MENU

Posts Tagged ‘linux’

Most Recent
 
Read More
2018-02-11

Bruteforcing Linux Full Disk Encryption

Users typically use simple passwords. This is what computer attackers use. They calculate the password necessary for penetrating the network by selection.

150
 
Read More
2018-02-03

Carving utmp records

This article laconically describes cutting utmp records for intrusion analysis. These files are not text files, but sometimes the files have empty data. That’s why an attacker can delete these files if he has administrative privileges.

121
 
Read More
2018-01-28

Analyzing the Linux boot process

Alison Chaiken has shared an article ‘Analyzing the Linux boot process’.

The article can help you understand how to the systems work and it is great preparation for dealing with the inevitable failures.

130
 
Read More
2018-01-22

Monitoring tools for Linux

It’s hard work to monitor and debug performance problems with Linux. If you have the right tools, then it will be easier to work. This presentation describes a list of Linux monitoring tools on the Internet.

 

101
Latest Headlines
 
Read More
946protect your smartphone from malware
 
Read More
 
Read More
939

Trending Topics
digital forensics
Articles
computer forensics
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.