DLL Injection And Process Hollowing Detection in Pest Code Analysis
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
Knowledge pool for Information Technologies
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
You may have seen the IMEI code in your phone’s settings or box. So what exactly does this IMEI code come to you from time …
DLL (dynamic link library) is the Windows library file used by a program to call existing functions. DLL Injection is a technique used to manipulate the …
Remote Desktop Services (RDS), known as Terminal Services in Windows Server 2008 and earlier, is one of the components of Microsoft Windows that allow a …
Ping / ICMP requests are the most common tools used to determine whether a device is active in the network. When installing the Windows Server …
As you use smartphones, you need to know more about the risks that accompany them and take appropriate measures. Smartphones are powerful speakers and distributors …
A critical vulnerability has been discovered in the Junos operating system. The vulnerability was caused by the ICAP (Internet Content Adaptation Protocol) protocol, and attackers …
Due to the fact that personal data belonging to previous phone owners are not completely cleared from the phone during the second-hand phone purchases made …
Let’s start by applying some tests on the target; Let’s scan the target network using Nmap. With IPs, we determined which ports are working on …
Information security is defined as the prevention of unauthorized or unauthorized access, use, alteration, disclosure, elimination, alteration and damage of information as a type of …