Date Range
Date Range
Date Range
He is trying to get his foot in the door of computer forensics and has started a very funny blog about it. Hopefully everyone who reads it will have a sense of humor.
Has been hard at work to bring you extra lolz.
The continuing journey as a Computer Forensic Analyst. Saturday, March 16, 2013. A Cold Day in E-Commerce - Guest Post. Here the attacker checked to see if the site has been compromised already. cfm? In this step of the attack we pre.
Computer forensics and random thoughts. Hopefully more of the latter than the former. Monkeytown Secret Cyber Tools List.
A Little Background Info and A Little Legal Jargon. How to identify Malware Behavior.
Topics Related to the Field of InfoSecurity and Forensics. Friday, September 14, 2012. Network Forensics, on the other hand, was exactly what I wanted. This book covers network forensics superbly! Posted by Michael Ahrendt. Thursday, August 2, 2012.
I believe commercial tools have their place, but knowing what is under the hood is too important to ignore. Friday, September 30, 2011. 1 Before you ever ACCEPT the engagement. The next two items go hand in hand. 2 Make sure you know the final result the client is expecting. 3 Make sure you know what YOUR final result is expected to be.
A Girl Unconscious of Life Finds Herself. Tuesday, November 30, 2010. I have algebra and science fair awaiting me. I am not stupid enough to actually mention his name but lets call him Jay. Yeah, so Jay was dating.
Deviant since Mar 4, 2012. This is the place where you can personalize your profile! By moving, adding and personalizing widgets. You can drag and drop to rearrange. You can edit widgets to customize them.
Wednesday, July 7, 2010. Wednesday, June 23, 2010. Happy Summer Days Everyone,. Peace, Love and God.
Well if I ever see the morning. Just like a lizard in the spring. Im gonna run out in the meadow. To catch the silence when it sings. In my head all day.