MENU

Posts Tagged ‘Logs Forensic Analysis’

Most Recent
 
Read More
2018-03-31

Detect Password Spraying With Logs Analysis

In recent years, the press has widely covered high-profile cases related to threats and incidents caused by malicious software. Attackers have become more inventive.

 

1371
 
Read More
2018-03-22

MacOS Unified log

Apple is the market leader. It has brought one of the most fundamental changes since the first public beta of Mac OS X in September 2016. This article provides an overview of the unified registration system in the Sierra and the High Sierra.

451
 
Read More
2018-03-09

Logging in Incident Response

Brad Garnett is the team leader in the Cisco Security Incident Response Services division. He works with organizations around the world. Brad writes about the power of logging in incident response.

96
 
Read More
2018-02-07

PowerShell Cheat Sheet

PowerShell can help a forensic analyst acquiring data of an incident of a field. You can find PowerShell cheat sheet here. The cheat sheet can help you in your work. Unfortunately, we do not know who is the author of the cheat sheet.

767
Latest Headlines
 
Read More
846
 
Read More
437
 
Read More
869

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics
`

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.