This ‘How-To’ walks you through the steps of acquiring a disk image from a live host using Access Data’s wonderful free tool FTK Imager. It is designed to assist IT and security personnel acquire a disk image even if they have little or no forensic experience.
This ‘How-To’ walks you through the steps of encrypting a hard disk volume using the open-source tool TrueCrypt. I guarantee you will find this information useful if you ever have to send sensitive digital data via a common carrier such as FedEx, UPS, or the USPS.
This ‘How-To’ walks you through the steps of installing Ubuntu Linux Desktop v.10.4.1 on an external USB hard drive. These Ubuntu drives are an invaluable part of my IR toolkit. Written for the beginning or intermediate Linux user, this guide is very comprehensive.
This ‘How-To’ guides you through some simple steps that will protect your credit from identity thieves and reduce the number of unsolicited telemarketing calls and residential mailbox spam. If you follow the steps in this guide, I guarantee it will be the best security investment you ever made.