Category: IT Forensics


Analysis of a Linux virus written in Bash

How to find and remove malware from Linux

Bless manual (hex editor)

How to mount disk images for viewing and editing files (SOLVED)

Programs for extracting information from the Windows registry

How to open disks of virtual machines and download and upload files to them (SOLVED)

How NOT to Do Phishing Attacks (Part 2)

How NOT to do phishing attacks (CASE)

How to find out which USB devices were plugged to Linux

How to install and run Apache Real Time Logs Analyzer System (ARTLAS)