So, like we said in episode 2, we are on holiday this next week but will resume full service upon our return.
We would like to know if you would enjoy something more in depth than just forensics-related news. We have a few items that we would like to discuss or even publish as videos. Please let us know what you think. I’ll likely do a short test video to go up at the weekend about Facebook. If you feel as if you would like to see more videos like that one please let us know.
Thanks for everyone’s feedback so far, we aim to reply to everyone but that may take some time.
5 responses to “Feedback (Please)”
Absolutely love the podcast! Especially enjoyed the comments on FTK 2 – glad to hear that I’m not the only one having issues!
Great Podcast, sorry I have no feedback your doing just fine! as it is, well longer episode’s would be nice.
Thanks! ….again great podcast.
I’m going to link you on my forensic science website and podcast. It’s at http://www.forensicfact.info and http://www.podcast.forensicfact.info – if you want to check it out.
I enjoyed your first two podcasts and look forward to the your future episodes. I have tried to get some discussion going on FTK 2 on a list. I have not heard much that is positive. I was unable to buy copies of version 1 (FTK, not UTK, $1000 to LE) and had to buy version 2 with a year of maintenance for $3K.
My Twitter crowd (4-5) are all listeners, and we’ll be spreading the word!
Good luck and best wishes!
Great show guys, i really enjoyed it, One problem I have with forensics podcasts in general though is the way they play into the idea that computer forensics examiners have some sort of magical powers to recover data from drives.
I felt you played into that a bit when you commented something along the lines that people would want to gas forensics examiners if they knew what they could recover. (lol)
Could you comment on weather you would be able to recover data from drives that have been shredded with knoppix or DBAN, or if you can get around full disk encryption tools like dm-crypt or truecrypt.
My understanding is that these tools work and that not even the mighty forensics examiners can thwart them. I would be interesting in hearing this from people within the industry though.
Good luck and keep up the show. Peace
Your video podcast, #3, is an excellent way support and assist the community. I’ve posted about the podcast at the multimediaforensics.com forum. (It’s an underused resource) and on the IACIS listserv.
You were also mentioned on this week’s Cyberspeak podcast.
Keep up the good work.