First conviction under IT Act

Finally, we have our first conviction under the IT Act 2000 in India. After more than a 100 cases being lodged, and about half of them actually reaching the courts, we have our first conviction of an orthopaedic surgeon in Chennai being convicted of recording and uploading pornographic images. He and his brother in the […]

Forensics Awareness week at Mumbai

The Directorate of Forensic Science laboratory, Government of Maharashtra Mumbai is holding a forensics awareness week from 7th to 11th Jan 2008. The Director — Dr.Mrs R.Krishnamurthy is pleased to invite persons from the corporate world especially those who are working in the area of Risk management, frauds detection and In house Investigations to their […]

Indian IT Act 2000 – An Insight

from NII Consulting The IT Act 2000 is a large repository of fine print fraught with judicial jargon and varying legal implications. To quote from the preamble of the Act, “An Act to provide legal recognition for the transactions carried our by means of electronic data interchange and other means of electronic communication, commonly referred […]

CHFI Workshop

From NII Consulting NII Consulting is glad to announce its fourth hands-on workshop for EC-Council’s “Certified Hacking Forensic Investigator (CHFI)” certificate course. As an Accredited Training Provider (ATP), NII is certified to teach the authorized curricula for security technologies. The CHFI certification is awarded after successfully passing the EC0 312-49 exam. (The training fees include […]

Volume Boot Sector Format of FAT

by Kush Wadhwa, NII Consulting There are times when you don’t have sufficient tools to understand the file system. At that time your knowledge in field of digital forensics will play a crucial role. In this article we will study a volume boot sector format of FAT32 file system and will see how to take […]

Dare to delete my files!

by Nikhil Wagholikar, NII ConsultingIntroduction One of the recommended file-system for Linux is Ext-3. Ext-3 file-system might not be as robust and powerful as compared to the Microsoft NTFS file-system but it has some built-in features that makes Linux a power performer. Here we will explore one such feature of Ext-3 file-system here. This feature […]

Universal Extractor

by Nikhil Wagholikar, NII Consulting 1. Need Many a time during Forensics investigation or during Reverse Engineering, we come across the need where we have to check or extract the contents of an executable file. If the executable file is in human readable format (ex : a UNIX file having permissions –rwx-r-x-r-x) then the life […]

Recycle Bin Forensics

by Kush Wadhwa, NII Consulting Have you ever thought of what happens when you hit the delete button? Delete: When we simply delete a file we are throwing that file in the recycle bin of that particular volume. For example, if file resides in C: drive having FAT32 as file system and we delete a […]