Computer Forensics Volunteer Project
by Bhushan Shah, NII Consulting Mrs Carol L. Stimmel has taken upon her to start a Computer Forensic Volunteer Project to provide low-cost services to […]
by Bhushan Shah, NII Consulting Mrs Carol L. Stimmel has taken upon her to start a Computer Forensic Volunteer Project to provide low-cost services to […]
by K K Mookhey, NII Consulting Scott Carney over at Trailing Technologies did an interesting post on the Chennai Cyber Crime Cell needing an upgrade. […]
Securing your passwords against Rainbow Table Attacks By Bhushan Shah, NII Consulting In the previous article we looked at the Rainbow Tables and how it […]
By Bhushan Shah, NII Consulting Windows passwords are stored in the registry (encrypted) in the form of a hash. LMHash was the first hash function […]
By Kush Wadhwa, NII Consulting Welcome to the world of log analysis. Log analysis plays a crucial role in intrusion detection. If the compromised system […]
K K Mookhey, NII Consulting Two recent events bring to light how the lacunae in India’s privacy laws are now hitting where it hurts most […]
by Chetan Gupta, NII Consulting How many times in an investigation does a forensic investigator come across the problem of acquiring data from a suspect’s […]
by Chetan Gupta, NII Consulting Have you ever received an anonymous email and wondered who it was from? Ever conducted business via email and wanted […]
by Chetan Gupta, NII Consulting Everyday millions of people surf the web using popular web browsers such as Microsoft Internet Explorer (IE) or any one […]
by K. K. Mookhey, NII Consulting e4 It’s late at night, and the phone rings. This had better be a world-changing revolution. But it’s something […]