Computer and Hacking Forensics Notes

Windows Forensics Regedit vs Regedt32 Comparison Lab

Windows Forensics Regedit vs Regedt32 Comparison Lab This Regedit Comparison lab. This is a demonstration discussion on the difference between the original Regedit which is a 16 bit editor, and the current 32 bit version of this registry editing util [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics PSLoggedOn Lab

Windows Forensics PSLoggedOn Lab The tool PSLogged on is a utility that tells you who across the network is logged on. You’ll learn how provides all specific details about who is logged on and when, particularly when looking defensively at any non- [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics PSFile Lab

Windows Forensics PSFile Lab This is the PSFile lab demonstration. PSFile is a simple little program that verifies files opened remotely, and remotely is the key work here. You’ll learn all about how to accurately test for files opened remotely, ab [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics Net Statistics Lab

Windows Forensics Net Statistics Lab Our next lab in the Windows Forensics course is Net Statistics. This is a great command line utility for determining and confirming system uptime. [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics Net Session Lab

Windows Forensics Net Session Lab Net Sessions is a command line utility that demonstrates for you what sessions are running and how permissions play a significant part in executing that command. So you’ll learn the correct logon protocol to execut [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics Net File Lab

Windows Forensics Net File Lab Net File is a command line utility that demonstrates for you whether or not files are open or closed on the network share drive. The Net File lab shows what you can do remotely to confirm sever-side if files are open, a [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics Kdirstat Lab

Windows Forensics Kdirstat Lab Welcome to the new world of visual hard drive analysis. K4dirstat is a software analytics tool that unlike other hard drive analytics which is static data, gives you a visual perspective of what is happening with and in [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics Date Time Lab

Windows Forensics Date Time Lab The Date Time lab demonstrates a date and time setting utility run from the command prompt, a function typically exercised in system/network administration. It is syntax specific and you’ll observe a demonstration on [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Windows Forensics

Welcome to Module 8, Windows Forensics. Of all the modules in the Computer Hacking & Forensics course, Windows Forensics is the most priceless in terms of knowledge gained and hands on experience required. Windows Forensic Analysis focuses on the [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

Hard Disks and File Systems Add/Remove Pro Lab

Hard Disks and File Systems Add/Remove Pro Lab The add/remove lab is the last demonstration lab in Module 7, Hard Drives and Files Systems. This utility is great is the equivalent of Easycleaner Regshot except it finds and removes all the add/remove [view]

By: jgalarza2 | Related Lesson: | Modified: November 4, 2017

« First ‹ Previous 1 89 97 98 99 100 101 109 199 401 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel