Startertutorials Blog
Tutorials and articles related to programming, computer science, technology and others.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.

Approaching a Computer Forensics Investigation

Suryateja Pericherla Categories: Security and Hacking. No Comments on Approaching a Computer Forensics Investigation

In this article we will look at what is the process in approaching a computer forensics investigation.   The phases in a computer forensics investigation are: Secure the subject system Take a copy of hard drive/disk Identify and recover all files Access/view/copy hidden, protected, and temp files Study special areas on the drive Investigate the […]

Read the rest of this entry »

Network Forensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on Network Forensics

In this article we will look at what is network forensics and what does wireless forensics deals with.   Today’s networks are mainly wireless networks. Most of the Wi-Fi communications are unprotected. Wireless forensics is a part of network forensics, which in turn is a part of computer forensics.   Watch this video to learn […]

Read the rest of this entry »

Digital Forensics Life Cycle

Suryateja Pericherla Categories: Security and Hacking. No Comments on Digital Forensics Life Cycle

In this article we will look at digital forensics life cycle. We will explore different phases or steps in the digital forensics life cycle. The digital forensics process is shown in the following figure. Forensic life cycle phases are: 1. Preparation and identification 2. Collection and recording 3. Storing and transporting 4. Examination/investigation 5. Analysis, […]

Read the rest of this entry »

Forensic Analysis of E-Mail

Suryateja Pericherla Categories: Security and Hacking. No Comments on Forensic Analysis of E-Mail

In this article we will look at forensic analysis of e-mail, what is importance of email header for forensics analsyis of email.   Introduction to E-Mail System An E-Mail system is a combination of hardware and software that controls the flow of E-Mail. Two most important components of an email system are: E-Mail server E-Mail […]

Read the rest of this entry »

Cyberforensics and Digital Evidence

Suryateja Pericherla Categories: Security and Hacking. No Comments on Cyberforensics and Digital Evidence

In this article we will look at cyberforensics and digital evidence. We will look at the differences between physical evidence and digital evidence. Then we will look at the guidelines for collecting digital evidence.   Cyberforensics can be divided into two domains: Computer forensics Network forensics   Network forensics is the study of network traffic […]

Read the rest of this entry »

The Need for Computer Forensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on The Need for Computer Forensics

In this article we will look at what is the need for computer forensics and what are the challenges faced by forensics investigators while dealing with storage devices.   The advances in ICT and computers provides avenues for misuse as well as opportunities for committing crime. The widespread use of computer forensics is the result […]

Read the rest of this entry »

Introduction to Digital Forensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on Introduction to Digital Forensics

In this article we will look at introduction to digital forensics which covers computer forensics, cyber forensics and some introduction to digital forensics science.   Introduction Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer […]

Read the rest of this entry »

Identity Theft

Suryateja Pericherla Categories: Security and Hacking. No Comments on Identity Theft

In this article we will look at what is identity theft, what is personally identifiable information and different types of identity theft.   What is Identity Theft? Identity theft refers to the fraud committed by pretending as a legitimate official or some other person and stealing the sensitive information of victims. The person (victim) whose […]

Read the rest of this entry »

Attacks on Wireless Networks

Suryateja Pericherla Categories: Security and Hacking. No Comments on Attacks on Wireless Networks

In this article we will look at different attacks on wireless networks that can be performed and general guidelines for protection against those attacks.   Watch this video to learn about attacks on wireless networks:   Penetration of a wireless network through unauthorized access is termed as wireless cracking. Availability of various tools made it […]

Read the rest of this entry »
Blogarama - Blog Directory