learn computer forensics with the boys from the US Treasury

Anonymous nobody at replay.com
Thu Nov 19 10:32:55 PST 1998




COURSE TITLE: Computer Encryption/Decryption

LENGTH OF PRESENTATION: 

Lecture  Laboratory  Practical Exercise  Total  
2:00  2:00  2:00  6:00  

 DESCRIPTION:

Advancing computer technology, coupled with a growing user awareness of
privacy and security issues, has resulted in the widespread use of program,
electronic mail, and data file encryption techniques. Today seemingly all
sophisticated applications have their own optional encryption schemes
including WordPerfect, Word, Lotus, Excel, and a host of others. The
computer investigator can expect to encounter encrypted (unreadable) files
when examining seized computer evidence. This course demonstrates software
tools which will enable the student to decreypt many different files, and
examines features of the most commonly used encryption/decryption tool used
today: PGP.

http://www.ustreas.gov/fletc/ffi/scers.htm







More information about the cypherpunks-legacy mailing list