Surviving Internet Crimes
The FBI’s Internet Crime Complaint Center (IC3)recently published their 2017 Internet Crime […]
The FBI’s Internet Crime Complaint Center (IC3)recently published their 2017 Internet Crime […]
I’m frequently asked what metrics a security program should be collecting. The […]
It is always better to be forthcoming and proactive with breach notifications. […]
What’s in a name? That which we call a profile By any […]
I recently read an article that included the following quote: “During Chinese […]
Named Key cells are the data structures within the Registry that hold […]
The contents of Registry files are saved in Hive Bins. The previously […]
Every Registry file starts with a 4,096 byte header block. The first 512 […]
After reviewing several other sources, notably from Morgan and Norris, I’ve decided that […]
The first step to forensic analysis of the Registry is knowing where […]
Searching for information about the innards of the Registry returns a whole […]
There are a plethora of keys in the Registry dedicated to telling […]
For many years now I’ve tried to do all my live collection […]
These are useful command lines that are all based on built-in Windows […]
As I was putting together the list of command line tools to […]
There is no contesting that the command line in a Linux/Mac environment […]
I was asked not too long ago about how to extract metadata […]
Plist files are found sprinkled throughout OS X and iOS and contain the various configuration settings and other information of use to the OS and applications.
I got an interesting email today. The headers: Received: from […]
I’m not sure how I missed it when it came out in […]
Many digital cameras will compress their images into JPEG files, making them […]
I was asked what this Fix-up thing was that I mentioned in […]
I needed to walk a directory index for another script I was […]
So, I was having lunch with my good friend Mike. Great guy. […]
This is an EnCase EnScript I wrote a few years back. The […]