“License for Use” Information 2 Contributors 4 8.0 Introduction 5 8.1 Forensic Principles 6 8.1.0 Introduction .6 8.1.1 Avoid Contamination 6 8.1.2 Act Methodically 6 8.1.3 Chain of Evidence 6. 8.1.4 Conclusion .6 8.2 Stand-alone Forensics .7 8.2.0 Introduction .7 8.2.1 Hard Drive and Storage Media Basics 7 8.2.2 Encryption, Decryption and File Formats .8. 8.2.3 Finding a Needle in a Haystack 1.0 8.2.3.1 find .1 0 8.2.3.2 grep .1 0 8.2.3.3 strings .1 1 8.2.3.4 awk 1 1 8.2.3.5 The Pipe “|” .1 1 8.2.4 Making use of other sources .1 1 8.3 Network Forensics 1 3 8.3.0 Introduction .1 3 8.3.1 Firewall Logs 1 3 8.3.2 Mail Headers .1 3 Further Reading 1 4