Tag Archive: Cyber intelligence

Security Awareness Campaigns (Lite) | Udemy free course

Course Description Security Awareness Campaigns is about the components and reality of what makes awareness campaigns successful and which components are needed in it. This course will cover the basics of a security awareness campaign that is aimed at increasing security levels by addressing social engineering attacks and communicating the basics of awareness and threats …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/22/security-awareness-campaigns-lite-udemy-free-course/

Cyber Security: Safety at Home, Online, in Life

The course will introduce you to some of the current key topics in cyber security research and show how they relate to everyday life. We’ll look at how the move to online storage of personal data affects privacy, how online payments can be made safely, and how the proliferation of “smart” devices affect security. Over …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/19/cyber-security-safety-at-home-online-in-life/

What is cryptography?

What is Cryptography? A story which takes us from Caesar to Claude Shannon. Created by Brit Cruise.   https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography  

Permanent link to this article: http://www.darknessgate.com/2016/10/18/what-is-cryptography/

Mft2Csv

Extract $MFT record info and log it to a csv file. This tool is for parsing, decoding and logging information from the Master File Table ($MFT) to a csv. It is logging a large amount of data and that has been the main purpose from the very start. Having all this data in a csv …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/10/07/mft2csv/

Computer Science 530 – Syllabus and Reading List — Fall 2016

University of Southern California Information Sciences Institute http://ccss.usc.edu/530/fall16/16-sylrl.html

Permanent link to this article: http://www.darknessgate.com/2016/09/28/computer-science-530-syllabus-and-reading-list-fall-2016/

LiME (formerly DMD)

LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. Full Android memory acquisition Acquisition over network interface Minimal process footprint …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/17/lime-formerly-dmd/

Evolve

Web interface for the Volatility Memory Forensics Framework https://github.com/volatilityfoundation/volatility Works with any Volatility module that provides a SQLite render method (some don’t) Automatically detects plugins – If volatility sees the plugin, so will eVOLve All results stored in a single SQLite db stored beside the RAM dump Web interface is fully AJAX using jQuery & …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/16/evolve/

The Forensic Analysis Toolkit (FATKit)

The Forensic Analysis Toolkit (FATKit) is a new cross-platform, modular, and extensible digital investigation framework for analyzing volatile system memory. The framework is intended for researchers, law enforcement professionals, and forensics analysts who are interested in extracting and interpreting relevant information in the wake of a crime or incident. FATKit was developed in response to …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/15/the-forensic-analysis-toolkit-fatkit/

Discard.email

Discard.email is a service for disposable e-mail addresses with a large range of functions! No registration, noncommittal, anonymous and free! https://discard.email/en/

Permanent link to this article: http://www.darknessgate.com/2016/09/15/discard-email/

mailnesia

Disposable email at its best. Whenever you need to register on a site and you don’t want to give out your primary email address, use any @mailnesia.com address instead. Email verification links are visited automatically in the background to validate the account instantly! It’s like other webmail services, but there is no registration or password …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/14/mailnesia/

secure-email

This service encrypts your mail using 4096-bit key. Secure-Email does not collect or store information about your computer and Internet connection such as your IP address (the Internet address of your computer), operating system, cookies and browser version. All such information is collectively referred to as the “Collected Information”. https://www.secure-email.org/index.php

Permanent link to this article: http://www.darknessgate.com/2016/09/12/secure-email/

Page 1 of 1612345...Last »