Data Recovery with PhotoRec for Linux in Forensic Examinations
The process of bringing back data that has become inaccessible, deleted, corrupted or lost in any way and cannot be reached by normal methods is …
Knowledge pool for Information Technologies
The process of bringing back data that has become inaccessible, deleted, corrupted or lost in any way and cannot be reached by normal methods is …
In forensic information examinations, computers that are thought to have been compromised by a malicious code sometimes come out, and we are expected to detect …
You may have seen the IMEI code in your phone’s settings or box. So what exactly does this IMEI code come to you from time …
As you use smartphones, you need to know more about the risks that accompany them and take appropriate measures. Smartphones are powerful speakers and distributors …
Due to the fact that personal data belonging to previous phone owners are not completely cleared from the phone during the second-hand phone purchases made …
Let’s start by applying some tests on the target; Let’s scan the target network using Nmap. With IPs, we determined which ports are working on …
Information security is defined as the prevention of unauthorized or unauthorized access, use, alteration, disclosure, elimination, alteration and damage of information as a type of …
First of all, knowing what you understand and expect from the concept of “pentest” will help you in this process. Because this was afterwards by …
WAF (Web Application Firewall) helps protect the web application by filtering and monitoring HTTP traffic between a web application and the internet. It generally protects …
We have described Docker widely. It is a by-product of Docker Fig. Docker is a tool that allows managing the distribution of Linux applications running …