Posts

Digital Forensics - An Overview

Image
Digital forensics involves the preservation, acquisition, documentation, analysis, and interpretation of evidence identified from various storage media types. It is not only limited to laptops, desktops, tablets, and mobile devices, but also extends to data in transit that is transmitted across public or private networks. In some cases, digital forensics involves the discovery and/or recovery of data using various methods and tools available to the investigator.  Digital forensics investigations include, but are not limited to, the following:  • Data recovery: Investigating and recovering data that may have been deleted, changed to different file extensions, and even hidden.  • Identity theft: Many fraudulent activities, ranging from stolen credit card usage to fake social media profiles, usually involving some sort of identity theft.  • Malware and ransomware investigations: To date, ransomware spread by Trojans and worms across networks and the internet are some of the biggest threat

Google Passkeys: The Beginning of a New Era in Online Security?

Image
Google recently unveiled "passkeys," a new tool that makes logging into your Google account more convenient and safer. Traditional passwords, which can be challenging to remember and frequently result in security breaches, can be replaced by passkeys. We'll examine passkeys in more detail in this blog article, including what they are, how they operate, and what they portend for internet security in the future. What are Passkeys? In simple terms, passkeys are a form of two-factor authentication (2FA) that substitutes a cryptographic key for a password. You'll be asked whether you want to make a physical key or use your phone as the key when you set up passkeys for your Google account. When you log into your account, this key is then used to confirm your identity. How do Passkeys work? The Web Authentication (WebAuthn) standard, which is a relatively recent standard for user authentication on the web, provides the foundation of passkeys. You will be asked to tap a physi

December 2022 – free certifications resources to upskill

Image
With the following free proctored certification exam vouchers and resources to upskill, use the lists of the top skills in this post to identify skill gaps as a professional or in your unique area of expertise. DISCLAIMER: The below links are taken via various upskill search engines. Trailblazer Scholarship 2023,  Apply Now!! Are you preparing for data scientist, data analyst, software developer job roles? then refer this limited time FREE career preparation courses ---  Click Here!! (ISC)² is offering FREE Certified in Cybersecurity  (CC) Online Self-Paced Training and exams to one million people. ---  Check it out!! FREE monthly learning resources ---  Click Here!! Cloud Developer Workbook has 100 hands-on exercises for software developers to build AWS skills! ---  Link Here!! Please share this blog post with 5 of your friends or 2 colleagues who you think will find it useful. Follow me on    Instagram      Facebook If you find any free or with a discount learning courses / proctored

EC-Council’s Essentials Series: Learn Premium Courses for Free

Image
  Imagine if you are a college student and you see a person doing Ethical Hacking and finding bugs and you also want to learn to hack for free? Now at this point wait how can I learn it for free? Well, EC-Council’s (International Council of E-Commerce Consultants)  a Cybersecurity professional body has recently come up with its new series called  EC-Council’s Essentials Series. In this program, you will learn the  Fundamentals of Cybersecurity  from the ground level for absolutely free. This includes various  Certifications, E-Guides, Virtual Labs, Video Training Series,  etc. This can be the best opportunity for you if you want to pursue a career in the field of Cybersecurity. So without wasting any more time let’s get right into it. About EC-Council’s Essentials Series This Essential series includes a list of three courses –  Network Defence, Ethical Hacking, and Digital Forensics.  You might be wondering that to learn you need advanced coding skills. Well, you are wrong thes

Recover images used for Windows 10 lock screen

Image
Regularly, the lock screen of Windows 10 displays a different image to decorate this login screen. The images being rather pretty, in a general way, I looked for these images in order to be able to reuse them. In the rest of this article, I give you a technique to recover the images that have been used on your machine on the lock screen in Full HD (1920 x 1080px). There are actually two methods that are similar but slightly different from each other. A little information before you start   Don't modify the contents of the folder given below, create a copy of the files you are interested in in another location, which you can then use as you wish Using a Browser The first method is to use your browser and type the following address in its address bar (or copy/paste, it may be easier...) replacing "username" with the name of your user folder 👇 " file:///C:/Users/username/AppData/Local/Packages/Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy

How can I tell if someone is monitoring my phone?

Image
Our phones give us instantaneous access to limitless information. But sometimes that means others will have access to you. Your phone is the perfect access point for anyone looking to steal your information, or worse, spy on you. Smartphones have greatly changed the way live. They’ve also made us easy targets by consolidating so much of our daily business and communication to one device. Someone could access your phone’s data if they had the right tools.  Cell phone monitoring programs allow remote access to a target device. This software makes most of the important data readily accessible including text messages, call logs, pictures, social media, and GPS location. They are useful tools for anyone who needs remotely controlled access to a device, but, like any tool, it has the potential to be mishandled. This technology is often used by parents as a way of keeping tabs on their child’s devices. Getting issued a phone or a smart device at work is very common. Employers often use