[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/g2/ - G2 - Technology - Less rules, More fun

Better than /tech/ and /g/

Catalog

8chan Bitcoin address: 1NpQaXqmCBji6gfX8UgaQEmEstvVY7U32C
The next generation of Infinity is here (discussion) (contribute)
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 1 per post.


File: 1440300513493.jpeg (5.61 KB, 339x149, 339:149, fingerprint.jpeg)

7afd6c No.21

I've recently got into forensics and it's pretty intersesting. If you've ever wanted to go "under the hood" of comoputers then you should try it out.

Im currently reading this book: The basics of digital forensics by John Sammons.

Torrent: torcache.net/torrent/1183ABCBDE21DD46E4AF0A164B69B34F6E91B505/%5Bkat.cr%5Dthe.basics.of.digital.forensics.torrent

This website also gives some tutorials on common aquisition methods ,among other security topics: http://resources.infosecinstitute.com

246527 No.24

I used a tool called carve to recover some files a long time ago but that's about as far as I have gone into that area.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]