[How to] GPG and Signing Data
GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...
GNU Privacy Guard (GPG) uses public and private keys to secure communications (public-key cryptography). Many people use it to encrypt their email or other d...
Today we will give a beginner-level introduction to The Sleuth Kit from command line. If this video is helpful, I highly recommend reading The Law Enforcemen...
Today we are going to install and update a Debian-based operating system in VirtualBox as a guest operating system.The first video goes through creating a vi...
This week we will begin with a very basic introduction into the memory analysis framework Volatility. We will use volatility to collect information about a m...
Today we are talking about ‘Robust bootstrapping memory analysis against anti-forensics’ by Lee Kyoungho, Hwang Hyunuk, Kim Kibom and Noh BongNam. This paper...