Designing a password policy for applications facing the internet has always been a hot issue. Basically, the decision to enforce a set of rules, revolves around how much you trust your users or how much freedom you are willing to concede, when...
Designing a password policy for applications facing the internet has always been a hot issue. Basically, the decision to enforce a set of rules, revolves around how much you trust your users or how much freedom you are willing to concede, when...
To save readers' precious time I would like to emphasize the fact that that this guide applies in raids containing an NTFS formatted volume.
Firstly, keep in mind that this guide serves as a proof of concept, hopefully it will prove...
Below you will find questions that test your knowledge on this subject. I wrote them while I read material mainly from books in file systems and Windows Forensics.
The questions are not meant to be exhaustive and they might even...
Since March 2012, I work as a digital forensics examiner, I examine cases such as copyright infringements, data breaches, hacking (defacing, malware to steal bitcoins, cryptomalware, malware to steal sensitive data e.g. bank passwords), tax...
In March 2024, all backed and client libraries are updated, and the site moved to python3.12 rutime.
In April 2023, this site was migrated to GAE standard environment using python3.10 rutime. All back end libraries have been updated as...
© 2012 - 2024 Armen Arsakian updated atSaturday 01 June 2024Contact: contact at arsakian.com