lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: Brad.Bemis at (Brad Bemis)
Subject: Reacting to a server compromise

Hash: SHA1

In general, digital evidence and the methods used to collect it must stand
up to tests of 'reasonableness" as determined by the presiding judge.   

Thank you for your time and attention,

Brad Bemis
Email Notice: This communication may contain sensitive information. If you
are not the intended recipient, or believe that you have received this
communication in error; do not print, copy, retransmit, disseminate, or
otherwise use the information contained herein for any purpose. Please
alert the sender that you have received this message in error, and delete
the copy that you received.

> -----Original Message-----
> From: James A. Cox []
> Sent: Sunday, August 03, 2003 4:07 PM
> To: Jennifer Bradley
> Cc:
> Subject: Re: [Full-Disclosure] Reacting to a server compromise
> I've never heard of a rule that prohibits the introduction in 
> evidence 
> of Norton Ghost images or any other electronic evidence.  In 
> most places 
> in the US, I think, there wouldn't be any hard and fast 
> rules; it would 
> be up to the judge to decide whether the evidence was reliable enough.
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:



Powered by blists - more mailing lists