learn computer forensics with the boys from the US Treasury

COURSE TITLE: Computer Encryption/Decryption LENGTH OF PRESENTATION: Lecture Laboratory Practical Exercise Total 2:00 2:00 2:00 6:00 DESCRIPTION: Advancing computer technology, coupled with a growing user awareness of privacy and security issues, has resulted in the widespread use of program, electronic mail, and data file encryption techniques. Today seemingly all sophisticated applications have their own optional encryption schemes including WordPerfect, Word, Lotus, Excel, and a host of others. The computer investigator can expect to encounter encrypted (unreadable) files when examining seized computer evidence. This course demonstrates software tools which will enable the student to decreypt many different files, and examines features of the most commonly used encryption/decryption tool used today: PGP. http://www.ustreas.gov/fletc/ffi/scers.htm

I see that the Mac and various Unix varients are not well represented in these courses... --Steve

At 4:45 PM -0500 11/19/98, Steve Schear wrote:
I see that the Mac and various Unix varients are not well represented in these courses...
That could be because cops only catch the Dumb Ones, which means the ones using Windows. -- petro@playboy.com----for work related issues. I don't speak for Playboy. petro@bounty.org-----for everthing else. They wouldn't like that. They REALLY Economic speech IS political speech. wouldn't like that.
participants (3)
-
Anonymous
-
Petro
-
Steve Schear