az4n6.blogspot.com
Another Forensics Blog: Timestomp MFT Shenanigans
http://az4n6.blogspot.com/2014/10/timestomp-mft-shenanigans.html
The primary purpose of this blog is to aid the occasional Google researcher in the field of computer forensics. The content may not be ground breaking or earth shattering, but simply a way to pass along what I hope is useful information. Tuesday, October 7, 2014. Basically there are two "sets" of timestamps that are tracked in the MFT. These two "sets" are the $STANDARD INFORMATION and $FILE NAME. Both of these track 4 timestamps each - Modified, Access, Created and Born. Or if you prefer - C...Most time...
abax.be
Backdoor - Digital Forensics lexicon
http://abax.be/lexicon/backdoor
Computer Fraud Investigation, Email analysis, Identity theft, Intellectual Property Theft, Forensic Auditing, Data recovery. Kwaadaardige code die zichzelf installeert op een computer om de aanvaller toegang te bieden tot het systeem. Backdoors geven de aanvaller(s) toegang tot een systeem met weinig of geen authenticatie en laten toe om commando’s en programma’s uit te voeren op het geïnfecteerde systeem. Comments on this entry are closed. Bedrijfsrecherche – KMP and Partners. News Update: EU-privacywaa...
abax.be
Unrestricted rightclick on ATM - Digital Forensics
http://abax.be/unrestricted-rightclick-on-atm
Computer Fraud Investigation, Email analysis, Identity theft, Intellectual Property Theft, Forensic Auditing, Data recovery. Unrestricted rightclick on ATM. Unrestricted rightclick on ATM. Haha, at first this video looks genuine, what the f* *, an ATM. But take a good look at the first seconds of the video, you’ll see the logo of “Positive Hack Days” 😉. So, now I’m wondering how many people will get fooled by this video 😉. Comments on this entry are closed. A $300 App Can Hack It. News Update: EU-priva...
abax.be
One person's digital trash is another's digital treasure. - Digital Forensics
http://abax.be/one-persons-digital-trash-is-anothers-digital-treasure
Computer Fraud Investigation, Email analysis, Identity theft, Intellectual Property Theft, Forensic Auditing, Data recovery. One person’s digital trash is another’s digital treasure. One person’s digital trash is another’s digital treasure. Comments on this entry are closed. Previous post: HTTP-Botnets: The Dark Side of an Standard Protocol! Next post: Hoe verlies van elektronisch bewijsmateriaal vermijden. Bedrijfsrecherche – KMP and Partners. BIG BIG shame on jou @3Suisses. Subscribe to our Newsletter.
abax.be
Lexicon - Digital Forensics
http://abax.be/lexicon
Computer Fraud Investigation, Email analysis, Identity theft, Intellectual Property Theft, Forensic Auditing, Data recovery. Automated teller machine, Automated Banking Machine. DDoS, short for Distributed Denial of Service, is a type of DoS attack where multiple compromised systems — which are usually infected with a Trojan — are used to target a single system causing a Denial of Servive (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems [&hell...Digital Foren...
abax.be
Drugscriminelen hacken computers van Antwerpse containerbedrijven om cocaïne te smokkelen - Digital Forensics
http://abax.be/hacken-computers-antwerpse-containerbedrijven-om-cocaine-te-smokkelen-antwerpen-haven-drugs
Computer Fraud Investigation, Email analysis, Identity theft, Intellectual Property Theft, Forensic Auditing, Data recovery. Drugscriminelen hacken computers van Antwerpse containerbedrijven om cocaïne te smokkelen. Drugscriminelen hacken computers van Antwerpse containerbedrijven om cocaïne te smokkelen. De onderzoeksrechter in België heeft in dit onderzoek vorige week twee verdachten aangehouden. Het gaat om twee ICT-specialisten die ervan verdacht worden dat zij de hoogtechnologische kant van...Fraude...
abax.be
Drugsmaffia bespioneert havenbedrijven - Het Nieuwsblad - Digital Forensics
http://abax.be/drugsmaffia-bespioneert-havenbedrijven-het-nieuwsblad
Computer Fraud Investigation, Email analysis, Identity theft, Intellectual Property Theft, Forensic Auditing, Data recovery. Drugsmaffia bespioneert havenbedrijven – Het Nieuwsblad. Drugsmaffia bespioneert havenbedrijven – Het Nieuwsblad. Via Drugsmaffia bespioneert havenbedrijven – Het Nieuwsblad. Comments on this entry are closed. Previous post: Drugscriminelen hacken computers van Antwerpse containerbedrijven om cocaïne te smokkelen. Next post: Phone Metadata Proves a Powerful Tool. News Update: Europ...
techno-preventie.be
Inbraakbeveiliging - Bouwkundige technopreventieve maatregelen
http://www.techno-preventie.be/inbraakbeveiliging---bouwkundige-technopreventieve-maatregelen.html
1001 tips over inbraakbeveiliging en inbraakpreventie. Informatieve website met technische tips en informatie ter voorkoming van diefstallen, inbraken,. Overvallen, ramkraken, bedrijfsdiefstallen, bedrijfsfraude, oplichting en gelijkaardige vormen van criminaliteit. Producten bouwkund. beveiliging. Producten elektron. beveiliging. Bouwkundige inbraakbeveiliging en maatregelen tegen inbraak en diefstal. Bouwkundige maatregelen tegen inbraak en diefstal. Maak uw woning of bedrijf inbraakveilig! Bouwkundige...
cheeky4n6monkey.blogspot.com
Cheeky4n6Monkey - Learning About Digital Forensics: Google-ei'd ?!
http://cheeky4n6monkey.blogspot.com/2014/10/google-eid.html
The (Badly) Illustrated Musings of a Cheeky Forensics Monkey . Friday, 10 October 2014. Hmmm I seem to be having some trouble focusing after this latest post. Ever looked closely at a Google search URL and seen a weird "ei" parameter in there? While it doesn't seem to occur for every search, when it does, that "ei" parameter contains an encoded Unix UTC timestamp (and other things Google only knows). Interpreting this artifact can thus allow forensic analysts to date a particular search session. The "ei"...
SOCIAL ENGAGEMENT