POPULARITY
This week Maureen Taylor, The Photo Detective, is joined by Jeff Looman, a software developer who is the Vice President of Engineering at FileShadow, Inc. FileShadow is a software platform that categorizes your files based on metadata and content. It's a secure vault for all of your files. The two discuss how saving our images and documents, collaboration with family and friends, and preserving our digital footprint are critical components to preservation. Related Episodes:Episode 134: Unlocking the Shoebox : Digitize, Identify and Organize Family PhotosEpisode 95: How to Save Your Family Archive with Permanent.orgLinks:FileShadowSign up for my newsletter.Watch my YouTube Channel.Like the Photo Detective Facebook Page so you get notified of my Facebook Live videos.Need help organizing your photos? Check out the Essential Photo Organizing Video Course.Need help identifying family photos? Check out the Identifying Family Photographs Online Course.Have a photo you need help identifying? Sign up for photo consultation.About My Guest:Jeff Looman has been working in software development for over 38 years, both as an engineer, in engineering management, product management, and product placement strategies. He is currently the Vice President of Engineering at FileShadow, Inc. and has worked for a variety of large companies such as WordPerfect, Novell, Apple Computer, and Corel and small companies such as AccessData, eDepoze, and FileShadow. He has been involved in the production of numerous software packages predominantly focused on business productivity in a collaborative environment, focusing on the needs of individual entrepreneurs, corporate executives, and everything in between.About Maureen Taylor:Maureen Taylor, The Photo Detective helps clients with photo related genealogical problems. Her pioneering work in historic photo research has earned her the title “the nation's foremost historical photo detective” by The Wall Street Journal and appearances on The View, The Today Show, Pawn Stars, and others. Learn more at Maureentaylor.comDid you enjoy this episode? Please leave a review on Apple PodcastsI wanted to remind you all that I run one-on-one Photo Consultations, that help identify photo clues that you may have missed, in order to help you better understand your family history. Not many people realize that the saying is true - and that a photo can tell a million stories. All sessions are recorded, and there's a discount for bulk image sessions. Find out more on my website at https://maureentaylor.com. Support the show
Welcome to FTK Over the Air! This is episode 1 where Lynne Roossien and Justin Tolman discuss the many new features that have been released in the last year or two, as well as giving an update on the acquisition of AccessData by Exterro a year ago. (Spoiler alert, it has been great). FTK is being updated with new features like never before! We welcome you to this new podcast and look forward to many more episodes with you all.
Bobby Balachandran, founder and CEO of governance, risk and compliance company Exterro, has just been named LegalTech CEO of the Year in the Legaltech Breakthrough Awards. In a year in which so many legal tech companies have seen significant growth, it is a notable honor. But Balachandran is hardly resting on his laurels. He is already eyeing an IPO in the year ahead. A computer scientist by training, Balachandran founded Exterro in 2008, quickly convincing a Fortune 100 pharmaceutical company to sign on as his first customer. In 2018, Exterro received a reported $100 million investment – at that point one of the largest investments ever in a legal tech company – and went on to make two major acquisitions – of data privacy company Jordan Lawrence and digital forensics company AccessData. Balachandran joins host Bob Ambrogi to discuss his leadership philosophy as a legal tech CEO, his company's formation and growth, his views on the legal tech market, and his plans for his company in the years ahead. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, and MerusCase, and e-payments platform Headnote. Woodpecker, legal document automation for solo and small firms. Legalweek New York, back in person for 2022. A reminder that we are on Patreon. Subscribe to our page to be able to access show transcripts, or to submit a question for our guests.
Virtual legal conferences have been a recurring topic on Legaltech Week, as we’ve debated the highs and lows of presenting conferences online. But panelist Niki Black has persisted in pushing the idea of virtual conferences. This week, the virtual conference concept got vindicated, as several panelists attended the virtual E-Discovery Day event produced by EDRM.net, complete with avatars. In this week’s episode, we share our experiences and opinions with the virtual conference format. Other stories our panel of legaltech journalists discuss this week include: Exterro’s nine-figure acquisition of AccessData, the federal judiciary’s surreptitious lobbying against making PACER free, the expansion of trial court research and analytics company Trellis into Illinois and Delaware, hackers targeting the COVID-19 distribution chain, law firms doing business cases on contingency, and a lawsuit reminder of why lawyers should use email encryption. This week’s panelists are: Nicole Black, legal technology columnist and legaltech evangelist at MyCase; Stephen Embry, author of TechLaw Crossroads; Victor Li, assistant managing editor of the ABA Journal; Molly McDonough, media consultant, former publisher and editor-in-chief of the ABA Journal; Joe Patrice, editor, Above the Law; and Zach Warren, editor in chief of Legaltech News. Bob Ambrogi of LawSites blog and LawNext podcast moderates.
