Computer and Hacking Forensics Notes

1st RESPONDER

X [view]

By: L.E.X.3.N.I.T.Y | Related Lesson: | Modified: May 13, 2017

DIGITAL EVIDENCE

Digital Evidence:is any probative information stored or transmitted in digital form that a party to a court case may use at trial. TYPES: Volatile Non-volatile Transient data Fragile Temporary Active Data Archived Backup [view]

By: L.E.X.3.N.I.T.Y | Related Lesson: | Modified: May 13, 2017

SEARCHING/SEIZING

is the very complex subject which is heavily focused of legalities and legal terminology. [view]

By: L.E.X.3.N.I.T.Y | Related Lesson: | Modified: May 13, 2017

MD5

MD5sum Lab: This tool determines the state of integrity of a given file, whereas that state is defined at changed, modified, or altered.   [view]

By: L.E.X.3.N.I.T.Y | Related Lesson: | Modified: May 13, 2017

Logical Drive System

Fat, Fat32 NTFS EXT2, EXT3 EFS, JFS, REISER, ETC CD ROM RAID LEVELS [view]

By: varun | Related Lesson: | Modified: May 12, 2017

Net statistics

Cmd Net statistics server Net statistics workstation [view]

By: ESTCOR | Related Lesson: | Modified: May 12, 2017

net session

Cmd Run as admin Net session [view]

By: ESTCOR | Related Lesson: | Modified: May 12, 2017

kdirstat

apt-get install kdirstat [view]

By: ESTCOR | Related Lesson: | Modified: May 12, 2017

root@kali: /etc

netstar -a | grep syslog cd /etc ls *log* [view]

By: Ro | Related Lesson: | Modified: May 11, 2017

Searching and Seizing

Overview of Searching and Seizing be familiar with 4th amendment = against illegal searches and seizures.  – Patriot Act Have to define what’s in scope and what’s out of scope. implied exigent circumstances: the implied urgency of [view]

By: cwolfe | Related Lesson: | Modified: May 11, 2017

« First ‹ Previous 1 101 191 199 200 201 202 203 211 301 401 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel