PDA Forensics 1. Embedded systems 2. Device is active 3. Smaller on board storage capacity 4. Forensic: Active Memory Imaging Ultimate Hybrid Forensics iphone, Android, Palm Pre 1. Storage device requiring file system*, that depends on chip 2. Device is very active with multiple types of wireless 3. Larger storage capacity 4. Forensic: Bit Stream Memory Image (Typical) What will be out next category? *-File System is a full system that can allow a multi-gig storage device.
9 The First Responder
10 First Responder Cards
11 First Responder Cards
12 First Responder Cards
13 First Responder Rules 1. Teach/Learn about the evidence 2. Bridge communication gap 3. Follow up with training
14 The Seizure
15 Second Degree: Seizure Maintain the best evidence Seizure rules based on type of device It will not always go smoothly Prepare for the worst Think outside the box Look for all options for the mobile accessories think creative
16 Second Degree: Seizure Risks to Evidence Wireless Communication Power Supply Issues No Legal Paperwork No Training
17 Faraday Example Paraben StrongHold Bag
18 The Acquisition
19 Are they forensic? Acquisition Tools BitPim Oxygen SecureView MobilEdit!.XRY BK Forensics Final Data CSI Stick Cellebrite Neutrino Flasher Boxes Device Seizure
20 What makes a good Mobile Forensic Tool? Is it read only? Yes No Can I repeat my results? What are your validation steps? Paraben Validator (Free Tool in 2010) Is the data verified and if so how? What hash values are used? Can those values be repeated? Are there other validations? Was it designed for forensics, and are the images gathered valid? Is it a commercial tool that is being used in forensics? How is the image file created?
21 The Analysis
22 Do I need to change my techniques to find this data? Traditional Mobile Phone Techniques Work Seize Acquire Analyze Follow Procedures for Seizure that are Generic Simple Charts Document your Procedures by Device Type SOP Seizure SOP Acquisition SOP Analysis Make sure you Update Procedures Regularly Once a Quarter or if tools update so do you
23 Fourth Degree: Analysis What are your expectations of the data? How much should I get? Do you know what to look for? Where is the user data stored? PROPRIETARY DATA Must be parsed before analysis
24 Fourth Degree: Analysis Where is all the data? Handset SIM Card Media Cards Offsite Storage/Synchronization Desktop itunes Backup BlackBerry IPD Provider
25 Data is not always on the Device Desktop Synchronizations Example: iphone
26 Available Data on a GPS Device All Logical GPS Points (Waypoints) Issue with proof Latitude, Longitude, Altitude Notes Time Stamps Clocks UTC
27
28 Getting Trained
29 Fifth Degree: Training Know what you are doing Learn the systems How do they store data Attend for more than a how to but a why Paraben Certified Mobile Examiner Do or Do Not There is No Try. --Yoda
30 Giving Testimony
31 Sixth Degree: Testimony Can you answer the questions? Global knowledge of systems and procedures Do you have a set process? Are you certified? What are the terms of your certification? What do you do to stay current? Conferences Training Continuing Education
32 Receiving Support
33 Seventh Degree: Support COMMUNICATION Is the company there for you? Does the tool support model issues? Logging Support of drivers from manufacturers
34 Can a Handheld Device be SECURE?
35 Questions You Should Ask? What do you do for mobiles in infrastructure? Run! How do you secure them? Third Party Home grown What risks exist that can cost you your data? Virus Theft
36 BlackBerry Security: Positive Points Triple DES Encryption Authentication for transfer of data Compress Plain Text Encrypt to Ciphertext Session Key Session Key Encrypted with Master Key is always secure Session key is random for each message.
37 BlackBerry Security: Negative Points Triple DES Encryption NO BREAK Authentication for transfer of data NO Way to Gain Access in Transit is always secure Employees can easily pass data
38 Windows CE Security: Positive Points Mobile no work around for password Lots of third party choices for applications Integration into Windows
39 Windows CE Security: Negative Points Mobile no public work around for password Lots of third party choices for applications Integration into Windows Microsoft is NOT the most popular company = VIRUS ISSUES
40 Other Ultimate Hybrids Moving to The Enterprise
41 Forensic Training for Everyone
42 To learn more about mobile forensics you can attend Paraben s Annual PFIC Conference Nov 8-11 in Park City, Utah
43 The Future is NOW
44 New Innovations
45
46
47 Please the speaker or provide a business card for FREE First Responder Cards or a copy of the presentation.
CSI Crime Scene Investigations
CSI Crime Scene Investigations Did Jack do it? Speaker Introductions Amber Schroader Paraben Corporation Oodles of forensic experience Tyler Cohen Federal Government (Still Cool Person) IPod Obsession
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
WhatsApp Database Encryption on Android and BlackBerry Project Plan. D. Cortjens A. Spruyt F. Wieringa
WhatsApp Database Encryption on Android and BlackBerry Project Plan D. Cortjens A. Spruyt F. Wieringa 16th of November, 2011 Contents 1 Document Information 2 1.1 Description.............................................
