Table 7.1: A proposed scale for categorizing levels of certainty in digital evidence.
Chapter 8: Computer Basics for Digital Investigators
Table 8.1: ASCII and hexadecimal values of some capital case letters.
Table 8.2: Segment of a Word document shown in hexadecimal and ASCII format.
Table 8.3: Viewing two tcpdump files created on Intel-based and Sun systems shows the difference between little-and big-endian representations of the same UNIX date (in bold).
Table 9.1: Two files on a Windows machine that differ by only one letter have significantly different MD5 values.
Table 9.2: Advantages and disadvantages of the three collection options described in Section 9.4.2.
Table 9.3: Header of a JPEG file viewed in hexadecimal (left) and ASCII (right) showing the signature "JFIF".
Table 9.4: Headers of Netscape history databases from different systems.
Table 9.5: User account (know) and group (grp13) information preserved in a TAR file.
Table 9.6: Relationships between evidence and its source.
Table 9.7: Timeline of activities on victim's computer show e-mail correspondences, online chat sessions, deleted files, Web searching for maps, and online travel plans.
Table 9.8: Grid showing e-mail message sent by a suspect over several months to several members of a criminal group.
Chapter 10: Forensic Examination of Windows Systems
Table 11.1: Utilities from The Coroner's Toolkit being used to access a hard drive directly, illustrating the previewing capabilities of many UNIX-based tools.
Table 15.1: Sample chart created in preparation for acquiring digital evidence from a small corporate network.
Table 15.2: Connections between hosts, ordered by total number of application bytes transferred. Data extracted from tcpdump file (available on book Web site) using Argus "ramon -c -A -M Matrix". The same summary can be obtained using the NetIntercept "Traffic Load" report (available on the Web site).
Table 15.3: Communication between hosts, ordered by number of connections. Data extracted from tcpdump file using the NetIntercept "Top N" report (available on book Web site).
Chapter 16: Digital Evidence on Physical and Data-Link Layers
Table 19.1: Different attack methods. (Dunne, Long, Casey 2000)
Table 19.2: Comparison of features in arson and computer crime.
Table 19.3: Comparison of crime scene characteristics in arson and computer intrusions where "cwd" refers to the current working directory of a process (where it was started).