Article Categories

Learn from one of our 15 and growing categories

Write

Share your how to, advice or experience with the community
Submit an article

How to Remove Malware from your system like a Pro

Recently I had a friend that went to one of those big box stores that happen to also perform computer services. They took their laptop there to be looked at by one of the “computer specialist” because their laptop was infected with malware. Two days later my friend was able to pick up the laptop and it no longer was infected with malware but at the expense of $175.

Top 10 Sites for Malware Analysis that you should have Bookmarked

Malware, virus, worm, rootkit, trojan, bot or just plain evil,  no matter what you may call a program designed for malicious purposes, the following top 10 list of malware analysis sites is a must have for all.    

Make Money Online - How Your Site Can Make Money To Support Itself

If you do a search for any of the following phrases below your guarantee to get a lot of results.

Digital Forensics Open Source Tools

Computer Forensics has become one of the most sought after skill in the Information Security field and many people have wonder "How do I get into Forensics" and Sans Investigate Forensics Toolkit (SIFT) Workstation - The SIFT Workstation is a VMware appliance, pre-configured with the necessary tools to perform detailed digital forensic examination in a variety of settings. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats.

Installing PFSense on WatchGuard X700

For years I have been running PFSense as my main firewall at home and the equipment that I was using was not what you would say “state of the art”. I have been using an old IBM Pentium 4 Tower which I have never upgraded the system because:

Forensics - Malware Memory Analysis - Volatility

In the Forensics - Malware Memory Analysis - Acquiring Memory article a list of tools that could be used to acquire the memory of a live system was listed. Once you have successfully acquire the memory of the system, a tool like volatility can be used to analyze the memory for data.

Pages

Subscribe to Basement PC Tech RSS