Best 12 application for password cracking with details 2021.

Spread the love

Spread the love         A secret string of characters is used for the authentication process in various applications is called a password. It is used to gain access to various accounts, repositories, and databases but at the same time, protects them from unauthorized access. As much as it is important to create an undecipherable password, it is …

Forensic Imaging of MAC OS 10.13 -High Sierra

Forensics
Spread the love

Spread the love        Introduction Forensic Imaging of MAC OS is always a challenge among forensic investigators. physical access of  MAC hdd by  taking off it’s back lid is always a challenging task and may lead to it’s warranty issues. as per my experience very few people would like to choose this option.  so now tool like  …

Confidentiality, Integrity, and Availability (CIA)

Spread the love

Spread the love                          Confidentiality, integrity and availability, known as the CIA triad (Figure 1), is a guideline for information security for an organization. Confidentiality ensures the privacy of data by restricting access through authentication encryption. Integrity assures that the information is accurate and trustworthy. Availability ensures that …