What is Forensic Informatics? What are Forensic Information Methods?
Corruption, theft and abuse have now gone from paper to electronic media, and almost all of the data in public and private institutions are now …
Knowledge pool for Information Technologies
Corruption, theft and abuse have now gone from paper to electronic media, and almost all of the data in public and private institutions are now …
As you use smartphones, you need to know more about the risks that accompany them and take appropriate measures. Smartphones are powerful speakers and distributors …
Let’s start by applying some tests on the target; Let’s scan the target network using Nmap. With IPs, we determined which ports are working on …
WAF (Web Application Firewall) helps protect the web application by filtering and monitoring HTTP traffic between a web application and the internet. It generally protects …
I will show you how to install GenyMotion plugin on Android Studio development tool. As you know, most emulators work slowly and because of this …
You do not have an Android processor, but you want to try some applications or because you are an Application Developer, you want to try …
Sysmon (System Monitor) is one of its tools to monitor activities on Windows operating systems in detail. It provides detailed information on the created processes, …
Cross-Site Scripting (XSS) is a weakness that occurs if the developer does not pass the input from the user through the required HTML and JavaScript …
DVWA(Damn Vulnerable Web Application), For pentesters and web security users who want to improve themselves in the field of web application security. It is an …
Source code analysis(SCA) is the automatic testing of a program’s source code to find and fix errors before the application is sold or distributed. It …