Trends in high tech security
This blog discusses high tech exploits. It is only for those that have or use cell-phones, laptops, WiFi... (well, just about everyone.)
Recent blog post
Speed matters. How to make a forensic image as quickly as possible.
The typical method used to create a forensic image is to connect the source disk to a write-blocker. The write-blocker is then connected to a computer and a forensic image is made. This process needs to be updated to keep up with the capacity and speeds o...20 weeks ago
User reviewsPersonal attacks are NOT allowed
Please read our comment policy