Tag: File System

SKTimeStamp

SKTimeStamp is a very simple shell extension which adds a new tab to the Windows Explorer properties dialog. On that new tab, you can change the file/folder date and time. http://stefanstools.sourceforge.net/SKTimeStamp.html

Permanent link to this article: http://www.darknessgate.com/2016/08/04/sktimestamp/

CAINE (Computer Aided INvestigative Environment)

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/

Alpine Linux

Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/17/alpine-linux/

Registry Decoder

Accurate, efficient analysis of the Windows registry Registry Decoder provides a single tool in which to perform browsing, searching, analysis, and reporting of registry hive contents. All functionality is exposed through an intuitive GUI interface and accommodates even novice investigators. Registry Decoder also acts as a great resource for new research and experimenting within the …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/11/registry-decoder/

Cryptography and Cryptanalysis

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Permanent link to this article: http://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/

Basic Steps in Forensic Analysis of Unix Systems

This Web tutorial instructs learners on forensic analysis of machines running the Unix operating system. It covers steps used for analysis and includes graphics, illustrations and references. The tutorial also provides sample Unix scripts and protocols. In addition, the materials demonstrate how to run analysis using standard Unix tools, specifically The Coroner’s Toolkit (TCT), which …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/10/12/basic-steps-forensic-analysis-unix-systems/

An Introduction to Unix for Programmers

The goal of this course is to provide students with enough Unix to allow them to work productively in CS courses at the 300 level and beyond. Particular emphasis is placed on Unix tools and procedures that support the kind of programming students will face in assignments in those later courses. Because relatively few people …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/28/introduction-unix-programmers/

Introduction to UNIX/Linux

Users of our supercomputing systems often encounter repeated difficulties in their computational work due to a weak understanding of the Unix operating system and its user interface. To help users close this gap, the Supercomputing Facility offers an introductory course to Unix/Linux during each semester. Open to anyone on campus who is interested in learning …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/28/introduction-unixlinux/

Introduction to UNIX

These lecture notes and exercises are designed to support an intensive introductory course on UNIX or to act as a reference to users who are new to UNIX. This course was designed particularly for use with the Linux operating system but much of it applies to other UNIX systems as well. These notes are also …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/28/introduction-unix/

Areca Backup

Areca Backup is an Open Source personal backup solution which is released under the General Public License (GPL) v2. Backup Engine Features : Archives compression (Zip & Zip64 format) Archives encryption (AES128 & AES256 encryption algorithms) Storage on local hard drive, network drive, USB key, FTP, FTPs (with implicit and explicit SSL / TLS) or …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/06/14/areca-backup/

Duplicati

Duplicati is a free backup client that securely stores encrypted, incremental, compressed backups on cloud storage services and remote file servers. It works with Amazon S3, Windows Live SkyDrive, Google Drive (Google Docs), Rackspace Cloud Files or WebDAV, SSH, FTP (and many more). Duplicati has built-in AES-256 encryption and backups can be signed using GNU Privacy …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/03/19/duplicati/