Tag: checksum

CNIT 121: Computer Forensics

The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Upon successful completion of this course, the student will be …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/06/cnit-121-computer-forensics/

6.857: Computer and Network Security

6.857: Computer and Network Security by Massachusetts Institute of Technology http://courses.csail.mit.edu/6.857/2014/handouts

Permanent link to this article: https://www.darknessgate.com/2014/09/05/6-857-computer-network-security/

CSE571S: Network Security (Fall 2011)

A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/04/cse571s-network-security-fall-2011/

Applied Cryptography

Have you wondered how one might define security — even for a cryptographic concept as simple and familiar as encryption? What makes public-key cryptography possible? (Well, what is public-key cryptography?) What is MD5 and what’s wrong with it? What is homomorphic encryption? What are zero-knowledge proofs (and are they for real)? What magical tools can …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/09/01/applied-cryptography/

X-Ways Forensics [Commercial Application]

X-Ways Forensics, the forensic edition of WinHex, is a powerful and affordable integrated computer forensics environment with numerous forensic features, rendering it a powerful disk analysis tool: capturing free space, slack space, inter-partition space, and text, creating a fully detailed drive contents table with all existing and deleted files and directories and even alternate data …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/09/07/x-ways-forensics/

GNU Privacy Guard

GnuPG is the GNU project’s complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/05/27/gnu-privacy-guard/

Checksums calculator by Sigma Informatics

Sigma Informatics offers to you “Checksums calculator” an open source application that has been developed with Free Pascal compiler and Lazarus IDE. Can run on Microsoft Windows, MacOS X and Linux operating systems on both 32bit and 64bit architectures while is translated into 19 languages. It gives you the ability to calculate and verify checksums …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/05/24/checksums-calculator-by-sigma-informatics/

Checksum Control Portable

Checksum Control is an easy to use utility to generate and verify SFV and MD5 checksums on groups of files. Features: Checksum Control uses a simple wizard interface to walk through the process of creating or verifying sets of files. It has advanced options on handling renaming of bad files and how to handle the …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/05/24/checksum-control-portable/

Checksum Calculator

A native C# program for calculating file checksums in various algorithms: SHA-1, SHA-256, SHA-384, SHA-512, MD5. Works with .NET 2.0 and above. Has many options for comparing and outputting the calculated hash. Download Checksum Calculator

Permanent link to this article: https://www.darknessgate.com/2012/05/24/checksum-calculator/

SSIM-lite

SSIM’s purpose is to scan the files and directories of your website looking for changes. If it finds anything that has been modified, added or deleted it will produce a report telling you exactly what has happened. This is useful for detecting changes made maliciously by hackers or for confirming changes made by you or …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/05/24/ssim-lite/

SAMHAIN file integrity / host-based intrusion detection system

The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as standalone …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2012/05/24/samhain-file-integrity-host-based-intrusion-detection-system/