"Computação Forense"
28.6K views | +3 today
 
Scooped by João Carvalho
onto "Computação Forense"
Scoop.it!

BackTrack 5 R3 Released For Download

BackTrack 5 R3 Released For Download | "Computação Forense" | Scoop.it

Backtrack is one of the highest rated and acclaimed Linux security distribution of the world. It is used by numerous security professionals and companies to perform various security and penetration testing related tasks.

more...
No comment yet.
"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

PowerShell Reference Guide - Cybrary

PowerShell Reference Guide - Cybrary | "Computação Forense" | Scoop.it
Here’s a guide for PowerShell. Hope that you enjoy it! PowerShell is very powerful. If you have any questions about it, just send me a message here on Cybrary. Save
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Forensic Imaging - Data Collection in Computer Forensics and E-Discovery

Computer Forensic Imaging - Data Collection in Computer Forensics and E-Discovery | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Another Powerful Method for Subnetting - Cybrary

Another Powerful Method for Subnetting - Cybrary | "Computação Forense" | Scoop.it
Here’s something that I learned from my CISCO class that makes things a lot easier. You’re given an IP range of 192.168.0.0 and must create a domain that has five subnets – pockets of devices on the network that are separate from each other so that no …
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Bit9 + Carbon Black Threat Research Team Unveils Nefarious Intents of “Volume Shadows Copies” - Carbon Black

Bit9 + Carbon Black Threat Research Team Unveils Nefarious Intents of “Volume Shadows Copies” - Carbon Black | "Computação Forense" | Scoop.it
Some variants of the CryptoLocker ransomware family are known for deleting all volume shadow copies to prevent restoring from backup. The ransomware does this by executing the “Vssadmin delete shadows /all” command. In this post we will focus on how volume shadow copies are being used for much more. We have seen the volum
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Pro Digital Forensic Consulting: Digital Device Seizure Tips for Attorneys & Legal Staff

Pro Digital Forensic Consulting: Digital Device Seizure Tips for Attorneys & Legal Staff | "Computação Forense" | Scoop.it
Tips for Attorneys and their staff about proper initial handling of Digital Evidence
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

USB Flash Drive Not Recognized – Don’t Worry Too Much

USB Flash Drive Not Recognized – Don’t Worry Too Much | "Computação Forense" | Scoop.it
When you find your USB flash drive not recognized by computer or Xbox 360, please stay calm and choose the correct method to deal with it.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Understanding a Digital Forensics Report

Understanding a Digital Forensics Report | "Computação Forense" | Scoop.it
It is vital for lawyers to understand what digital evidence is, how forensic neutrals work, and what to look for when reviewing a forensics report.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

A-Z Kali Linux: Useful Commands Everyone Should Know - Cybrary

A-Z Kali Linux: Useful Commands Everyone Should Know - Cybrary | "Computação Forense" | Scoop.it
a apropos Search Help manual pages (man -k) apt-get Search for and install software packages (Debian) aptitude Search for and install software packages (Debian) aspell Spell Checker awk Find and Replace text, database sort/validate/index b basename Strip directory and suffix from filenames bash GNU Bourne-Again SHell bc Arbitrary precision calculator language bg Send to background break Exit …
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Dezenas de links e ferramentas para testes de penetração disponíveis no GitHub

A bíblia dos hackers é esta. Uma página com uma lista de ferramentas para… quase tudo! Conhece aqui esta lista e partilha-a com os teus amigos!
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Digital Forensics, Part 1: Capturing a Forensically Sound Image | hackers-arise

Digital Forensics, Part 1: Capturing a Forensically Sound Image | hackers-arise | "Computação Forense" | Scoop.it
Digital Forensics, Part 1: Capturing a Forensically Sound Image
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

10 DFIR Blogs You Don’t Want to Miss

10 DFIR Blogs You Don’t Want to Miss | "Computação Forense" | Scoop.it
by Christa M. Miller Digital forensics is a tough job. Forensicators must evolve as rapidly as the technology does, which means being in a constant state of learning. Formal education is costly and can’t keep up. The next best alternative: learn from others’ experience. It can be a challenge, however, to share one’s forensication expertise…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Social Media Discovery - WebPreserver.com

Social Media Discovery - WebPreserver.com | "Computação Forense" | Scoop.it
Easily preserve Online content with legally admissible screenshots. Make your Social Media discovery process as simple as browse, click, evidence.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Recovering previous/old passwords using NirSoft password recovery tools and shadow copies of Windows.

Recovering previous/old passwords using NirSoft password recovery tools and shadow copies of Windows. | "Computação Forense" | Scoop.it
Empty description
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Pericia Digital e Computação Forense: Conversão de Imagens

Pericia Digital e Computação Forense: Conversão de Imagens | "Computação Forense" | Scoop.it
Conversão de Imagens
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Researchers make forensic tool to recover data from smartphone RAM to help in criminal cases

Researchers make forensic tool to recover data from smartphone RAM to help in criminal cases | "Computação Forense" | Scoop.it
A new tool to recover information stored in smartphone's volatile memory could give investigators important clues to solve a criminal case.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Data Security: Simple Steps to Block USB Ports - Cybrary

Data Security: Simple Steps to Block USB Ports - Cybrary | "Computação Forense" | Scoop.it
Data Security: Simple Steps to Block USB Ports Needless to say, the most common method for data leakage is through USB/Pen drive/Mass storage devices. Leakage is also high through PCs/laptops that get infected by viruses/malware. Most corporations have centralized control for usage of such devices. However, such …
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Automate memory forensics analysis with Vortessence

Automate memory forensics analysis with Vortessence | "Computação Forense" | Scoop.it
Vortessence is a tool, whose aim is to partially automate memory forensics analysis.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Mobile Forensics: Investigation Process Model - InfoSec Resources

Mobile Forensics: Investigation Process Model - InfoSec Resources | "Computação Forense" | Scoop.it
From the newly-published Mastering Mobile Forensics by Soufiane Tahiri.  Smartphone forensic is relatively new and quickly emerging field of interest withi
more...
No comment yet.