Story time! Around twenty years ago, I was working as a reverse-engineer and cryptanalyst for AccessData while getting my Physics degree at BYU. It was the late 90s and early 2000s. The US governme… https://reperiendi.wordpress.com/2020/04/03/how-i-recovered-over-300k-of-bitcoin/ paper
Simone Di Somma is Founder and CEO at Askdata, a startup specialized in the application of Artificial Intelligence (AI) to improve how enterprises consume Analytics. Before founding Askdata, Simone worked at Philip Morris and Hewlett-Packard across Europe, Middle-East and the US with a primary focus on Advanced Analytics. Simone has been a passionate speaker at various events about the benefits of AI and how this technology will transform the way enterprises do their business. “believe in yourself and at the same time being able to assess yourself. So you have to believe but at the same time always try to understand if you are positioning in the right way and you are proceeding in the right direction. So believe but at the same time believe with some criticism. So being able to every week, every day to evaluate. Am I doing good, am I available to all the elements to succeed – you have to say something. So don't be a slave… And let down by your own ego”…[Listen for More] Click Here for Show Notes To Listen or to Get the Show Notes go to https://wp.me/p6Tf4b-7io
Growing Your Firm | Strategies for Accountants, CPA's, Bookkeepers , and Tax Professionals
Ken Pyle is a partner of DFDR Consulting specializing in Information Security, Computer Forensics, Enterprise Virtualization and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance and Secure Design. Prior to joining DFDR, he served as a Security and Network Engineer for several Information Technology companies and as the IT Director/Security Engineer of a large accounting firm. Ken has consulted with financial institutions, banks, government defense contractors and other highly secure facilities on issues of Information Security, Computer Forensics and Secure Network Design. Ken has lectured on Information Security and has published several whitepapers on subjects including public information gathering via Social Networking and Social Engineering. Ken was a featured speaker at the 2015 Computer and Enterprise Investigations Conference (CEIC). Ken is a highly rated and popular lecturer on Information Security, presenting for several professional organizations including Wolters Kluwer, Prime Global, RBMA and AGN. Ken is also a subject matter expert for Information Security, appearing in industry publications such as Accounting Today and the New Jersey Law Journal. In 2015, he was recognized as a "40 under 40" by South Jersey Business People. Holding numerous security and technology certifications from industry leaders such as Offensive Security, ISC2, Guidance Software, EC-Council, Cisco, VMware, CompTIA and AccessData, he has also published several software vulnerabilities and exploits, and is an active researcher. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design.
I spoke with Craig Carpenter, the president and chief operating officer at Resolution1 Security, a software provider that enables continuous automated incident resolution for data breaches through real-time insight and analysis, as well as threat intelligence integration. He joined AccessData as Chief Marketing Officer in 2013 and assumed his current role in November of 2014 when the company divided its businesses. We discussed the genesis of Resolution1 Security, the industry challenges it is seeking to address, key mobility implications following high-profile data breaches, and technology trends for 2015, among other issues.
I spoke with Craig Carpenter, the president and chief operating officer at Resolution1 Security, a software provider that enables continuous automated incident resolution for data breaches through real-time insight and analysis, as well as threat intelligence integration. He joined AccessData as Chief Marketing Officer in 2013 and assumed his current role in November of 2014 when the company divided its businesses. We discussed the genesis of Resolution1 Security, the industry challenges it is seeking to address, key mobility implications following high-profile data breaches, and technology trends for 2015, among other issues.
