"Computação Forense"
Follow
15.2K views | +17 today
 
Scooped by João Carvalho
onto "Computação Forense"
Scoop.it!

CAINE Live CD - computer forensics digital forensics

CAINE Live CD - computer forensics digital forensics | "Computação Forense" | Scoop.it
CAINE Computer Aided INvestigative Environment Live CD/DVD, computer forensics, digital forensics...
more...
No comment yet.

From around the web

"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

Preserving Gmail for Dummies

Preserving Gmail for Dummies | "Computação Forense" | Scoop.it
I posted here a year ago laying out a detailed methodology for collection and preservation of the contents of a Gmail account in the static form of a standard Outlook PST.  Try as I might to make i...
João Carvalho's insight:

So usefull!!!

more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

raw2vmdk - mount raw disk images

Download raw2vmdk. raw2vmdk is an OS independent Java utility that allows you to mount raw disk images, like images created by "dd", using VMware, VirtualBox or any other vir
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

PFF - Personal Folder File Forensics, (a PST file analysis)

more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Tor Browser Bundle, navegar na Net de forma anónima

Tor Browser Bundle, navegar na Net de forma anónima | "Computação Forense" | Scoop.it
o Tor Browser Bundle é uma sugestão que deve ser considerada como uma grande mais valia para adicionar à lista de software favorito - com a grande vantagem de ser totalmente gratuito. Em resumidas palavras, a aplicação conta com uma rede de servidores virtuais que nos permitem fazer as nossas sessões de navegação anónimas. O Tor disponibiliza um conjunto de regras e algoritmos que encaminha a comunicação através de vários servidores no mundo inteiro, tornando todo o tráfego aleatório e que torna
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Secure Your Online Accounts By Removing Third-Party App Access

Secure Your Online Accounts By Removing Third-Party App Access | "Computação Forense" | Scoop.it
You’ve probably given a few applications or websites access to your Google, Facebook, Twitter, Dropbox, or Microsoft account. Every application you’ve ever allowed keeps that access forever — or at least until you revoke it.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to Spot a Phish

How to Spot a Phish | "Computação Forense" | Scoop.it
PhishMe has developed a special infographic “How to Spot a Phish” that provides a guide for recognizing the tell-tale signs of a phish.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

4 crime scene mistakes that can sink a cyberforensic investigation -- GCN

4 crime scene mistakes that can sink a cyberforensic investigation -- GCN | "Computação Forense" | Scoop.it
Detectives and information security professionals can learn not only from each other’s best practices, but also from tactics each follow to ensure they are avoiding common mistakes.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Investigating Twitter Abuse, Part 2

Investigating Twitter Abuse, Part 2 | "Computação Forense" | Scoop.it
In this post, we look at the scope and scale of threats affecting Twitter and its users
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Dropbox Says It Wasn't Hacked

Dropbox Says It Wasn't Hacked | "Computação Forense" | Scoop.it
Dropbox has denied that they have been hacked, and that the login credentials leaked by a unknown individual on Pastebin are those of Dropbox users.                             
João Carvalho's insight:

Em que ficamos???

more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Collecting Gmail for Preservation

Collecting Gmail for Preservation | "Computação Forense" | Scoop.it
I’m surprised how frequently I’m engaged to collect the contents of Gmail accounts in e-discovery, especially when the account is being collected solely for preservation, and there’s no compelling ...
João Carvalho's insight:

There are a new approach to this technique! See next scoop!

more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Forensic Focus Forum Round-Up | ForensicFocus.com

Forensic Focus Forum Round-Up | ForensicFocus.com | "Computação Forense" | Scoop.it
Digital Forensics, Computer Forensics, eDiscovery
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Convert OST to PST: OST Converter

Convert OST to PST: OST Converter | "Computação Forense" | Scoop.it
Microsoft Outlook data files include email messages, notes, tasks, journals, calendars and other items. The data files of Outlook are stored in your computer in .pst file format, i.e. Personal Stor...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Análise de evidências digitais com OSForensic - Parte 01

Análise de evidências digitais com OSForensic - Parte 01 | "Computação Forense" | Scoop.it
A investigação criminal se defronta cada vez mais com o fato de a comprovação de um crime, em parte ou na totalidade dos seus elementos[i], depender de evidências digitais. Independentemente do cri...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

What is Social Engineering and How Can You Avoid It?

What is Social Engineering and How Can You Avoid It? | "Computação Forense" | Scoop.it
Malware isn’t the only online threat to worry about. Social engineering is a huge threat, and it can hit you on any operating system. In fact, social engineering can also occur over the phone and in face-to-face situations.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

What is the POODLE Vulnerability and How Can You Protect Yourself?

It’s hard to wrap our minds around all these internet catastrophes as they occur, and just as we thought the internet was secure again after Heartbleed and Shellshock threatened to “end life as we know it,” out comes POODLE.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Investigating Twitter Abuse, Part 3

Investigating Twitter Abuse, Part 3 | "Computação Forense" | Scoop.it
We look into how effective Twitter spam is, and what is being done to combat the threat.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Investigating Twitter Abuse, Part 1

Investigating Twitter Abuse, Part 1 | "Computação Forense" | Scoop.it
We look at how Twitter is abused, how big this threat is, and what is being done to solve this problem.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

CAINE Linux Distribution Helps Investigators With Forensic Analysis

CAINE Linux Distribution Helps Investigators With Forensic Analysis | "Computação Forense" | Scoop.it
The CAINE Linux distribution helps investigators find the clues and data points that are required for computer security forensics.
more...
No comment yet.