Latest News
Detect TrueCrypt and Veracrypt volumes
TrueCrypt and VeraCrypt
Building wordlists from Forensic Images
TESTED: Forensic imaging tools
How to secure your WordPress site
Awarded top 15 Forensic blog
File deletion vs wiping (HDD vs SSD)
TESTED: Camera Ballistics 2
Forensics 101: What is a forensic image?
AccessData Live Online Training
Search for:
Home
Security
Forensics
Free forensic tools
Free acquisition tools
Free investigation tools
ForensiCopy
Scripts
TC-Detective
TC-FileDetective
About me
Links
Contact
Detect TrueCrypt and Veracrypt volumes
Featured
February 12, 2018
TrueCrypt and VeraCrypt
Featured
February 12, 2018
Building wordlists from Forensic Images
Featured
November 14, 2017
TESTED: Forensic imaging tools
Featured
November 4, 2017
How to secure your WordPress site
Featured
October 22, 2017
File deletion vs wiping (HDD vs…
Featured
September 8, 2017
TESTED: Camera Ballistics 2
Featured
August 18, 2017
Security
Detect TrueCrypt and Veracrypt volumes
Some time ago I talked about BitLocker forensics and the decryption of BitLocker encrypted volumes. As a result,
...
TrueCrypt and VeraCrypt
When you want to use encryption there are a lot of options available. The two big
...
How to secure your WordPress site
The security of your WordPress installation should be a top priority for every website owner. Websites
...
File deletion vs wiping (HDD vs SSD)
September 8, 2017
Humble Book Bundle Cybersecurity
July 19, 2017
Recommended password policy
June 24, 2017
Extract BitLocker key from RAM dump using Passware
June 17, 2017
WhatsApp leaking data?
June 12, 2017
Security through obscurity: Default ports
June 11, 2017
Forensics
Detect TrueCrypt and Veracrypt volumes
Some time ago I talked about BitLocker forensics and the decryption of BitLocker encrypted volumes. As a result,
...
TrueCrypt and VeraCrypt
When you want to use encryption there are a lot of options available. The two big
...
Building wordlists from Forensic Images
Encryption has become widespread and it's common to encounter at least a few encrypted files during
...
TESTED: Forensic imaging tools
File deletion vs wiping (HDD vs SSD)
TESTED: Camera Ballistics 2
Forensics 101: What is a forensic image?
AccessData Live Online Training
Examining when a system was turned on and…
Tech and more
Set a drive type to SSD in VMware…
When you want performance in your server you use SSDs. A lot of (shared)hosting/VPS providers use
...
SSH Hangs during authentication on Raspberry Pi
Recently I attached a Raspberry Pi zero to my bathroom fan to regulate it depending on
...
Latest News
Awarded top 15 Forensic blog
My blog was selected by Feedspot's panelists as one of the Top 15 Forensic Blogs on
...
Free forensics tools list update July 2017
The list of free forensic tools has been completely revamped. I rebuild the entire list from scratch
...
Monthly newsletter
As requested by many readers I am now providing a newsletter service. If you want to
...