I spoke with Craig Carpenter, the president and chief operating officer at Resolution1 Security, a software provider that enables continuous automated incident resolution for data breaches through real-time insight and analysis, as well as threat intelligence integration. He joined AccessData as Chief Marketing Officer in 2013 and assumed his current role in November of 2014 when the company divided its businesses. We discussed the genesis of Resolution1 Security, the industry challenges it is seeking to address, key mobility implications following high-profile data breaches, and technology trends for 2015, among other issues.
I spoke with Craig Carpenter, the president and chief operating officer at Resolution1 Security, a software provider that enables continuous automated incident resolution for data breaches through real-time insight and analysis, as well as threat intelligence integration. He joined AccessData as Chief Marketing Officer in 2013 and assumed his current role in November of 2014 when the company divided its businesses. We discussed the genesis of Resolution1 Security, the industry challenges it is seeking to address, key mobility implications following high-profile data breaches, and technology trends for 2015, among other issues.
I spoke with Craig Carpenter, the president and chief operating officer at Resolution1 Security, a software provider that enables continuous automated incident resolution for data breaches through real-time insight and analysis, as well as threat intelligence integration. He joined AccessData as Chief Marketing Officer in 2013 and assumed his current role in November of 2014 when the company divided its businesses. We discussed the genesis of Resolution1 Security, the industry challenges it is seeking to address, key mobility implications following high-profile data breaches, and technology trends for 2015, among other issues.
En esta ocasión tenemos una novedad: por primera vez hacemos una entrevista en inglés, que les presentamos con voice over. También les queremos pedir que si saben de alguien que no haya actualizado su feed de suscripción en iTunes, por favor le avisen que lo cambiamos, para que puedan continuar escuchándonos. LO NUEVO – Platicamos de ADUC 2013, evento realizado por AccessData, fabricantes de FTK (Forensic Toolkit®), una herramienta muy conocida a nivel mundial; donde presentaron sus nuevos productos. – Cada día más estamos participando en MVS Radio, y les comentamos un poco sobre lo que podrán escuchar por ahí. LA ENTREVISTA – Mark Spencer nos habla sobre Registry Recon (@ArsenalRecon), una herramienta que revoluciona el cómputo forense en cuanto al análisis del Registro de Windows. http://arsenalrecon.com LA ROLA – La 33 – Pantera Mambo – http://www.youtube.com/watch?v=ooh-SI-A824 LA RECOMENDACIÓN – Coursera – http://www.coursera.org/ (recomendado por Andrés Ortiz) – Un sitio web que recopila cursos en línea y permite acceder a ellos. No dejen de escribirnos con sus comentarios, opiniones, recomendaciones, dudas y demás; y apoyen este podcast inscribiéndose a los cursos que tenemos en Mattica University (http://university.mattica.com/), a los cuales podrán tener descuentos por ser escuchas de Crimen Digital. Saludos!
Show Notes for December 6th 2009, we have a great show for you today. Today we have an interview with Brian Karney the COO of AccessData. Brian talks with us about FTK 3.0 and support for Helix. Ovie makes a stunning confession, listener email, new important changes to Rule 41 of Search and Seizure, Passware Kit 9.5 Decrypts BitLocker Hard Drives, Supports PGP, and Windows 7. Web Sites of the Week: http://www.zagg.com/accessories/zaggsparq.php http://ralphlosey.wordpress.com - great resource for legal cyber information http://audiko.net/
In Episode 9, The MacDudes talk about hardening your Mac using native security applications and processes. Following in the security theme, the Plist of the Week (PLoW) covers com.apple.loginwindow.plist and com.apple.loginitems.plist.We have a great interview with Joe Duke of AccessData. Joe will discuss the use of FTK in analyzing Macintosh and the new FTK Mac Forensics course. The following are some of the websites we talk about concerning Mac Security & anti-virus Mac Shadows Secure Mac Mac Hacking Security Social Intego BlogThe show note to follow, honest!Be Safe,The MacDudes
In this Episode, Ryan interviews Al Lewis of SubRosaSoft, Chris talks with Social Media & Communications expert, Christ M. Miller about her website, Cops2Point0.com. The MacDudes also discuss:HFS+ read support in BootCamp 3.0 Mac OS's native screenshot capabilitiesPlist of the Week: com.apple.sidebarlists.plistWe're still struggling with some sound quality issues, hopefully we will have this worked out with the next round of interviews.Show notes will be posted shortly.
