Startertutorials Blog
Tutorials and articles related to programming, computer science, technology and others.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.

Cybersecurity Tutorial for Beginners

Suryateja Pericherla Categories: Security and Hacking. 11 Comments on Cybersecurity Tutorial for Beginners

Welcome to the cybersecurity tutorial for beginners created by startertutorials.com. Cybersecurity is one of the buzzwords in the industry and is one of the premier technologies now-a-days. Cybersecurity plays a key role in different sectors like health, defense, government, education, retail, etc. The salary received by cybersecurity professionals is on par and even higher when […]

Read the rest of this entry »

Antiforensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on Antiforensics

In this article we will look at what is antiforensics, categories of antiforensics, etc.   Antiforensics is the practice of applying different techniques on digital evidence to invalidate them from being submitted for judicial review.   Watch this video to learn about antiforensics:   Four categories of antiforensics are: Data destruction Data hiding Data encryption […]

Read the rest of this entry »

Forensics Auditing

Suryateja Pericherla Categories: Security and Hacking. No Comments on Forensics Auditing

In this article we will look at what is forensics auditing.   Forensics auditing is also known as forensics accounting. Forensics auditing includes the steps needed to detect and deter fraud. Forensics auditor makes use of the latest technology to examine financial documents and investigate crimes like frauds, identity theft, securities fraud, insider trading, etc. […]

Read the rest of this entry »

Challenges in Computer Forensics

Suryateja Pericherla Categories: Security and Hacking. 1 Comment on Challenges in Computer Forensics

In this article we will look at challenges in computer forensics. We will look at various challenges in network forensics, technical forensics and legal forensics.   Although there are well-developed forensic techniques, cybercrime investigation is not easy. Huge amount of data is available and searching for evidence in that enormous data is not easy. Most […]

Read the rest of this entry »

Forensics and Social Networking Sites

Suryateja Pericherla Categories: Security and Hacking. No Comments on Forensics and Social Networking Sites

In this article we will look at forensics and social networking sites. We will look at different concerns related to social networking cites and challenges.   Social networking site is defined as web-based services that allow individuals to: Create a public or semi-public profile Search or navigate through a list of users with whom they […]

Read the rest of this entry »

Approaching a Computer Forensics Investigation

Suryateja Pericherla Categories: Security and Hacking. No Comments on Approaching a Computer Forensics Investigation

In this article we will look at what is the process in approaching a computer forensics investigation.   The phases in a computer forensics investigation are: Secure the subject system Take a copy of hard drive/disk Identify and recover all files Access/view/copy hidden, protected, and temp files Study special areas on the drive Investigate the […]

Read the rest of this entry »

Network Forensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on Network Forensics

In this article we will look at what is network forensics and what does wireless forensics deals with.   Today’s networks are mainly wireless networks. Most of the Wi-Fi communications are unprotected. Wireless forensics is a part of network forensics, which in turn is a part of computer forensics.   Watch this video to learn […]

Read the rest of this entry »

Digital Forensics Life Cycle

Suryateja Pericherla Categories: Security and Hacking. No Comments on Digital Forensics Life Cycle

In this article we will look at digital forensics life cycle. We will explore different phases or steps in the digital forensics life cycle. The digital forensics process is shown in the following figure. Forensic life cycle phases are: 1. Preparation and identification 2. Collection and recording 3. Storing and transporting 4. Examination/investigation 5. Analysis, […]

Read the rest of this entry »

Forensic Analysis of E-Mail

Suryateja Pericherla Categories: Security and Hacking. No Comments on Forensic Analysis of E-Mail

In this article we will look at forensic analysis of e-mail, what is importance of email header for forensics analsyis of email.   Introduction to E-Mail System An E-Mail system is a combination of hardware and software that controls the flow of E-Mail. Two most important components of an email system are: E-Mail server E-Mail […]

Read the rest of this entry »

Cyberforensics and Digital Evidence

Suryateja Pericherla Categories: Security and Hacking. No Comments on Cyberforensics and Digital Evidence

In this article we will look at cyberforensics and digital evidence. We will look at the differences between physical evidence and digital evidence. Then we will look at the guidelines for collecting digital evidence.   Cyberforensics can be divided into two domains: Computer forensics Network forensics   Network forensics is the study of network traffic […]

Read the rest of this entry »
Blogarama - Blog Directory