Blog

Latest news around the world

30

Apr'14

Can you hack a modern airliner?

What may have happened to MH370? By Colin Renouf Why read this article With all of the media interest in …

Read More

23

Apr'14

IMPROVING DATABASE APPLICATIONS AND DATABASE INDEX PERFORMANCE

by Robert Vanaman M.B.A., M.S. You can find this article in SQL SERVER COMPENDIUM – FORENSICS ANALYSIS DATABASE APPLICATIONSPERFORMANCE Astonishingly, …

Read More

17

Apr'14

HOW TO INVESTIGATE FILES WITH FTK IMAGER

by Mark Stam   The Master File Table or MFT can be considered one of the most important files in …

Read More

16

Apr'14

CASE STUDY: DESTROYING DATA – IT’S NOT AS EASY AS YOU THINK

by Mark Garnett What you will learn: Forensic imaging techniques MFT file structure MFT file entry recovery How people attempt …

Read More

15

Apr'14

THE EVOLUTIONARY APPROACH TO DEFENSE

by Filip Nowak The evolutionary approach to IT security seems to be the most natural and efficient way to resist …

Read More

08

Apr'14

Is Cybersecurity Officially Broken?

by Larry Karisny  "Reprint from Digital Communities Magazine"   NSA disclosures, RSA conference scientist boycotts,University white papers and even cybersecurity supplier contest challenges are …

Read More

04

Apr'14

An Introduction to Skype Forensics

By: Rohit Shaw Skype is an application that enables voice and video calls, instant messaging, file transfers, and screen sharing …

Read More

03

Apr'14

PREEMPTIVE FORENSICS An introspective with The Dan Solomon

by Robert Vanaman, MBA, MS Robert:Dan, would you agree, as asserted by Chris Hargreaves in his article “Pre-Emptive Digital Forensics …

Read More

01

Apr'14

CATCHING GHOSTS OF THE AIR INVESTIGATING TRADITIONAL WEP ATTACKS

by Nipun Jaswal, CISE, C|EH, OSWP, M.tech Wireless attacks are so common these days, and if a hacker finds a …

Read More

31

Mar'14

OVER THE RAINBOW TABLE AN OVERVIEW OF SYMMETRICAL AND ASYMMETRICAL PASSWORD ENCRYPTIONS

by M.L. Smith Since 1976, the Data-Encryption-Standard has been the norm for protecting passwords. However, from its inception, academics have …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013