This episode covers why we point everyone to the user's Home folder first. Ryan talks about Diskarbitration for Leopard and Tiger. Chris showcases the Plists of the Week, Safari bookmarks, history, downloads, TopSites & Last Session.Websites of the Week: MacTracker & EveryMacPodcasts to listen to: CyberSpeak & Forensic 4CastShow notes are available for download. They are more detailed than the synopsis below:Click here to DownloadShow notes synopsis:Home Folder: -Most of the evidence is located in the Userʼs Home Folder -Majority of the Preference PLists with user-specific settings are in User/Library/ Preferences -User Logs: -Indicative of the userʼs activity -Not system activity, but user specific logs -Preferences: -PLists files or proprietary format files for the User -Contains configurations and settings for the User -I.E. Online activity, buddy lists, email, logins, etc.-Application Support: -Mozilla Cache, iPhone backup files from MobileSync folder -Application PLists with information LEOPARD: -Disk Arbitration looks at devices and mounts the device and makes icon to access this device available to the user -On Boot, Disk Arbitration recognizes the internal hard drive. Recognizes file system. Mounts partitions on desktop. -In order to prevent writes, we must prevent the mount. -To turn off Disk Arbitration, enter Terminal and type: sudo launchctl unload System/Library/LaunchDaemon/com.apple.diskarbitrationd.plist-Now when you connect a disk, the disk will not mount -To turn back on, enter Terminal and type: sudo launchctl load System/Library/LaunchDaemons/com.apple.diskarbitrationd.plist or Reboot system and diskarbitration will become active again TIGER: -Not controlled by LaunchCtl process -Need to move the PList from one location to another -Method: 1. Make copy of the diskarbitrationd.plist 2.Once the copy is made, use the remove command in Terminal to delete the com.apple.diskarbitrationd.plist from the /etc/mach_init.d folder 3.Reboot system 4.Only OS Boot partition will mount. To UNDO, Copy the diskarbitrationd.plist back to the /etc/mach_init.d folder and reboot the system. PList(s) of the Week(PLOW): User/Library/Safari:Bookmarks.plist: -User created/maintained bookmarks Downloads.plist -Any downloads specific to Safari -Download history History.plist: -History from Safari if not cleared TopSites.plist -Came with Safari 4 -When a New Tab is opened, it opens thumbnails of most visited sites -Instead of typing URL, just click on thumbnail and it opens the site. LastSession.plist: -Indicates what was open on last Safari session -If multiple windows opened, it will indicate each as a different Item
Hey,Episode 3 is uploaded and ready for your listening pleasure. We cover Safari Internet cache, the Trusted Utilities Disk and the Plist of the Week. We also have our Host at Large, Reggy, with part one of his series on the Terminal. Show notes should be posted tomorrow. Thanks for listening and keep those emails coming in!Be Safe,The MacDudes
Episode 2 is uploaded! The sound quality is a bit better but still working on that. In this episode we cover: Defeating the Open Firmware password, Mobile Forensics World's iPhone Forensics panel discussion, the Plist of the Week and a few Mac websites.You can send any comments or questions to: Click here to send The MacDudes an e-mailEpisode 1 Show Notes (Download at: Show Notes)GOLDEN RULE: Use OPTION key to boot first and confirm no Firmware Password OFP: Prevents any other startup option other than "option" or "startup disk". If OFP is active and you attempt alternative boot sequence, the system will default to the normal “Startup Disk” and possible writes will be made. -Dont want to make writes.... 