COMPUTER FORENSICS

Download
File
eForensics-Computer_11.pdf

Finally, the first issue of the eForensics Computer has been published for you! We hope you enjoy reading and stay with us for a long time. Become our subscriber and widen your knowledge about digital forensics.

Follow our site – there will be live chat with the expert soon!

INTERVIEW OF THE ISSUE by Vaman Amarjeet, Sean E. and eForensics Editor  Kristinn Guđjónsson – the expert  works on the incident response team at Google – is answering the questions concerning digital forensic and himself. He also describes the usage of tool log2timeline which he has created. The log2timeline was awarded for being The Best Digital Forensics Tool in 2011.

REGISTRY FORENSICS by Arshdeep Chaggar | In this article, Arshdeep Chaggar, shows how to use the registry editor which helps to secure the system.

DNSChanger MALWARE: A NIGHTMARE FOR INTERNET by Praveen Parihar   The article describes DNSChanger, DNS and how to check if DNSChanger has infected our system.

HOW TO – THE BLACK BAG ACQUISITION PART I by Dave Shippers | The first part of a two-part article series, covering the planning, onsite operations and field acquisition steps.

HOW TO – THE BLACK BAG ACQUISITION PART II by Dave Shippers | The second part of two-part article series which covers the offsite/lab acquisition steps to complete the acquisition process.

SAM FILE FORENSICS:  Windows Password audit by Praveen Parihar | The article warns before attackers. Author explains the truth inside password hashing and how an attacker can crack windows password and get the access to the windows computer.

ENCRYPTING YOUR PACKETS by Donald Cinco | Donald Cinco describes what the Encryption is and explains how to secure our privacy. The author describes installing a software to encrypt our data and presents  how to encrypting the packets. He also mention why we should use it.

A STEP BY STEP: DIGITAL FORENSICS PROCESS OF COLLECTING EVIDENCE FROM AN iPhoneby Donovan Farrow | In this article, Donovan Farrow take you through a step by step digital forensic process of collecting evidence from an iPhone. These steps will help you build a defensible process in order to present your data in court.


Download
File
eForensics-Computer_11.pdf

July 30, 2021
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023