Анализ Хидеаки Ихара по лог-файлам NTFS $LogFile and DataRun NTFS $LogFile and ObjectID Олег Афонин об ApplePay — Analysing Apple Pay Transactions
Компьютерно-техническая криминалистика
Анализ Хидеаки Ихара по лог-файлам NTFS $LogFile and DataRun NTFS $LogFile and ObjectID Олег Афонин об ApplePay — Analysing Apple Pay Transactions
Forensics Quickie: Methodology for Identifying Linux ext4 Timestamp Values in debugfs `stat` Command Data Carving with Foremost Detecting Tor communications Cloud Forensics in Breach Investigations Anatomy of the thread suspension mechanism in Windows Hasty Scripts: Capture Google Activity Log Forensic Implications of Software Updates: iOS, Android, Windows 10 Mobile Forensic Case Files: Employee Hard Drive…
Recovering deleted internet history from System Restore points Windows Console Command History: Valuable Evidence for Live Response Investigation iOS Imaging on the Cheap! – Part Deux! (for iOS 10 & 11) Forensically Collecting Emails — 5 Things to Know Evidence acquisition workflow in 5 steps Defending Against an Advanced Persistent Threat (APT) 8 Steps to…
Новости компьютерной криминалистики How to mount Mac APFS images in Windows Mounting an APFS image in Linux Volatility plugin to extract BitLocker Full Volume Encryption Keys Database Reverse Engineering ADRecon Overview A List of Incident Response sources Aaron at DigitalResidue provides a primer on virtual memory and explains a few Volatility plugins damn blogger.com Mobile…
Новые исследования в компьютерной криминалистике Adventures in Laptop Forensics Another OSX.Dok dropper found installing new backdoor Snake malware ported from Windows to Mac HandBrake Hacked! Super Free Music Player in Google Play is malware: a technical analysis Police Backlogs—Is Throwing Bodies at the Problem the Answer? Practical Packet Analysis Photo Contest