By Alexander R. Tambascia, D.Sc. Abstract This paper is to cover ways to defeat digital forensics capabilities to recover personal identifiable information (PII), confidential information and/or property intellectual property on personal computer and laptop. This paper will look at simple mechanism, encryption; that can be used to defeat common digital....
Author
Latest Articles
- Our AuthorsFebruary 19, 2018Meet our expert - Cordny Nederkoorn
- BlogJuly 11, 2017For the Love of The Game by Jessica Gulick
- BlogJune 29, 2016Finding Advanced Malware Using Volatility
- BlogJuly 3, 2015Banana Pi Pro - Review