So I’ve been very busy doing work, but wanted to spend a few minutes updating this course’s blog. To date we’ve covered the following: Metasploit – Slacker/Transmogrify and Temporal data manipulation / and detecting it Digital Darkroom technologies – manipulation of digital media and detection Digitalization of data – digital/analog conversion etc Cryptography Cryptanalysis – learning how encryption / decryption works. Photo adopted from http://bit.ly/FPSoIv Each and …
Series Introduction: Spring 2012 Anti-Forensics & Network Forensics
This will be the first of many posts during the Spring 2012 term for this class. I will be teaching this course for the fourth time – and every time we do something new and exciting. This year I’ve decided to integrate the book Worm by Mark Bowden (link to my Book Review blog post) into the course. Traditionally we …