Blackberry Forensics. Shafik G. Punja Cindy Murphy. SANS DFIR Summit 2014 Austin TX. June-9-14 Copyright QuByte Logic Ltd
1 Blackberry Forensics SANS DFIR Summit 2014 Austin TX Shafik G. Punja Cindy Murphy 2 SPEAKER BACKGROUND - Shafik G. Punja - Active duty LE, performing digital forensics since Nov 2003 - Instructor for
RecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Server Settings Mobile Devices
*****This document is intended to be used by faculty and staff only***** Faculty and Staff at Booth can configure their Android, BlackBerry, iphone, Palm webos or other Active Sync device to connect to
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE
BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE by Richard A. Rodney As the use of ios devices continues to proliferate in the business space, they present some unique challenges when data must
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
Connecting your Blackberry to Aliant Hosted Exchange. Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange
Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange 1 Table of Contents: BLACKBERRY 7750/6750 VERSIONS 3.7188 OR 3.6... 3 1. Verify the configuration of Outlook on the PC
RDM+ Desktop for Windows Getting Started Guide
RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...
MOBILE DEVICE CONFIGURATION GUIDE ActiveSync
MOBILE DEVICE CONFIGURATION GUIDE ActiveSync Contents Configuring Your BlackBerry 10... 3 Configuring Your Windows Phone... 3 Configuring Your Windows Mobile 6.5 (or Prior)... 3 Configuring Android...
NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS
NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS Firdous Kausar Department of Computer Science, College of Computer and Information Sciences, Imam University, Riyadh, Saudi Arabia.
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
CERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
Exchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
Vehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
Exchange 2010 ActiveSync: Connection
Westlands School Exchange 2010 ActiveSync: Connection Staff mobile phone email access Exchange 2010 ActiveSync provides Westlands School Staff with external access to their school email account from a
Corporate Mobile Policy Template
Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
Presentation Title Presentation Subtitle. The Unique Alternative to the Big Four
Presentation Title Presentation Subtitle The Unique Alternative to the Big Four Speaker Biography Tim L. Bryan, CPA/CFF/CITP, CISA, EnCE Senior Manager, Crowe Horwath LLP Forensic Technology Services Leader
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
Introduction (Contd )
Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
CE 4.2 to Windows 7 - Synchronism Problem
Product: Mobile Products with Windows CE 4.2 Distribution Date: 10/04/2012 CE 4.2 to Windows 7 - Synchronism Problem This document covers how to get an older device with Windows CE 4.2 or early 5.0 to
Mobile Banking FAQ Page 1 of 9
Page 1 of 9 allows anyone with existing online banking access to see their account information from a mobile phone. can be Text Banking, Mobile Browser Banking or Smartphone App Banking. General Questions
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
award winning devices and solutions for business
award winning devices and solutions for business welcome to HTCpro HTCpro is an established programme designed for business that delivers a comprehensive suite of enterprise-grade mobile solutions. These
USING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync Oxford University Press 2007. All rights reserved. 1 Synchronization software A synchronizer
PavelComm s Pro-Tech Lite Fact Sheet
PavelComm s Fact Sheet PavelComm s Fact Sheet - IT for Small Companies with Big Business Needs Owners, Executives and Managers should be investing in and integrating technology to increase the productivity
You will need your District Google Mail username (e.g. [email protected]) and password to complete the activation process.
As a courtesy to the Palm Beach County School District employees, the Division of IT is now providing District Google Mail access for personal mobile devices. Although we do not have the staffing to accept
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
Skynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
UFED 4PC/Touch 4.1 & UFED Physical/Logical Analyzer 4.1.1. Release Notes
UFED 4PC/Touch 4.1 & UFED Physical/Logical Analyzer 4.1.1 Release Notes January 2015 Contents Release highlights... 3 Additional information... 4 Forensic methods... 7 Supported devices... 7 End of life
Modern Digital Forensics!!
