![]() I also liked her point about it being a requirement for vendors to provide access to the databases/configuration files. She also shares some of her testing methodology which shows how different tools interpret the data, or how different extraction methods result in different data being presented. Heather Mahalik at Smarter Forensics takes a look at parsing the SMS database from iOS 11.Good Analysis = Understanding(tools + logs + normal), (Fri, Sep 29th) Lorna Hutcheson at the SANS Internet Storm Centre was asked a question by a reader regarding TCP flags.Marc Padilla examines his network traffic to understand the contents of encrypted BitTorrent traffic.ĭetermine the Contents of Encrypted BitTorrent Traffic.How to Acquire and Analyze Cloud Data with Magnet AXIOM Cloud Jamie McQuaid at Magnet Forensics walks through using the newly released Axiom Cloud to extract data from various cloud sources. ![]() Magnet Forensics and Teel Technologies are Partnering on a Demo Roadshow The guys at Magnet Forensics interviewed Bob Elder, the CEO of Teel Technologies Canada and “discussed what he and his team were up to and the importance of partnership in providing meaningful solutions to the forensics community”. ![]() Uncovering Nation-Specific, Targeted Attacks (.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |