= Announcements & Shameless Plugs =
PaulDotCom Security Weekly - Episode 268 for Thursday December 1st, 2011.
* Check out our new shows: [http://hacknaked.tv Hack Naked TV] with John Strand, [http://www.hacknakedatnight.tv Hack Naked At Night] with Larry and Darren, [http://
pauldotcom.com/wiki/index.php/PaulDotCom_Espanol PaulDotCom Espanol] with Carlos Perez, and our only non-computer security related show dedicated to Cigar Enthusiasts [http://www.stogiegeeks.com Stogie Geeks] with Paul Asadoorian and Tim "BugBear" Mugherini.
* Larry is teaching [http://www.sans.org/san-antonio-2011/description.php?tid=4432 SEC580 Metasploit Kung Fu for Enterprise Pen Testing] in San Antonio, TX December 4-5. Want 10% off of every class in San Antonio? Use the discount code Larry-SA10.
* Don't forget to [http://
pauldotcom.com/ Read our blog], [http://mail. pauldotcom.com/listinfo Participate on our mailing list], [http:// pauldotcom.com/insider/ Visit PaulDotCom Insider], [http://twitter.com/ pauldotcom Follow us on Twitter], [irc://irc.freenode.net/ pauldotcom Join the IRC channel at irc.freenode.net # pauldotcom], [http:// pauldotcom.blip.tv Watch our Videos] and [http://www.facebook.com/ therealpauldotcom Add us on Facebook] where we can be "friends"
* BSides, BSides, [http://www.securitybsides.com/w/page/12194156/FrontPage BSides everywhere]
= Guest Interview: Scott Moulton=
6:00 PM EDT
Scott Moulton is known both for his trademark 'Forensic Unit' hat and his unholy knack for finding new data recovery techniques the other experts don't want you to know. Scott is owner of [http://myharddrivedied.com My Hard Drive Died.com] and fills his days recovering data from all kinds of storage devices, testifying in court, and teaching others to do data recovery.
#What are some of the forensic challenges with SSD drives?
#Tell us about your recent SkydogCon talk about SHA1 Hashes.
#Are you surprised by Wired's findings on [http://myharddrivedied.com/blog/cell-phone-providers-retention-periods cell phone provider retention periods]?
= Guest Tech Segment:
Chris Pogue =
Chris is a Senior Security Consultant for the Trustwave SpiderLabs , a Former US Army Signal Corps Warrant Officer and Member of the United States Secret Service Miami Electronic Crimes Task Force, and is Author of “Unix and Linux Forensic Analysis” by Syngress. Chris is on to give us an overview of his forensic methodology known as Sniper Forensics , whose users include both the FBI and the United States Secret Service.
<center>[[ File: Pogue_Head. jpg]] </ center>
[http://www.thedigitalstandard.blogspot.com/ Author of the blog, “The Digital Standard"]
Why do you consider digital forensics tougher than other forensics fields?# What's "Shotgun Forensics" and " Sniper Forensics"?# What are the Guiding Principles for Sniper Forensics?# Bring us thru Timeline Analysis - what it is and why its important.# How have attackers changed with respect to memory dumping and other operations?# Tell us what 3 things all malware must do. #What are some good tips for malware that' s packed or obfuscated?# Nick indicated there were some interesting cases you were working on. Please share!