1998-11-19 - learn computer forensics with the boys from the US Treasury

Header Data

From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com
Message Hash: 510a5879fc3837a1c0ea5cc4a6c2516dec22013b5fae43379b8a9602a07782ed
Message ID: <199811191740.SAA22354@replay.com>
Reply To: N/A
UTC Datetime: 1998-11-19 18:32:55 UTC
Raw Date: Fri, 20 Nov 1998 02:32:55 +0800

Raw message

From: Anonymous <nobody@replay.com>
Date: Fri, 20 Nov 1998 02:32:55 +0800
To: cypherpunks@toad.com
Subject: learn computer forensics with the boys from the US Treasury
Message-ID: <199811191740.SAA22354@replay.com>
MIME-Version: 1.0
Content-Type: text/plain




COURSE TITLE: Computer Encryption/Decryption

LENGTH OF PRESENTATION: 

Lecture  Laboratory  Practical Exercise  Total  
2:00  2:00  2:00  6:00  

 DESCRIPTION:

Advancing computer technology, coupled with a growing user awareness of
privacy and security issues, has resulted in the widespread use of program,
electronic mail, and data file encryption techniques. Today seemingly all
sophisticated applications have their own optional encryption schemes
including WordPerfect, Word, Lotus, Excel, and a host of others. The
computer investigator can expect to encounter encrypted (unreadable) files
when examining seized computer evidence. This course demonstrates software
tools which will enable the student to decreypt many different files, and
examines features of the most commonly used encryption/decryption tool used
today: PGP.

http://www.ustreas.gov/fletc/ffi/scers.htm






Thread