MENU

Posts Tagged ‘Cybersecurity’

Most Recent
 
Read More
2018-04-22

Cloud Forensics: How to acquire a Facebook account

Today we will tell about how to acquire a Facebook account. Of course, you can use commercial tools such as: Cloud Analyzer (Cellebrite), Cloud Extractor (Oxygen Forensics), E3 Platform (Paraben Corporation), etc. However, this can be done manually and in this article will show how to do this step-by-step.

2307
 
Read More
2018-04-16

Creating a digital forensic laboratory: Tips and Tricks

Creating a digital forensic laboratory is a responsible step. The effectiveness of the laboratory depends on what software, hardware and equipment will be purchased.

DFC specialists took part in the creation and upgrade of several digital forensic laboratories owned by state organizations and private entities and today they will share their tips and tricks.

9163
 
Read More
2018-04-05

How to update MacOS by Terminal

A typical user does not need to use the command line in OS X, since most of his functions cover what is implemented in the system’s graphical interface. Another thing is when you need some hidden features that are not available from the GUI. There is a wide range of commands that you can use instead of your graphic counterparts. Sometimes they provide additional functions that are usually not available.

218
 
Read More
2018-04-02

Bypassing AppLocker with PowerShell Scripts

Several years ago, Microsoft announced a new tool – AppLocker, which, according to the developers, was designed to increase the level of security when working in Windows. Unfortunately, the way was uncovered, in which you can run any application in the system bypassing AppLocker and without administrator rights.

356
Latest Headlines
Try a different filter
Trending Topics
Digital Forensics
Articles
Android
windows forensics
Incident Response
Cybersecurity
windows 10 forensics
News
Online Scam
Top Stories
Try a different filter
Right Now
Try a different filter
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.