Posts Tagged ‘encryption’

Most Recent
 
Read More
2018-02-11

Bruteforcing Linux Full Disk Encryption

Users typically use simple passwords. This is what computer attackers use. They calculate the password necessary for penetrating the network by selection.

142
 
Read More
2018-01-12

Unbreakable encryption is a public safety issue

Now encryption is a hot topic in security, just like many times in the past few decades. Most of the latest surge in interest in cryptography and encryption was due to Edward Snowden’s revelations regarding methods and tools.

133
 
Read More
2017-12-14

Attack encrypted systems overview

Encryption was originally used only for the transfer of confidential information. However, subsequently the information was encrypted for the purpose of storing it in unreliable sources.

83
 
Read More
2016-11-25

Gen info about Android N Encryption

Over the past few years we have heard about the smartphone encryption – this is an area where the details matter. Drive Encryption date back at least to the beginning of 1990 – ies. The actual encryption can be done in one of two different ways (Full Disk Encryption (FDE) system based on encryption file (NEP) system). Most of the software for commercial PC disk encryption historically decided to use the approach, full disk encryption (FDE). Basically it’s just a question of expediency: FDE simply much easier to implement.

179
Latest Headlines
 
Read More
794
 
Read More
415
 
Read More
815

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics
Page generated in 2.277 seconds. Stats plugin by www.blog.ca