Digital forensics

Digital forensics
This is a small tool that can be used to investigate Skype user accounts stored in your PC. First of all, let's learn how to investigate data manually. This

March 31, 2014
Osanda Jayathissa
Digital forensics
Introduction to Docker In this article, we'll first introduce Docker and try to explain how it works. After setting the stage, we'll simulate the file upload

February 26, 2014
Dejan Lukan
Digital forensics
An icon on the Windows desktop represents a directory in which deleted files are temporarily stored. This enables you to retrieve files that you may have acc

February 12, 2014
Warlock
Digital forensics
Skype is an application that enables voice and video calls, instant messaging, file transfers, and screen sharing between users. Millions of people download

February 10, 2014
Warlock
Digital forensics
Introduction When discussing cloud forensics, we're actually talking about the intersection between cloud computing and network forensic analysis. Cloud comp

January 02, 2014
Dejan Lukan
Digital forensics
Digital forensics is the process of identifying and collecting digital evidence from any medium, while preserving its integrity for examination and reporting

December 30, 2013
Ryan Mazerik
Digital forensics
1. Introduction In this article, I'm going to focus on prefetch files, specifically, their characteristics, structure, points of interest in terms of forensi

November 21, 2013
Ivan Dimov
Digital forensics
The SIM (subscriber identity module) is a fundamental component of cellular phones. It also known as an integrated circuit card (ICC), which is a microcont

November 19, 2013
Warlock
Digital forensics
Checksec The checksec.sh file is a Bash script used to verify which PaX security features are enabled. The latest version can be downloaded with the wget com

November 04, 2013
Dejan Lukan
Digital forensics
Configuring PaX with Grsecurity We've already briefly discussed PaX, but now it's time to describe it in detail. PaX provides the following security enhancem

October 31, 2013
Dejan LukanIn this series
- Kali Linux: Top 5 tools for digital forensics
- Digital forensics and cybersecurity: Setting up a home lab
- Top 7 tools for intelligence-gathering purposes
- iOS forensics
- Snort demo: Finding SolarWinds Sunburst indicators of compromise
- Memory forensics demo: SolarWinds breach and Sunburst malware
- Digital forensics careers: Public vs private sector?
- Email forensics: desktop-based clients
- What is a Honey Pot? [updated 2021]
- Email forensics: Web-based clients
- Email analysis
- Investigating wireless attacks
- Wireless networking fundamentals for forensics
- Protocol analysis using Wireshark
- Wireless analysis
- Log analysis
- Network security tools (and their role in forensic investigations)
- Sources of network forensic evidence
- Network Security Technologies
- Network Forensics Tools
- The need for Network Forensics
- Network Forensics Concepts
- Networking Fundamentals for Forensic Analysts
- Popular computer forensics top 19 tools [updated 2021]
- 7 best computer forensics tools [updated 2021]
- Spoofing and Anonymization (Hiding Network Activity)
- Browser Forensics: Safari
- Browser Forensics: IE 11
- Browser Forensics: Firefox
- Browser forensics: Google chrome
- Webinar summary: Digital forensics and incident response — Is it the career for you?
- Web Traffic Analysis
- Network forensics overview
- Eyesight to the Blind – SSL Decryption for Network Monitoring [Updated 2019]
- Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2019]
- Computer forensics: FTK forensic toolkit overview [updated 2019]
- The mobile forensics process: steps and types
- Free & open source computer forensics tools
- An Introduction to Computer Forensics
- Common mobile forensics tools and techniques
- Computer forensics: Chain of custody [updated 2019]
- Computer forensics: Network forensics analysis and examination steps [updated 2019]
- Computer Forensics: Overview of Malware Forensics [Updated 2019]
- Incident Response and Computer Forensics
- Computer Forensics: Memory Forensics
- Comparison of popular computer forensics tools [updated 2019]
- Computer Forensics: Forensic Analysis and Examination Planning
- Computer forensics: Operating system forensics [updated 2019]
- Computer Forensics: Mobile Forensics [Updated 2019]
- Computer Forensics: Digital Evidence [Updated 2019]
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!