How to analyze different types of devices and find connections between them
Modern digital forensics and incident response cases may involve quite different types of devices. The variety of electronic…
Modern digital forensics and incident response cases may involve quite different types of devices. The variety of electronic…
The Windows Subsystem for Linux (WSL) was first included in the Anniversary Update of Microsoft’s Windows 10 operating…
Guys, we have created a Telegram group, where we will do our best to answer all your questions. We will be very happy if you…
LiMEaide is a python application designed to remotely dump RAM of a Linux client and create a volatility profile for later a…
In this post guys from Sandfly Security describe the process of detection poisoned Linux binaries. You will learn about the …
In this post John Booth describes how to detect encoded or obfuscated command-lines used by attackers on Linus hosts. A…
Craig Rowland from Sandfly Security goes over simple tactics and techniques you can use to assess a Linux host for signs of …
Hal Pomeranz has started a series of blog posts about forensic analysis of XFS file system. XFS is becoming more common…
In this video, Belkasoft discusses new features of Evidence Center version 9.0 such as new reporting, deduplication, PhotoDN…
Lee Whitfield has presented Forensic 4:cast Awards 2018 nominees. Oleg’s book – Windows Forensics Cookbook …
Login