Submitted by BasementPCTech on Fri, 12/21/2012 - 23:54
Recently I had a friend that went to one of those big box stores that happen to also perform computer services. They took their laptop there to be looked at by one of the “computer specialist” because their laptop was infected with malware. Two days later my friend was able to pick up the laptop and it no longer was infected with malware but at the expense of $175.
Submitted by BasementPCTech on Fri, 12/14/2012 - 18:05
Malware, virus, worm, rootkit, trojan, bot or just plain evil, no matter what you may call a program designed for malicious purposes, the following top 10 list of malware analysis sites is a must have for all.
Submitted by BasementPCTech on Tue, 12/11/2012 - 22:45
Computer Forensics has become one of the most sought after skill in the Information Security field and many people have wonder "How do I get into Forensics" and Sans Investigate Forensics Toolkit (SIFT) Workstation - The SIFT Workstation is a VMware appliance, pre-configured with the necessary tools to perform detailed digital forensic examination in a variety of settings. It is compatible with Expert Witness Format (E01), Advanced Forensic Format (AFF), and raw (dd) evidence formats.
Submitted by BasementPCTech on Tue, 12/11/2012 - 22:40
For years I have been running PFSense as my main firewall at home and the equipment that I was using was not what you would say “state of the art”. I have been using an old IBM Pentium 4 Tower which I have never upgraded the system because:
Submitted by BasementPCTech on Tue, 12/11/2012 - 22:27
In the Forensics - Malware Memory Analysis - Acquiring Memory article a list of tools that could be used to acquire the memory of a live system was listed. Once you have successfully acquire the memory of the system, a tool like volatility can be used to analyze the memory for data.