Recycle Bin Bypass
Description One of the interesting Anti-Forensic technique where the user can simply delete the files original locations by just pressing “Delete” key and are not sent to the Recycle Bin at all.
Description One of the interesting Anti-Forensic technique where the user can simply delete the files original locations by just pressing “Delete” key and are not sent to the Recycle Bin at all.
A secret string of characters is used for the authentication process in various applications is called a password. It is used to gain access to various accounts, repositories, and databases but at the same time, protects them from unauthorized access. As much as it is important to create an undecipherable password, it is important for it …
Introduction Forensic Imaging of MAC OS is always a challenge among forensic investigators. physical access of MAC hdd by taking off it’s back lid is always a challenging task and may lead to it’s warranty issues. as per my experience very few people would like to choose this option. so now tool like ftkimager command …
Confidentiality, integrity and availability, known as the CIA triad (Figure 1), is a guideline for information security for an organization. Confidentiality ensures the privacy of data by restricting access through authentication encryption. Integrity assures that the information is accurate and trustworthy. Availability ensures that the information …
Read more “Confidentiality, Integrity, and Availability (CIA)”
The Official Book for the EnCE® Exam If you’re getting ready for the new EnCE exam, this is the study guide you need. Updated to cover EnCase® Forensic v7, this new edition prepares you for both the Phase I and Phase II exams. You’ll learn everything from identifying and searching hardware and files systems …