Dec 7, 20233 minIntroduction to Digital ForensicsDigital forensics is a branch of forensic science that involves the identification, preservation, analysis, and presentation of digital...
Jul 18, 20232 minCarving vs Recovery Carving and recovery are both techniques used in computer forensics and data retrieval, but they differ in their approach and purpose....
Jul 18, 20232 minCloning vs ImagingCloning and imaging are two methods used in data backup and migration processes. While both techniques serve similar purposes, they...
Jul 18, 20231 minRegistry hivesRegistry hives are files in the Windows operating system that store the Windows Registry. The Windows Registry is a hierarchical database...
Jul 18, 20232 minIP (Internet Protocol)IP (Internet Protocol) is a fundamental protocol used in computer networks to identify and communicate with devices connected to the...
Jul 13, 20231 minHow To Automate Go language InstallationIn this blog, we are going to Automate Go-Lang Installation using Bash Scripting. Go-Lang is one of the most important programming...
Aug 12, 20221 minSick_OS 1.2 [vulnhub]→ walkthroughWe will be looking at how I can solve the Sick_OS 1.2 machine. In this machine we have to find the root flag. You can download the...
Aug 12, 20222 minSick_OS 1.1 [vulnhub]→ walkthroughWe will be looking at how I can solve the Sick_OS 1.1 machine. In this machine we have to find the root flag. You can download the...