"Computação Forense"
27.1K views | +11 today
"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Scooped by João Carvalho
Scoop.it!

EnCase 7.10

EnCase 7.10 | "Computação Forense" | Scoop.it
EnCase 7.10 expands on its visibility by unlocking self-encrypting drives and supporting OS X investigations with HFS+ Double Files, Quick Look Thumbnail Caches, and Keychain parsing. EnCase 7.10 simplifies analysis and reporting through a new Report Template Wizard. Not every investigation is a “dead box” investigation, and EnCase 7.10 has adapted to include EnCase Portable volatile data collection and triage capabilities at no additional cost. 
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED | "Computação Forense" | Scoop.it
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Cheeky4n6Monkey - Learning About Digital Forensics: Squirrelling Away Plists

Cheeky4n6Monkey - Learning About Digital Forensics: Squirrelling Away Plists | "Computação Forense" | Scoop.it
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

ATM Skimmers Explained: How to Protect Your ATM Card

ATM Skimmers Explained: How to Protect Your ATM Card | "Computação Forense" | Scoop.it
An “ATM skimmer” is a malicious device criminals attach to an ATM. When you use an ATM that’s been compromised in such a way, the skimmer will create a copy of your card and capture your PIN.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Android Forensics

Android Forensics | "Computação Forense" | Scoop.it
 Smartphones are changing the IT and Communication landscape vastly.  A Smartphone can do almost every good thing a computer can do. Today most of the corporate employee access and manage their off...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

15 CMD Commands Every Windows User Should Know

15 CMD Commands Every Windows User Should Know | "Computação Forense" | Scoop.it
Microsoft has slowly but surely pushed the command line aside in the Windows interface. This is not without reason, as it's an antiquated and mostly unnecessary tool from an era of text-based input that has long passed. But there still are some commands that remain useful, and Windows 8 even added new features. Here are the commands every…
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

GETTING MORE OUT OF ESE DATABASES - CCL Group Ltd

GETTING MORE OUT OF ESE DATABASES - CCL Group Ltd | "Computação Forense" | Scoop.it
CCL- Computer Forensic are leading experts in digital forensics, computer forensics, computer analysis, Computer Forensic Analysis, computer forensic systems and litigation support.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Live response vs. Traditional Forensics

Live response vs. Traditional Forensics | "Computação Forense" | Scoop.it
The term live response is being heard more and more frequently but what exactly is it and how does it differ from traditional forensics.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Reset Your Forgotten Ubuntu Password in 2 Minutes or Less

Reset Your Forgotten Ubuntu Password in 2 Minutes or Less | "Computação Forense" | Scoop.it
If you’ve ever forgotten your password, you aren’t alone… it’s probably one of the most common tech support problems I’ve encountered over the years. Luckily if you are using Ubuntu they made it incredibly easy to reset your password.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

PayPal's two-factor authentication is easily beaten, researcher says

PayPal's two-factor authentication is easily beaten, researcher says | "Computação Forense" | Scoop.it
A security feature offered by PayPal to help prevent accounts from being taken over by hackers can be easily circumvented, an Australian security researcher has found.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

badBIOS analysis of Weapons grade Malware

badBIOS analysis of Weapons grade Malware | "Computação Forense" | Scoop.it
badBIOS, Weapons-grade malware, facts, speculation and misunderstandings
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Catching the Ghost: How to Discover Ephemeral Evidence through Live RAM Analysis

Catching the Ghost: How to Discover Ephemeral Evidence through Live RAM Analysis | "Computação Forense" | Scoop.it
Until recently it was standard practice to approach running computers with a “pull-the-plug” attitude without recognizing the amount of evidence lost with the content of the computer’s volatile memory. Capturing and analyzing volatile data is essential for discovering important evidence. Making a RAM dump should become a standard operating procedure when acquiring digital evidence before pulling the plug and taking the hard drive out.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Queira o Sr. Perito fazer breves considerações sobre os discos de estado sólido – Parte 3

Queira o Sr. Perito fazer breves considerações sobre os discos de estado sólido – Parte 3 | "Computação Forense" | Scoop.it
Nos dois primeiros posts dessa série (Parte 1 e Parte 2) trouxemos algumas características da tecnologia de armazenamento SSD e as comparamos com seu antecessor,  o HDD. Agora, vamos abordar novos ...
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Forensics with P2 Commander - InfoSec Institute

Computer Forensics with P2 Commander - InfoSec Institute | "Computação Forense" | Scoop.it
Introduction Computer Forensics is the methodical series of procedures and techniques used for procuring evidence from computer systems and storage media.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | ZDNet

Forensic scientist identifies suspicious 'back doors' running on every iOS device | ZDNet | "Computação Forense" | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Computer Forensic Case Files - Tukangblog.blg.lt

Computer Forensic Case Files. Finds all information about Computer Forensic Case Files in different sites and blog basing on the search criteria you've entered - Tukangblog.blg.lt
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

Cheeky4n6Monkey - Learning About Digital Forensics: Android Has Some Words With Monkey

more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to Create an Encrypted Container File With BitLocker on Windows

How to Create an Encrypted Container File With BitLocker on Windows | "Computação Forense" | Scoop.it
BitLocker normally encrypts entire drives and partitions, but you can also create encrypted container files with tools built into Windows. Such encrypted VHD files can easily be moved between systems, backed up, and hidden when not in-use.
more...
No comment yet.
Scooped by João Carvalho
Scoop.it!

How to Reset Your Forgotten Mac OS X Password

How to Reset Your Forgotten Mac OS X Password | "Computação Forense" | Scoop.it
It happens to everyone at some point—you create a new password and don’t remember to save it somewhere, and then before you know it you’ve forgotten what it was. Here’s how to reset the password on your Mac OS X computer.
more...
No comment yet.