Blog Posts - Computer Forensics



Donnie Isley

...

Forensic Science Scholarships – Offered by AFTE

Forensic science scholarships give chance to those interested in pursuing career in forensic to pursue higher education level in the subject. Before we skip forward to example, the requirements needed, and application steps of forensic science schola...
by Start Grants on Jul 18, 2014

E-Investigations Provides a Case Study on How Computer Forensics can Detect Forged Email

E-Investigations, a Houston, Texas based digital forensics firm, used special computer forensic techniques to decode separate parts of the same email to prove that a forged email was produced as the original in a recent case. The MSG file produced in...
by Mafia Today on May 6, 2013

E-Investigations Provides a Case Study on How Computer Forensics can Detect Forged Email

E-Investigations, a Houston, Texas based digital forensics firm, used special computer forensic techniques to decode separate parts of the same email to prove that a forged email was produced as the original in a recent case. The MSG file produced in...
by Mafia Today on May 6, 2013

New Computer Forensics Imaging System Reduces Complexity and Increases Speed

CyanLine, a computer forensics and network security solutions company, has launched its latest innovation in computer forensic technology—the Fast Disk Acquisition System (FDAS). Specifically engineered for high-speed imaging, the new device consol...
by Mafia Today on May 1, 2013

New Computer Forensics Imaging System Reduces Complexity and Increases Speed

CyanLine, a computer forensics and network security solutions company, has launched its latest innovation in computer forensic technology—the Fast Disk Acquisition System (FDAS). Specifically engineered for high-speed imaging, the new device consol...
by Mafia Today on May 1, 2013

Korupsi – Wikipedia bahasa Indonesia, ensiklopedia bebas

Korupsi – Wikipedia bahasa Indonesia, ensiklopedia bebas. Korupsi (bahasa Latin: corruptio dari kata kerja corrumpere yang bermakna busuk, rusak, menggoyahkan, memutarbalik, menyogok) atau rasuah adalah tindakan pejabat publik, baik po...

Korupsi – Wikipedia bahasa Indonesia, ensiklopedia bebas

Korupsi – Wikipedia bahasa Indonesia, ensiklopedia bebas. Korupsi (bahasa Latin: corruptio dari kata kerja corrumpere yang bermakna busuk, rusak, menggoyahkan, memutarbalik, menyogok) atau rasuah adalah tindakan pejabat publik, baik po...

Advanced Malware Analysis Training Session 1 – Detection & Removal of Malwares

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Nagareshwar and Monnappa delivered an excellent session on how to remove and detect Malware with practical demonstrations. This is part of our [...]...
by SecurityXploded Blog on Dec 16, 2012

How To Become a Computer Forensics Expert

What a Computer Forensics Investigator needs to understand A Computer Forensics Investigator needs to be able to understand the process of investigating a cybercrime, the laws involved and the details in obtaining the necessary authorisation to p...
by indiatriks on Nov 29, 2012

Released New Tool – Linkedin Password Decryptor

Linkedin Password Decryptor is the free tool to instantly recover Linkedin passwords from all the popular web browsers. Currently it supports Linkedin password recovery from following browsers Internet Explorer Firefox Google Chrome Flock Browser App...
by SecurityXploded Blog on Nov 21, 2012

Reversing Training Session Part 12 – Rootkit Analysis

ere is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Monnappa has delivered one of the best session of our entire series on ‘Rootkit Analysis’. This is part of our ongoing FREE [...]...
by SecurityXploded Blog on Oct 14, 2012

Released New Tool – FTP Password Kracker

Here comes our new tool – FTP Password Kracker – a free software to help you in recovering the lost FTP password. It uses universal FTP protocol and can recover password from any FTP server. [...]...
by SecurityXploded Blog on Oct 12, 2012

Stealing iPhone Backups using Metasploit

Introduction to iPhone Backups: iTunes is used to back up the iPhone data to a computer. iTunes backup makes a copy of everything on the device like contacts, SMS, photos, calendar, music, call logs, configuration [...]...
by SecurityXploded Blog on Sep 16, 2012

Released JDownloaderPasswordDecryptor v2.0 – Now Supports Latest JDownloader 2 Beta Version

Here is the delightful news for all JDownloader fans.  We have just released new version of JDownloader Password Decryptor v2.0 which supports password recovery from latest JDownloader 2 Beta edition. Over the last couple of [...]...
by SecurityXploded Blog on Aug 27, 2012

Released New Tool – Router Password Kracker

Here comes our 90th Free Tool – Router Password Kracker. It is free tool to quickly recover lost password from Router, Modem or Website protected with HTTP BASIC Authentication. It comes with simple and cool [...]...
by SecurityXploded Blog on Aug 26, 2012

Hire The Best Self Storage Social Network

Self Storage social network has many solutions to save their needs. It can help you keep your valuables safe and possessions in a secure manner. It helps you to live in peace while their values are taken care of. This type of arrangement will protect...
by Pandora on Apr 6, 2012

Why We Need Computer Forensic Investigators Today

The world has become a “digital world”. Every day, clicking our fingers busy or types of computers, laptops, PDAs and more. As a result, the need for computer forensics investigators (ICC) is growing. Some call it where he made his “...
by Pandora on Apr 5, 2012

Released FirePassword v4.5 – First Ever Tool to Recover Passwords of Firefox

FirePassword is first ever tool written to recover the login passwords stored by Firefox. And it was the first tool along with FireMaster when SecurityXploded was launched back in early 2007. Firefox stores all passwords [...]...
by SecurityXploded Blog on Feb 16, 2012

IE Password Decryptor v3.5 is Out Now !!!

IE Password Decryptor is the FREE software to quickly recover the stored passwords from all versions of Internet Explorer. Main Features Recover passwords from all versions of IE from 4.0 to latest version 9.0 One [...]...
by SecurityXploded Blog on Feb 9, 2012


Trending Topics

Close