The Computer Expert Firm - Interhack Corporation
Advanced Search…

Navigation

  • Home
  • Company
    • Our Mission
    • Our History
    • Why We're Different
    • Privacy Statement
    • Careers
    • Our People
    • Our History
  • Services
    • Expert Services
    • Cybersecurity
    • Incident Management
  • Interhack News
    • News from 2025
    • News from 2024
    • News from 2023
    • News from 2022
    • News from 2021
    • News from 2020
    • News from 2019
    • News from 2018
    • News from 2017
    • News from 2016
    • News from 2015
    • News from 2014
    • News from 2013
    • News from 2012
    • News from 2011
    • News from 2010
    • News from 2009
    • News from 2008
    • News from 2007
    • News from 2006
    • News from 2005
    • News from 2004
    • News from 2003
    • News from 2002
    • News from 2001
    • News from 2000
    • News from 1999
  • Publications
    • Protection of Data and Prevention: Advice for Chief Executive Officers, Managers, and Information Technology Staff
    • Forensic Analysis of Mobile Devices
    • Incident Handling: When the Breach Occurs
    • Discovery Beyond Documents
    • Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
    • The Next Twenty-Five Years in Computer Science
    • Introduction to Forensic Computing
    • Electronic Evidence in Criminal Defense
    • Anatomy of Online Fraud: How Thieves Targeted eBay Users But Got Stopped Instead
    • Identity Theft: If We Didn't Dodge a Bullet
    • Security: Built-In or Bolt On?
    • Spying on Spyware
    • HIPAA Security HyperRule
    • Understanding Information Assurance Services
    • Cryptography in Practice
    • Infosec: Friend or Foe?
    • Discovery Beyond Documents
    • Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
    • Incident Handling: When the Breach Occurs
    • Mobile Devices: Evidentiary Gold Mine or Empty Mine Shaft?
    • Spector Professional Review and Commentary
    • Comments on Guidelines on Securing Public Web Servers
    • PCFriendly Enables DVD Backchannels
    • Bank One Online Puts Customer Account Information at Risk
    • A Failure To Communicate: When a Privacy Seal Doesn't Help
    • Getting To Know You (Intimately): Surreptitious Privacy Invasion on the E-Commerce Web
    • DoubleClick Opt Out Protocol Failure == Opt In
    • Opting In, By Accident
    • Why Anti-Virus Software Cannot Stop the Spread of Email Worms
    • Shibboleth: Private Mailing List Manager
    • What's Related? Everything but your privacy
    • SKIPJACK and KEA Algorithm Specifications
    • Firewalls FAQ
    • National Security Action Memorandum 160
    • A Brute Force Search of DES Keyspace
    • Snake Oil Warning Signs: Encryption Software to Avoid
    • What DESCHALL Means
    • Analysis of Compact Disc Digital Rights Management
    • Pelendur: Steward of the Sysadmin
    • Address Munging Considered Harmful
    • Creating an Environment for Reusable Software Research: A Case Study in Reusability
    • "Write Once Run Anywhere'': Why It Matters
    • Smalltalk FAQ
    • Unix User Hierarchy
    • Hierarchy of TeXnical Accomplishments
  • Contact
You are here:
  1. Home
Item type
New items since

Search results

RSS Subscribe to an always-updated RSS feed.

155 items matching your search terms.
Sort by relevance date (newest first) alphabetically
  1. Matt Curtin Is Featured Speaker for Open Source Club at OSU

    Curtin shares first hand experience of a forensic computer scientist with students, many from the Department of Computer Science and Engineering.

    Located in Interhack News / News from 2012
  2. Matt Curtin speaks to state appellate judges

    Matt Curtin speaks to state appellate judges at the Wisconsin Appellate Court Specialty Seminar in Waukesha, Wisconsin, on the topic, Electrons Are the New ...

    Located in Interhack News / News from 2008
  3. Matt Curtin speaks to the Columbus Bar Association in Columbus, Ohio

    On April 24, 2008, Interhack founder Matt Curtin speaks to the Columbus Bar Association in Columbus, Ohio, on the topic Paper As Obsolete: What Every Lawyer ...

    Located in Interhack News / News from 2008
  4. Matt Curtin Tells Crypto War Stories at Ohio University

    (February 1, 2011) Matt Curtin presents "Cracking the Data Encryption Standard" to the student group Telecommunications Systems Management Association (TSMA) ...

    Located in Interhack News / News from 2011
  5. Matt Curtin to be on Big Data Panel at ILTA conference

    C. Matthew Curtin will be on the Big Data Panel at the Ohio Statewide Litigation Support Meeting for the International Legal Technology Association (ILTA) in ...

    Located in Interhack News / News from 2013
  6. Matt Curtin to be the keynote at Computing Sciences Conference

    Matthew Curtin will be the keynote speaker at the Midwest Consortium for Computing Sciences in Colleges (CCSC) conference held at the University of Findlay.

    Located in Interhack News / News from 2013
  7. Matt Curtin to present at Financial Aid Administration Conference

    Matt Curtin will give his perspective as a computer forensic analyst on fraud in the financial aid industry at the OASFAA Conference on May 7.

    Located in Interhack News / News from 2013
  8. Matt Curtin to present to local Criminal Defense Lawyers Association

    Matt Curtin to present to the Central Ohio Association of Criminal Defense Lawyers (COACDL) February 27 on authenticating evidence to safeguard against faulty ...

    Located in Interhack News / News from 2013
  9. Matt Curtin to present to Ohio Management Lawyers Association

    Interhack founder Matt Curtin will present to the OMLA April 19 on the topic of managing electronic discovery in employment litigation.

    Located in Interhack News / News from 2013
  10. Matt Curtin to speak at Ohio University to student telecommunications group

    Interhack founder Matt Curtin will be traveling to Ohio University's campus to give a presentation to the Telecommunications Systems Management Association ...

    Located in Interhack News / News from 2013
  • « Previous 10 items
  • 1
  • ...
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • 16
  • Next 10 items »
Copyright © 2000-2025 Interhack Corporation

Interhack, interhack.net, interhack.com, and the Interhack logo are trademarks of Interhack Corporation.

  • Site Map
  • Accessibility
  • Contact