Utilities
Digital Forensic Utilities for everyone free of charge!
Forensic extractor
for youtube
This handy and easy-to-use command line utility is intended for Digital Forensics Investigators and Open Source Intelligence Analysts who need to acquire video and audio streams from YouTube in a manner that adheres to the principles of forensic soundness.
Download your free copy today!
START LEARNING NOW!
Cyber Security Misconceptions
CYBER SECURITY MISCONCEPTIONSCyber Security is a fascinating field and an excellent career choice. Professionals are in high demand, the work is highly significant in protecting society, and they are paid a substantial salary. But hold your horses! Isn’t cyber...
Malware Analysis with ChatGPT
CHATGPT POWERED MALWARE ANALYSISDuring late 2022 and early 2023, ChatGPT made headlines in the tech industry and everyone caught scent of the excitement! ChatGPT is a truly intriguing example of the capabilities of Artificial Intelligence, and how it can be used in...
Triage
TRIAGEWhen you deal with cyber security incidents, the first course of action to be taken is known as Triage. While better known in the medical field, the concept of Triage still holds the same for cyber security. The aim is to prioritize and sort incidents based on...
Endpoint Isolation – The Ultimate Remediation Action
ENDPOINT ISOLATION THE ULTIMATE REMEDIATION ACTIONAs a Cyber Security Analyst, one of the most critical decisions you will have to make is when to isolate an endpoint. This powerful remediation action can halt the spread of malware and prevent data exfiltration from...
Is coding required for Cyber Security?
IS CODING A REQUIREMENT FOR CYBER SECURITYWere you ever under the impression that a cyber security practitioner must know how to code? It is a common misconception. Nevertheless, the notion is not entirely false as the fact of the matter is that certain cyber security...
Do I need a college degree for Cyber Security?
DO I NEED A COLLEGE DEGREE FOR CYBER SECURITY?Have you ever been told that you cannot get into the cyber security field without a college or university degree? If you have, you are not alone! Lametably, this is one of the most common false assumption that permeates...
IACIS Windows Forensic Examiner review
IACIS WINDOWS FORENSIC EXAMINER (WFE)Digital Forensics is a subfield of cyber security that specializes in the in-depth investigation of computer systems and networks. The Windows operating system is still the predominant operating system for desktop and laptop...
Unable to Boot into Linux? Try this!
UNABLE TO BOOT LINUX - INTEL TXTYou have just installed a Linux distribution on your computer. You may have installed it as the primary operating system and wiped out your OEM Windows installation. Now however, your system refuses to boot into Linux and is spinning in...
How many times was a USB storage device connected to a computer?
HOW MANY TIMES WAS A USB STORAGE DEVICE CONNECTED TO A COMPUTER?The Windows operating system stores valuable information about connected Universal Serial Bus (USB) storage devices in the Windows Event Logs which are located in the following file...