Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
Five on Forensics Page 1 - Craig Ball
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />
© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />
Meeting the Challenge: E-Mail in Civil Discovery<br />
<strong>Craig</strong> <strong>Ball</strong><br />
Table of C<strong>on</strong>tents<br />
Not Enough Eyeballs........................................................................................ 48<br />
Test Your E.Q.................................................................................................... 49<br />
Staying Out of Trouble..................................................................................... 50<br />
…And You Could Make Spitballs with It, Too ................................................ 50<br />
Did You Say Billi<strong>on</strong>? ........................................................................................ 50<br />
Net Full of Holes ............................................................................................... 51<br />
E-Mail Systems and Files................................................................................. 51<br />
A Snippet about Protocols............................................................................... 51<br />
Incoming Mail: POP, IMAP, MAPI and HTTP E-Mail....................................... 51<br />
Outgoing Mail: SMTP and MTA ....................................................................... 53<br />
Anatomy of an E-Mail Header.......................................................................... 53<br />
Tracing an E-Mail’s Incredible Journey .......................................................... 54<br />
Local E-Mail Storage Formats and Locati<strong>on</strong>s ................................................ 56<br />
Finding Outlook Express E-Mail...................................................................... 57<br />
Finding Netscape E-Mail .................................................................................. 58<br />
Finding Outlook E-Mail .................................................................................... 58<br />
Finding E-Mail <strong>on</strong> Exchange Servers.............................................................. 59<br />
Understanding Server Back Up, by Analogy.................................................. 60<br />
Brick Level Back Up ......................................................................................... 62<br />
The Format Fight .............................................................................................. 62<br />
What Format Do You Want? ............................................................................ 63<br />
Privilege and C<strong>on</strong>fidentiality C<strong>on</strong>siderati<strong>on</strong>s ................................................ 63<br />
Claw Back and Quick Peek Arrangements..................................................... 64<br />
Preparing for E-Mail Discovery ....................................................................... 64<br />
Planning and Policymaking............................................................................. 65<br />
Dear David Duncan, Regards Nancy Temple ................................................. 66<br />
Trust Every<strong>on</strong>e, but Cut the Cards ................................................................. 66<br />
Am I in Trouble? IM! ......................................................................................... 66<br />
<strong>Page</strong> 47