1. Boot with option key to confirm Open Firmware Password exist 2. To get around: A. Pull hard drive and image via write block (24 screws or less) B. Reconfigure the RAM: 1) Shut down 2) Disconnect power (if laptop remove battery) 3) Remove stick or add stick of RAM to reconfigure 4) Close up, connect battery/power 5) Command+Option+P+R key all at once "Vulcan Death Grip" 6) Listen for 3 Chimes-Indicates reset 7) Restart and use Option key to check NOTE: Time will be reset. The clock will possibly be off. Logs may be important. Mobile Forensics World iPhone Forensics PaneliPhone Panel: -Ryan Kubasiak: Macosxforensics.com -Jonathan Zdziarski : iPhone Forensics author -Sean Morrissey :Dept. of Defense -Andrew Hoag : Moderator -Took questions from audience after moderated question session.Different ways to get data: Hardware/Software Suites: Wolf: Good for unlocked phone, and if you unlock can use. CellebriteDifferent Methods: Raw Disk info: Jonathan Zdziarski and Sean Morrissey -Concerns as to what is being changed from data standpoint Dont forget about the iPhone backups on the Mac: a wealth of informationPList(s) of the Week(PLOW): Plist: Registry like files but corruption of one file doesnʼt corrupt the entire system. Application plists: Quicktime: Global: Library--> Preferences--> com.apple.quicktime.plist -Shows Registered User and Registered Key -Can indicate the key for verififcation of legal software iWork (Mac Office Suite): Global-->Library-->Preferences-> iWork08: com.apple.iwork08.plist iWork09: com.apple.iwork09.plist Google Gears: Global--Library-->Preferences-> com.google.gears.plist User-->Library-->Preferences-> com.google.gmailnotifier.plist Websites to Check Out:Mac Shadows: www.macshadows.comMacenstein: www.macenstein.com
Well, we finally got Episode 1 uploaded! We had some minor problems with sound quality, hopefully we will get those cleared up for the next episode.You can send any comments or questions to: Click here to send The MacDudes an e-mailEpisode 1 Show Notes (Download at: Show Notes)Single User Mode: GOLDEN RULE: Use OPTION key to boot first and confirm no Firmware Password -If Firmware Password in use, power off. (Firmware Password Options will be covered in a later podcast) -Single User Mode can be used to find Date/Time of the system without making changes -After OPTION key boot and confirmation of no firmware password -REBOOT holding OPTION + ʻSʼ Key to boot into Single User Mode -Will be similar to a Verbose boot -After boot stops, type “Date” at cursor and date and time will be displayed. -To find the make & model of the installed hard drive, look for the line that starts with "Got Boot Device"-Can also run System Profiler to access information about the system Training: Forward Discovery: -Non-Tool Specific Mac Forensics Survival Course -Teaches how to do Mac Forensics using Mac -Basic and Advanced Courses being offered Internationally BlackBag Technologies: -Offers both training for non-tool and Blackbag Tool Training -Suite of Proprietary tools for using a Mac to do Mac Forensics -Beginner, Intermediate, and Advanced Courses SubRosaSoft: -Also offers tool specific training -MacForensicsLab:Proprietary software Purdue University: (Law Enforcement Only): -3 day class -Traveling Class and at the University -Beginning and Advanced Course Apple: -Several certifications: -Apple Certified Support Professional (ACSP) -Apple Certified Technical Coordinator (ACTC) -Apple Certified System Administrator (ACSA) -Range of Apple Software Pro Certifications as well Plist of the Week(PLOW): This weekʼs PLOW is: com.apple.ipod.plist 1.It is located in both Global and User: Library --> Preferences 2.Contains information about all IPod/IPhone devices connected to system. 3.Includes (not comprehensive): a.UUID: Unique ID for the Device b.Connected: Last Connected Date/Time c. Device Class: IPod/IPhone d.Firmware Version e.Serial Number f. IMEI (IPhone) g.Use Count
Welcome to Inside the Core, the Macintosh & Apple Device Forensics podcast.Today is a short introduction into what Inside the Core is all about. We will cover Mac specific resources and the Plist of the Week.ResourcesThe Mac OS X Forensics websitewww.macosxforensics.comThe Mac OS Forensics Yahoo Grouptech.groups.yahoo/group/macos_forensicsTips & Tricks at the MacForensicLabs websitewww.macforensicslab.comPlist of the Weekcom.apple.preferences.account.plistThis plist is located in the Local Library (/Library/Preferences) and holds information pertaining to deleted user accounts. These user accounts can be totally deleted from the system or archived by the administrator.To see if the user accounts were archived, look in the Users folder for the Deleted Users subfolder (/Users/Deleted Users/). User accounts that have been archived will be in a disk image (DMG) format or if it was FileVaulted, a sparsebundle image.