Packets, 363, 369, 375
Packet-switched network, 443
PageRank, 492
Palm Application Programming Interface (API), 348
Palm Debugger, 341
Palm Memory, exploring, 341–2
Palm OS
PDA, 338
databases on, 339
tools for acquiring digital evidence from devices running, 346
UNIX-Based Tools, 346
Windows-Based Tools, 348–9
Palm OS Emulator (POSE), 341, 343, 349
Palm Query Application (PQA), 354
Palmcrypt, 353
Paramedics, 27
Parameter RAM (PRAM), 197
Parker's categories, omission in, 33
Parolees, 337
Password:
protected and deleted data, 29
protection and encryption, dealing with, 270–1
Palm OS Dealing with, 353
recovery programs, 270
Recovery Toolkit, 239, 270
Patent law, 57
Patriot Act (US), 10, 35, 56
Pcat, 538
PC-BIOS, 197
PCMCIA interface card, 354
PDAs (Personal Digital Assistants), 13, 337
seizure, 348–9
PDBlock, 256
Pdd, 342
Pearl, Daniel, 10
Pedophiles, 49
Peer-to-peer (P2P), 480
file sharing programs, 283
network, 364, 498, 663
Penalties, 80–3
People v. Lugashi, 172
Perl scripts, 530
Personal jurisdiction, 43
Persuasion and testimony, 110
PGP, 238, 310
Phrack 58, 559, 652
Phrack 59, 321, 525, 559, 652
Physical and data-link layers, 373
analysis tools and techniques, 432–34
digital evidence on, 419, 433
keyword searches, 433–4
filtering and classification, 434–5
reconstruction, 437
Physical evidence, 663
Physical layer, 663
Piconet see Ad hoc network
Pi-getram, 346
Pi-getrom, 346
Pilot-file, 346
Pilot-link, 342
Pilot-xfer, 346
PIX alert information, 469
Playboy Enterprises, Inc. v. Frena, 58
Pmdump utility, 536
Pocket PC, 350
Point of contact, 663
Point of origin, 663
Point to Point Protocol (PPP), 374, 426–7
Police and Criminal Evidence Act (PACE) (UK), 77, 171
and Civil Evidence Act, 167
POP server, 355
Pornography, 45–50
as cause of crime, 591–2
see also child pornography
Port, 663
scanner, 406
Post command, 508
Power assertive (entitlement) behavior, 159–62, 671
Power reassurance (compensatory) behaviors, 159–60, 671
Power-On Self Test (POST), 195–7
Precautionary-oriented behaviors, 138, 142, 148
Presentation layer, 667
Presenting digital evidence, 184–6
Preservation of evidence, 92, 102, 108, 119, 212, 220–9, 384, 395–400
empirical law, 226
Pretty Good Privacy (PGP), 208, 536
Primary scene, 663
Principles for handling digital evidence, 105
Privacy Act of 1974, 51
Privacy, 50–7
common law protections, 51
definition, 42, 51
as dual right, 51
laws, 386
Private key encryption, 207–8
Process context information, 104
Processes as source of evidence
UNIX, 536–7
Windows, 530–6
Profit oriented behaviors of offenders, 157, 162
Program analysis, 285–7
Proof for criminal prosecutions, 94
ProSoft Data Rescue, 327
PROTECT Act of 2003, 568
Protected computers, unauthorized access to, 30
Protection of Children Act 1978, 70, 72, 80
Protection of Children Against Sexual Exploitation Act of 1977, 49
Protection from Harassment Act 1997 (UK), 600
Protocols for assigning IP addresses, 457
Proxies, 497
Proximity networks, 338
PRTK, 270
Ps command, 536–8
Pseodonymity, 507
Public e-mail discussion list, 165
Public key encryption, 207
Public library terminals, 495
PWL files, 270