29.10.2014 Views

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

Five on Forensics Page 1 - Craig Ball

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<str<strong>on</strong>g>Five</str<strong>on</strong>g> <strong>on</strong> <strong>Forensics</strong><br />

© 2002-2008 <strong>Craig</strong> <strong>Ball</strong> All Rights Reserved<br />

Meeting the Challenge: E-Mail in Civil Discovery<br />

<strong>Craig</strong> <strong>Ball</strong><br />

Table of C<strong>on</strong>tents<br />

Not Enough Eyeballs........................................................................................ 48<br />

Test Your E.Q.................................................................................................... 49<br />

Staying Out of Trouble..................................................................................... 50<br />

…And You Could Make Spitballs with It, Too ................................................ 50<br />

Did You Say Billi<strong>on</strong>? ........................................................................................ 50<br />

Net Full of Holes ............................................................................................... 51<br />

E-Mail Systems and Files................................................................................. 51<br />

A Snippet about Protocols............................................................................... 51<br />

Incoming Mail: POP, IMAP, MAPI and HTTP E-Mail....................................... 51<br />

Outgoing Mail: SMTP and MTA ....................................................................... 53<br />

Anatomy of an E-Mail Header.......................................................................... 53<br />

Tracing an E-Mail’s Incredible Journey .......................................................... 54<br />

Local E-Mail Storage Formats and Locati<strong>on</strong>s ................................................ 56<br />

Finding Outlook Express E-Mail...................................................................... 57<br />

Finding Netscape E-Mail .................................................................................. 58<br />

Finding Outlook E-Mail .................................................................................... 58<br />

Finding E-Mail <strong>on</strong> Exchange Servers.............................................................. 59<br />

Understanding Server Back Up, by Analogy.................................................. 60<br />

Brick Level Back Up ......................................................................................... 62<br />

The Format Fight .............................................................................................. 62<br />

What Format Do You Want? ............................................................................ 63<br />

Privilege and C<strong>on</strong>fidentiality C<strong>on</strong>siderati<strong>on</strong>s ................................................ 63<br />

Claw Back and Quick Peek Arrangements..................................................... 64<br />

Preparing for E-Mail Discovery ....................................................................... 64<br />

Planning and Policymaking............................................................................. 65<br />

Dear David Duncan, Regards Nancy Temple ................................................. 66<br />

Trust Every<strong>on</strong>e, but Cut the Cards ................................................................. 66<br />

Am I in Trouble? IM! ......................................................................................... 66<br />

<strong>Page</strong> 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!