Napster, 59–60, 364
Narrow dissemination of confidential and/or illicit materials, 151
Narrow targeting, 542, 662
National Center for Victims of Crime, 600
National Institute of Standards and Technology (NIST), 182
National Institute of Standards and Testing, 29
National White Collar Crime Center (NW3C), 26
Nbtstat, 377, 531
Near Instant Messaging (NIM), 502
Neidorf, Craig, 65–6
Neighborhood Data, 354
Net:
session command, 470
Threat Analyzer, 264
"NET" framework, 255
NetBIOS, 273, 334, 362, 449, 470
Netcat, 295, 537, 539
NetDetector, 408
NetFlow, 363, 377, 390, 451, 467
Netherlands Forensic Institute, 351
NetIntercept, 29, 380, 408–9, 437, 439
forensics view, 436
graphical user interface, 435
NetOptics, 429
NetScanTools Pro for Windows, 445–2
Netscape, 280, 282, 316, 329
cache "index.db" database, 317
history database, 233, 238, 331
newsreader, 281
Netstat, 449, 469–70, 488, 531
NetWitness, 29, 408
Network:
based attacks targeting critical infrastructure, 10
connection using Internet Protocols, 370–80
device logs, 466–9
eavesdropping, 419
information system, 376
locating entry points, 393
logs, 416
monitoring tool, 419
neighbourhood, 283
process of gathering information about, 385
related data, 413
setting up, 453
state information, 104
storage, 283–85
technical overview of, 362–4
technologies, 365–8, 420
three-phase approach, digital evidence on, 391
traces, 319
traffic analysis tools, 408
vulnerability assessment, 386
Network digital evidence
class/individual characteristics and evaluation of source, 402–406
documentation, collection, and preservation, 395
filtering and data reduction, 400–1
identification, 390–95
recovery, 406–8
reporting results, 416–17
Network File System (NFS), 320, 376
Network Forensic Analysis Tools (NFATs), 14
Network Interface Card (NIC), 361–2, 365, 419, 424, 438, 670
Network layers, 422–7, 666
addresses, 438
digital evidence at, 441
Domain Name System (DNS), 445
encapsulation, 422–7
Internet Protocol and Cellular Data Networks, 443–4
IP Addresses, 444–5
TCP/IP, 442
see also Data-link layers; Transport layers
Network News Transport Protocol see NNTP
Network Solutions, 455
Network Time Protocol (NTP), 469
New York v. Ferber, 49
NewsGroups, 479, 485–6, 670
NFR Security, 408
NFT Security, 29
Nmap, 406, 449
nmap-os-fingerprints, 406
NNTP-Posting-Host and X-Trace headers, 508, 510
No Electronic Theft Act, 58
No-IP, 456
Nokia Wireless Access Point, 425
North American terrorist threats, 208
Norton:
Commander, 263
Disk Doctor, 327
Disk Editor, 257, 325
DiskEdit, 262
Unerase, 327
NT Event Logs, 271, 413
NTFS, 202, 260–1, 326
creation time, 293
drive, 256
file systems, 266–7, 300
record modified time, 293
NTI, 28, 264, 270
Graphics Image File Extractor, 267
Ntlast utility, 400