Newbetuts
.
New posts in forensic-analysis
Virtual machine memory space forensics
security
virtualization
forensics
forensic-analysis
Is there a (forensic) way to list past events/actions of a certain *.exe malware program (PUP-Proxygate, possibly a Trojan)?
log-files
malware
forensic-analysis
What are my options with a downloaded Rackspace cloud image?
linux
cloud
rackspace-cloud
data-recovery
forensic-analysis
My linux server was hacked. How do I find out how and when it was done?
linux
ubuntu
security
hacking
forensic-analysis
What are main steps doing forensic analysis of linux box after it was hacked?
linux
security
hacking
forensic-analysis
Prev