Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 496 Signed, Sealed, Exploited
12:35
12:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:35
…
continue reading
…
continue reading
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”
13:47
13:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:47
…
continue reading

1
DFSP # 490 Unveiling the USN Journal
12:13
12:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:13
…
continue reading
…
continue reading
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:51
…
continue reading
…
continue reading
…
continue reading
This week, I delve into the Windows BAM artifact, unraveling its forensic significance and exploring how it can unlock critical insights in digital investigations.
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading