Digital forensics

Top 5 open-source and commercial secure code review tools

Code review is an indispensable part of the development process. And as such, code review tools are an indispensable part of the development team. Below is a

QA, Certification, & Accreditation in Computer Forensics

Introduction The purpose of digital forensics is to answer one or more investigative or legal questions, with the purpose of using the evidence to disprove o

Memory forensics and analysis using volatility

Volatility is one of the best open source software programs for analyzing RAM in 32 bit/64 bit systems. It supports analysis for Linux, Windows, Mac, and And

Free & open source rootkit and malware detection tools

A lot of sniffers, rootkits, botnets, backdoor shells and malwares are still on the wild today, which are used by malicious attackers after successfully pawn

Computer forensics investigation – A case study

Disclaimer: We have not performed any live investigation. This was a part of our university assignment, wherein we assumed the roles of forensics investigato

Computer Forensics: Administrative Investigations and the CCFE Exam

Introduction One of the best ways to measure and evaluate the technological progressions of the modern age is to examine the evolution of digital forensics.

Computer Forensics: Multimedia and Content Forensics

Introduction Probably one of the most exciting and relevant fields in the computing world today is forensics. Much like its criminal namesake, computer foren

Computer Forensics: Intellectual Property Investigations and the CCFE

Introduction The characteristics of cybercrime are always shifting, just like the laws that are passed to handle cybercrime. When something goes awry in the

Computer Forensics: Embedded Device Analysis and Examination Steps

Introduction Nowadays, digital devices are everywhere and everything is connected via the Internet. These devices include digital watches, gaming consoles, m

Wireshark: An open-source forensic tool

"Today we are at a defining moment in the evolution and growth of the Internet. Large-scale data breaches, uncertainties about the use of our data, cybercrim