Posts Tagged ‘Log Analysis’

Most Recent
 
Read More
2017-11-06

Log Files Analysis

Log Files are so useful, you’ll be so damn excited that you have them. Because these are files in which certain user actions or programs are logged on the server.

134
 
Read More
2017-10-28

Log Analysis with Woodpile

This article discusses the latest version of Woodpile. Its starting point is a logarchive, which it will make for you, or you could examine one brought over from another Mac, or possibly an iOS device. It analyses data on the logs which have been gathered over the last three months or so (macOS), so that you can select one of the processes which has made significant numbers of log entries in that period.

 

40
 
Read More
2017-10-19

WMI log analysis

Carlos Perez previously talked about how Microsoft expanded the WMI log in the latest versions of its client and server operating systems. He decided to describe what kind of new version events were added to special versions of events 6.10 for registering persistent events in this article.

 

76
 
Read More
2017-10-14

Intrusion Detection and Log Analysis

Having the ability to detect network activity pointing to an intrusion attempt on the server, the system administrator can take appropriate measures in time. That’s why there are intrusion detection systems.

 

75
Latest Headlines
 
Read More
67
 
Read More
114
 
Read More
35

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
iOS forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Chip-off Technique in Mobile Forensics
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Android forensic analysis with Autopsy