JEFF HOWELL
  • Home
  • About
  • Cyber Security Fundementals
    • Threats and Vulnerabilities
    • Reference Monitor
    • Links to Additional Resources
  • Cryptography
    • Block Ciphers
    • Hash Functions
    • Message Authentication Codes (MAC's)
    • Kerberos Key Management (Single sign-on)
    • Public Key Infrastructure (PKI)
    • Links to Additional Resources
  • Secure Architecture
    • Architecture Strategy
    • Contextual Security Architecture
    • Conceptual Security Architecture
    • Logical Security Architecture
    • Physical Security Architecture
    • Component Security Architecture
    • Operations
    • Supporting Materials
  • Reference Link Library
    • Industry Websites
    • Government Resources
    • Cyber Security News
    • Certification and Training
    • Books
    • Cyber Security Tools
  • Risk Management
    • Supporting Materials
  • Operational Policy
    • Laws and Regualations
    • Data Classification
    • Policy Implementation and Enforcement
    • Supporting Materials
  • Management and Cyber Security
    • Contingency Planning
    • ROI of Cyber Security
    • Staffing Models
    • Links to Additional Resources
  • Secure Software Design and Development
    • Heartbleed Details
    • Mobile Device Vulnerabilities
    • Links to Additional Resources
  • Network Visualization and Vulnerability Detection
    • Visualizing the Network
    • Protecting the Perimeter
    • Vulnerability Detection
    • Sniffing Wireless Networks
    • Links to Additional Resources
  • Cyber Threat Intelligence
    • Links to Additional Resources
  • Incident Response and Computer Network Forensics
    • Links to Additional Resources
Appendix B – Hash values associated with the digital evidence

Evidence Title

MD5

SHA1

FileNames [evidence\c:\CSOL 590\590 mod 7\evidence\...]

Brandy "Pig" pic

49f6a660831650ae3a2654319591a56a

d0e19dfadb0a91b5d7da0f11d9e66a04d82f8b53

[...]brandy Facebook pig.jpg

Brandy FB profile

b693826aabe2bf9e566e36eac6f2e337

ad2ab7568808d0983e6b089277bca1fdf5292210

[...]brandy Facebook profile.jpg

Brandy semi-nude

a74120b1840222a1dc5b0443dfe3dc06

d83c8e589dddb6bba030ff8868e3b64a7dbac155

[...]brandy_pic.jpg

Brandy semi-nude2

4fbaaca7b1bc7881bcffaacb58cf9f21

e090e98c98d3dd9d3cf53027242fb4be0eb6f11a

[...]brandy_pic2.png

Brandy email to FB

7c1e96c7f61177c8ce34522fb517c619

346d7297b9dfce496e4e94fbc33a3d67d7abfe95

[...]IMG_0910.JPG

Brandy email to Match

be5e39b43fc46dcbcbb14f776aac97f0

279507612bb4f743005299dbd63a5dd87f796e65

[...]IMG_0911.JPG

Brandy recvs email

9df74815a31a22740850f06dcf7c70d2

ae529848e0a9d2cba18e3fa36424eeca3ee8dfd5

[...]IMG_0912.JPG

laptop pic

7c1e96c7f61177c8ce34522fb517c619

346d7297b9dfce496e4e94fbc33a3d67d7abfe95

[...]laptop.JPG

timeline

48a382391b8f0b7cd6a66c8b59c7f8a3

d7a07ba47dcb13b7efe576beed2a6194cf748daa

[...]timeline data.xlsx

 

Jeff Howell  -  San Carlos, CA  -  Privacy Statement - email Jeff
  • Home
  • About
  • Cyber Security Fundementals
    • Threats and Vulnerabilities
    • Reference Monitor
    • Links to Additional Resources
  • Cryptography
    • Block Ciphers
    • Hash Functions
    • Message Authentication Codes (MAC's)
    • Kerberos Key Management (Single sign-on)
    • Public Key Infrastructure (PKI)
    • Links to Additional Resources
  • Secure Architecture
    • Architecture Strategy
    • Contextual Security Architecture
    • Conceptual Security Architecture
    • Logical Security Architecture
    • Physical Security Architecture
    • Component Security Architecture
    • Operations
    • Supporting Materials
  • Reference Link Library
    • Industry Websites
    • Government Resources
    • Cyber Security News
    • Certification and Training
    • Books
    • Cyber Security Tools
  • Risk Management
    • Supporting Materials
  • Operational Policy
    • Laws and Regualations
    • Data Classification
    • Policy Implementation and Enforcement
    • Supporting Materials
  • Management and Cyber Security
    • Contingency Planning
    • ROI of Cyber Security
    • Staffing Models
    • Links to Additional Resources
  • Secure Software Design and Development
    • Heartbleed Details
    • Mobile Device Vulnerabilities
    • Links to Additional Resources
  • Network Visualization and Vulnerability Detection
    • Visualizing the Network
    • Protecting the Perimeter
    • Vulnerability Detection
    • Sniffing Wireless Networks
    • Links to Additional Resources
  • Cyber Threat Intelligence
    • Links to Additional Resources
  • Incident Response and Computer Network Forensics
    • Links to Additional Resources