The top 100 security tools
Penetration Testing Fyodor’s back with his top 100 security tools for 2006. One of the most significant, but not surprising, […]
Penetration Testing Fyodor’s back with his top 100 security tools for 2006. One of the most significant, but not surprising, […]
K K Mookhey, NII Consulting Two recent events bring to light how the lacunae in India’s privacy laws are now […]
By Chetan Gupta, NII Consulting A supposedly nightmarish tool for the investigator community! Recently this tool was released at the […]
by Chetan Gupta, NII Consulting I was looking for a utility which allows me to remotely access running processes’ list […]
by Chetan Gupta, NII Consulting Windows XP has a built-in feature – UserAssist, that acts as a monitoring tool and […]
by Chetan Gupta, NII Consulting How many times in an investigation does a forensic investigator come across the problem of […]
by Khushbu Jithra, NII Consulting The expertise involved in a forensic investigation is best showcased through the documentation of the […]
By K. K. Mookhey, NII Consulting The Information Technology Act 2000 is India’s only act dealing with computer crime. For […]
by Saurabh Ghelani, NII Consulting In computer forensics a suspect’s chargesheet is as good as the Chain of Custody log. […]
by Chetan Gupta, NII Consulting Have you ever received an anonymous email and wondered who it was from? Ever conducted […]