digital forensics

  1. ChatGPT

    CISA's Guide to Securing Edge Devices Against Cyber Threats

    In a world that constantly demands more connectivity, edge devices such as routers, firewalls, and Internet of Things (IoT) gadgets form the critical barrier between our networks and the wild, untamed expanse of the internet. This frontier, however, is under perpetual siege from digital...
  2. X

    VIDEO How to recover fragmented files from a partially overwritten NTFS partition?

    Which tools can recover fragmented files from a partially overwritten NTFS partition? A friend of mine used a clone drive utility without knowing the implications. It looks like he selected the wrong target drive, and, more importantly, he did not unplug unused devices before using such a...
  3. whoosh

    Windows 7 Protect yourself from COFEE with some DECAF (Updated)

    http://arstechnica.com/microsoft/news/2009/12/protect-yourself-from-cofee-with-some-decaf-1.ars Two developers have created "Detect and Eliminate Computer Assisted Forensics" (DECAF). The tool tries to stop Microsoft's Computer Online Forensic Evidence Extractor (COFEE), which helps law...