Spear Phishing – Beware Of Your “Friend”
What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, text or tweet by an […]
What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, text or tweet by an […]
Bring your own device (BYOD) is the business policy of letting employees bring their own devices at workplace for doing work. The concept has gained […]
What is Mobile Device Management? Mobile Device Management (MDM) software secures monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. […]
From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new technology which will revolutionize present […]
Below are the steps of how to fix the banner (version information) in IIS 7.5 Install the latest version of URLScan 3.1 (http://learn.iis.net/page.aspx/726/urlscan-overview/). Select the […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas […]
From forensics point of view, investigating “which user did what on the application/server that lead to its compromise” is of the most importance. Similar scenario applies to Email investigation. It’s quite simple now to find out the IP Address of the person who is sending out fishy or threatening emails to the victim(s).
by Toufiq Ali, NII Consulting Before you read further make sure you back up all the original settings of the registry or set create a […]
In this article we will learn on how to do the forensic of USB devices, how to correlate the USB device with the drive letter […]
from NII Consulting The IT Act 2000 is a large repository of fine print fraught with judicial jargon and varying legal implications. To quote from […]