Perhaps of interest. > -----Urspr�ngliche Nachricht----- > Von: cult hero [SMTP:[EMAIL PROTECTED]] > Gesendet am: Mittwoch, 12. Mai 1999 01:07 > An: InfoSec News > Betreff: [ISN] The Digital Detective Workshop > > > Forwarded From: CDS <[EMAIL PROTECTED]> > > ANNOUNCING! > > The Digital Detective Workshop > > Digital evidence acquisition tools and techniques are demonstrated > in this "hands-on"computer investigations training seminar. > > Who's using your company's computers? Are they: > > * Working, or playing games and surfing the Internet? > * Accessing your confidential files? > * Leaking proprietary data by E-Mail? > * Downloading illegal files or images? > * Storing personal info on company PCs? > * Committing fraud against the company? > * Juggling the company payroll records? > * Using E-Mail for "Flames" or sexual harassment? > > Are you prepared for these scenarios: > > * An employee left and changed critical computer passwords? > What do you do? > * An employee is using company computers for illegal purposes. > What do you do? > * A female employee receives sexually harrassing e-mail anonymously. > What do you do? > * You seize a computer and need to develop evidence of wrongdoing. > What do you do? > * You're company is based in Texas and you need to supervise employee > computer > use in twenty-two cities around the world. > What do you do? > > Who should attend this workshop? > > * Law enforcement personnel charged with the investigation of computer > crime > * Corporate security personnel charged with computer security and incident > response > * Private Investigators hired to assist in computer related > investigations. > > What we'll cover: > > * Types of Computer Crime > * Cyber Law Basics > > * How to Bypass Passwords > * How to Crack Encrypted Files > > * How to Trace the Source of E-Mail > * How to Track a Suspect Online > * How to Track Online Activity > * How to Track Software Piracy > * How to Track Stolen Laptops & PCs > > * How to Match a Diskette to a PC > * How to Recover Deleted Data > * Data Hiding Techniques > * Text Search Techniques > > * Finding Disguised or Hidden Images > * How to Find Unique Identifiers in Documents > > * How to Remotely Monitor a Target PC > * How to Find Clandestine Web Sites > * Social Engineering in Chat Rooms > * Types of Investigative Software > > Actual "Hands-On" Demonstrations of the latest High-Tech Evidence > Gathering > Software > > Don't miss the Digital Detective Workshop! > > Each Participant will receive a CD-ROM with a demonstration copy of the > various > software and PowerPoint presentations used during the seminar. > > Each Participant will receive a Certificate of Attendance > > > Seminar Date: June 11th, 1999 > > Location: > Codex Data Systems > Regional Training Center, Bardonia, New York > (just 20 Miles Northwest of New York City) > > Seminar Fee: $495.00 per participant > Visa - Mastercard - American Express Accepted > US Government Impact Cards Accepted > > Complimentary refreshments will be served > > Please forward/fax agency/business letterhead with attendee's name(s) > to reserve your seat. > > Register now . . . seating is limited. > > For further information, contact: > > Codex Data Systems, Inc. > 167 Route 304 > Bardonia, New York 10954 USA > Tel: 914-627-0011 > Fax: 914-627-0211 > E-Mail: [EMAIL PROTECTED] > > Or visit our website at: <http://www.codexdatasystems.com/ddw.html> > > > -o- > Subscribe: mail [EMAIL PROTECTED] with "subscribe isn". > Today's ISN Sponsor: Hacker News Network [www.hackernews.com] - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
