background preloader

Forensics Wiki

Forensics Wiki

http://www.forensicswiki.org/wiki/Main_Page

Related:  Digital ForensicIT securitySystem

50 Essential Open Source Security Tools - Anti-Everything, Encryption, Secure Delete, Forensics - Roundup Anti-Everything, Encryption, Secure Delete, Forensics November 11, 2008 By Cynthia Harvey The area of open source security software is growing rapidly, with a cornucopia of apps for every use: anti-spam, firewalls, forensics, encryption, log monitoring, passwords – the list is growing even as you read this. In many cases, these open source security tools – many of which are free – are available for the Windows, Linux and Mac operating systems.

How To Secure Your Wi-Fi Network Against Intrusion Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior. Read on as we show you how to secure your home Wi-Fi network. Why Secure Your Network? In a perfect world you could leave your Wi-Fi networks wide open to share with any passing Wi-Fi starved travelers who desperately needed to check their email or lightly use your network.

Container-Based Controls versus Dynamic Authorization: The Difference in Windows Environments (Part 1 of 2) By Sandeep Chopra. If you are debating whether to upgrade to Windows Server 2012, plenty of articles describe its new security benefits (for example, see here and here). Fewer articles discuss the basic shift in Access Management this release can enable. To understand the potential benefits of one key feature, Dynamic Access Control, it’s useful to compare this approach with more well-known models of Access Management, such as ACLs and Security Groups. This blog is first in a series that compares how Access Management was handled in Windows environments prior to the 2012 release with what’s possible now. Container-Based Controls: ACLs and Group Management

Netherlands Forensic Institute develops and publishes open source software The Netherlands Forensic Institute (NFI) recently published its own software, TULP2G, under an open source license. The NFI had already published a software library called Rfile as open source software. The software that was developed by the NFI can now be used and developed further by other organizations. In addition, the reflection of third parties may enhance the quality of the software. The NFI initiatives are not isolated incidents; corresponding foreign organizations and other governmental organizations frequently publish their own software with an open source license or participate in existing open source projects. In turn, the NFI uses open source software that has been developed by other parties to trace digital tracks.

Mobile content from Windows IT Pro Like most technologies that an IT pro deals with, wireless technology changes from day to day. Not too long ago, having a wireless LAN (WLAN) was considered a mere luxury or something "nice to have." Nowadays, however, access to a WLAN is critical because the proliferation of mobile devices that have entered our industry invariably tout Wi-Fi as a key selling point. This is even more important as cellular carriers begin to cap their wireless data rate plans; unlimited cellular data plans are all but gone, whereas Wi-Fi is almost always unlimited (and faster). It's important to take stock of your current WLAN infrastructure if you have one, and to be aware of the latest standards if you're designing a new one—even if it consists of only a single Access Point (AP).

How to Prevent Users from Changing Permissions on File Servers On file servers in corporate environments one typically does not want users to change permissions, even on their own files. It might seem that it would be sufficient to simply grant change permissions instead of full control, but unfortunately that is not the case. The problem is that whenever a new file gets created, the user creating the file will be its owner. And owners can always change permissions, regardless of the contents of the DACL.

How to Visualize Investigations In security and investigations, the phrase "A picture is worth a thousand words" usually refers to CCTV footage or some evidence that proves a subject's guilt (or innocence). Unfortunately most corporate investigations rarely even touch upon cases with a lot of visual content, which can become rather large collections of three ring binders. While we all hope to present a smoking gun for our final report, sometimes presenting our case to law enforcement, lawyers, human resources and even our own management without the proper visual can keep even a solid case from closing. Like children's books full of images deeply expanding short story lines into memorable tales, visualization can be an effective way to quickly and successfully present your investigation on a high level.

Introduction to Windows Server 2012 Dynamic Access Control We constantly strive to reduce the steps required for you to get your job done. One of the reasons Windows Server 2012 is a such great release is that we spent so much time listening to our customers and understanding their scenarios and concerns. When development teams start from a technology/feature mindset, it can be hard to work across groups because helping another team usually means that you have to give up something you wanted to do. We were able to achieve a very high level of technology integration and cross-group cooperation because we all shared a common understanding of our customers and their scenarios. Teams were eager to help each other succeed in delivering those scenarios.

Free Resources for Law Enforcement These are the most recent notes for my "Free Stuff" presentation. This most recent presentation was from the IACA conference in September 2013. I hope that everyone who came to my presentation can save more than was spent on their conference tuition and expenses. I Need A Relationship Mapping Tool I was asking for better ways to track PC/NPC relationships in my game on RPG Stack Exchange and Brian brought up the free game Minimus, which is basically an example of social network mapping for an RPG. This reminded me of the person-to-person tracking diagrams I’ve seen in books on intelligence work, it’s a common HUMINT technique. But then I started looking for good tools to do it and started coming up short.. There’s super complicated open source BS like graphviz – not something I want to deal with as part of my hobby.

Objective-See Love these free tools? Support them via my patreon page! 🙏 In today's connected world, it is rare to find an application or piece of malware that doesn't talk to a remote server. LuLu is the free, open firewall for Macs that can protect your network connections and detect malicious activity. learn more

Related: