Index_P


P

Packets, 363, 369, 375

Packet-switched network, 443

PageRank, 492

Palm Application Programming Interface (API), 348

Palm Debugger, 341

Palm Memory, exploring, 341–2

Palm OS

PDA, 338

databases on, 339

tools for acquiring digital evidence from devices running, 346

UNIX-Based Tools, 346

Windows-Based Tools, 348–9

Palm OS Emulator (POSE), 341, 343, 349

Palm Query Application (PQA), 354

Palmcrypt, 353

Paramedics, 27

Parameter RAM (PRAM), 197

Parker's categories, omission in, 33

Parolees, 337

Password:

protected and deleted data, 29

protection and encryption, dealing with, 270–1

Palm OS Dealing with, 353

recovery programs, 270

Recovery Toolkit, 239, 270

Patent law, 57

Patriot Act (US), 10, 35, 56

Pcat, 538

PC-BIOS, 197

PCMCIA interface card, 354

PDAs (Personal Digital Assistants), 13, 337

seizure, 348–9

PDBlock, 256

Pdd, 342

Pearl, Daniel, 10

Pedophiles, 49

Peer-to-peer (P2P), 480

file sharing programs, 283

network, 364, 498, 663

Penalties, 80–3

People v. Lugashi, 172

Perl scripts, 530

Personal jurisdiction, 43

Persuasion and testimony, 110

PGP, 238, 310

Phrack 58, 559, 652

Phrack 59, 321, 525, 559, 652

Physical and data-link layers, 373

analysis tools and techniques, 432–34

digital evidence on, 419, 433

keyword searches, 433–4

filtering and classification, 434–5

reconstruction, 437

Physical evidence, 663

Physical layer, 663

Piconet see Ad hoc network

Pi-getram, 346

Pi-getrom, 346

Pilot-file, 346

Pilot-link, 342

Pilot-xfer, 346

PIX alert information, 469

Playboy Enterprises, Inc. v. Frena, 58

Pmdump utility, 536

Pocket PC, 350

Point of contact, 663

Point of origin, 663

Point to Point Protocol (PPP), 374, 426–7

Police and Criminal Evidence Act (PACE) (UK), 77, 171

and Civil Evidence Act, 167

POP server, 355

Pornography, 45–50

as cause of crime, 591–2

see also child pornography

Port, 663

scanner, 406

Post command, 508

Power assertive (entitlement) behavior, 159–62, 671

Power reassurance (compensatory) behaviors, 159–60, 671

Power-On Self Test (POST), 195–7

Precautionary-oriented behaviors, 138, 142, 148

Presentation layer, 667

Presenting digital evidence, 184–6

Preservation of evidence, 92, 102, 108, 119, 212, 220–9, 384, 395–400

empirical law, 226

Pretty Good Privacy (PGP), 208, 536

Primary scene, 663

Principles for handling digital evidence, 105

Privacy Act of 1974, 51

Privacy, 50–7

common law protections, 51

definition, 42, 51

as dual right, 51

laws, 386

Private key encryption, 207–8

Process context information, 104

Processes as source of evidence

UNIX, 536–7

Windows, 530–6

Profit oriented behaviors of offenders, 157, 162

Program analysis, 285–7

Proof for criminal prosecutions, 94

ProSoft Data Rescue, 327

PROTECT Act of 2003, 568

Protected computers, unauthorized access to, 30

Protection of Children Act 1978, 70, 72, 80

Protection of Children Against Sexual Exploitation Act of 1977, 49

Protection from Harassment Act 1997 (UK), 600

Protocols for assigning IP addresses, 457

Proxies, 497

Proximity networks, 338

PRTK, 270

Ps command, 536–8

Pseodonymity, 507

Public e-mail discussion list, 165

Public key encryption, 207

Public library terminals, 495

PWL files, 270




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net