From: Anonymous <nobody@replay.com>
To: cypherpunks@toad.com
Message Hash: 510a5879fc3837a1c0ea5cc4a6c2516dec22013b5fae43379b8a9602a07782ed
Message ID: <199811191740.SAA22354@replay.com>
Reply To: N/A
UTC Datetime: 1998-11-19 18:32:55 UTC
Raw Date: Fri, 20 Nov 1998 02:32:55 +0800
From: Anonymous <nobody@replay.com>
Date: Fri, 20 Nov 1998 02:32:55 +0800
To: cypherpunks@toad.com
Subject: learn computer forensics with the boys from the US Treasury
Message-ID: <199811191740.SAA22354@replay.com>
MIME-Version: 1.0
Content-Type: text/plain
COURSE TITLE: Computer Encryption/Decryption
LENGTH OF PRESENTATION:
Lecture Laboratory Practical Exercise Total
2:00 2:00 2:00 6:00
DESCRIPTION:
Advancing computer technology, coupled with a growing user awareness of
privacy and security issues, has resulted in the widespread use of program,
electronic mail, and data file encryption techniques. Today seemingly all
sophisticated applications have their own optional encryption schemes
including WordPerfect, Word, Lotus, Excel, and a host of others. The
computer investigator can expect to encounter encrypted (unreadable) files
when examining seized computer evidence. This course demonstrates software
tools which will enable the student to decreypt many different files, and
examines features of the most commonly used encryption/decryption tool used
today: PGP.
http://www.ustreas.gov/fletc/ffi/scers.htm
Return to November 1998
Return to “Steve Schear <schear@lvcm.com>”