ISA 785 Research in Digital Forensics Modern Digital Forensics!! ISA 785! Angelos Stavrou, George Mason University! Modern Digital Forensics What s New 2! New Intellectual property concerns! IP/Brand related
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006
Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Cell Phone Operating Systems
Cell Phone Operating Systems The first smartphone was the IBM Simon and was designed in 1992. The phone themselves have changed. The most important changes are in the Operating System (OS) Operating Systems
Reach more users with business intelligence
Reach more users with business intelligence Highlights Deliver BI information to users in the context of their day-to-day processes and applications Provide actionable intelligence to users, no matter
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
Digital Evidence on Mobile Devices
CHAPTER 20 Digital Evidence on Mobile Devices Eoghan Casey and Benjamin Turnbull Mobile devices such as cell phones and smart phones have become an integral part of peoples daily lives, and as such, they
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
How To Manage A Network Safely
ICANWK303A Configure and administer a network operating system Release: 1 ICANWK303A Configure and administer a network operating system Modification History Release Release 1 Comments This Unit first
Compliance and Security Challenges with Remote Administration
Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges
CELL PHONE ACCESS AND USAGE
Administrative Procedure 142 CELL PHONE ACCESS AND USAGE Background The Division understands the need for employees to access various forms of communication devices for both internal and external communication
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Online Banking Upgrade FAQs
Frequently Asked Questions Why is Town & Country changing to a new online banking system? When will the change take place? What is different about the new online banking system? Do I have to re-register
Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.
Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
CCE Certification Competencies
CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
OXYGEN FORENSIC SUITE 2010 GETTING STARTED
OXYGEN SOFTWARE OXYGEN FORENSIC SUITE 2010 GETTING STARTED 2000-2010 Oxygen Software http://www.oxygen-forensic.com Table of contents Table of contents...2 General information...3 Installation...5 Extracting
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013 FORENSIC ACQUISITION.BEFORE STARTING When we are dealing with the forensics acquisition of an ios device
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
BlackBerry Enterprise Server
BlackBerry Enterprise Server Version: 5.0 Service Pack: 3 Monitoring Guide Published: 2011-03-07 SWD-1398426-0307061008-001 Contents 1 BlackBerry Enterprise Server monitoring solution... 5 BlackBerry Monitoring
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Developing Apps for Business
Developing Apps for Business There s an app for that is a phrase that has passed into general usage since the release of Apple s iphone in 2007. Since then the app market has exploded. Apple s ios and
HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS
HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS We know that choosing a cloud service provider is an important decision. Understanding the facts about your provider is essential to setting expectations on
Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of
Review of Cell Phone Technology
Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000
Clickfree frequently asked questions
Clickfree frequently asked questions Q: What is Cloud Storage? A: Cloud Storage is a term used for storing data remotely via the Internet. Cloud companies such as Elephant Drive provide this service. Q:
Native mobile apps: The wrong choice for business?
Native mobile apps: The wrong choice for business? Why businesses should think twice before building native mobile applications A white paper from Introduction Native mobile applications are popular with
Upgrading Mobile Technology to Enhance Transportation Safety
Upgrading Mobile Technology to Enhance Transportation Safety Joel Garner Jr. AT&T Mobile Field Solutions Consultant & Rick Grisham Executive Director, Pupil Transportation Cobb County School District Marietta,
Developing Process for Mobile Device Forensics
Developing Process for Mobile Device Forensics Det. Cynthia A. Murphy Abstract With the growing demand for examination of cellular phones and other mobile devices, a need has also developed for the development
On the Trail of the Craigslist Killer: A Case Study in Digital Forensics
On the Trail of the Craigslist Killer: A Case Study in Digital Forensics Presenters: Sharon Nelson and John Simek President and Vice President, Sensei Enterprises www.senseient.com [email protected];
Mobility with Eye-Fi Scanning Guide
Mobility with Eye-Fi Scanning Guide Scan and Transfer Images Wirelessly with Eye-Fi This document is to be used in addition to the scanner s user guide located on the installation disc. The instructions
Program Pembudayaan Komunikasi Elektronik Sektor Awam. Komunikasi Elektronik Mobile Email
Program Pembudayaan Komunikasi Elektronik Sektor Awam Komunikasi Elektronik Mobile Email 12 September 2007 Raduwan Abd Maulud Ahmad Fauzi Basri Content Introduction to Mobile Email Why We Need Mobile Email
Validating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
