file

Learn All About Linux File Systems

Learn All About Linux File Systems

In this blog explain Linux File System Architecture, File system Hierarchy atandard (FHS), Extended File System (EXT), Second Extended File System (EXT2), Second Extended File System (EXT2) (Cont’d), Second Extended File System (EXT2) (Cont’d) etc… Linux OS uses different file systems to store the data. As the investigators may encounter the attack source or victim systems to be running on Linux, they should have comprehensive knowledge regarding the storage methods it employs. The following section …

Learn All About Linux File Systems Read More »

An Overview of Encrypting File Systems (EFS)

An Overview of Encrypting File Systems | EFS

In this blog explain The Encrypting File System | EFS is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. To protect files from mishandling and to ensure their security, the system should encrypt them. NTFS has Encrypting File System (EFS) as built-in feature. Encryption in file systems uses symmetric key encryption technology …

An Overview of Encrypting File Systems | EFS Read More »

Tracks-&-Advanced-Format-of-Sectors

Tracks & Advanced Format of Sectors

Tracks & Advanced Format of Sectors In this article explain hard disk track and diffrent andvance format of sector and there uses. Tracks Platters have two surfaces, and each surface divides into concentric circles called tracks. They store all the information on a hard disk. Tracks on the platter partition hold large chunks of data. A modern hard disk contains tens of thousands of tracks on each platter. The rolling heads read and write from …

Tracks & Advanced Format of Sectors Read More »

Physical-&-Logical-Structure-of-a-Hard-Disk

Logical & Physical Structure of a Hard Disk

 In this article explain Logical & Physical Structure of a Hard Disk there components uses. Physical Structure of a Hard Disk The main components of hard disk drive are: Platters: These are disk like structures present on the hard disk, stacked one above the other and store the data Head: It is a device present on the arm of the hard drive that reads or writes data on the magnetic platters, mounted on the surface …

Logical & Physical Structure of a Hard Disk Read More »

How-to-Configuring-Cisco-IOS-Software

How to Configuring Cisco IOS Software

How to Configuring Cisco IOS Software first you will want to configure every switch in an Enterprise network, even though the switches will forward traffic even with default configuration. This section covers the essential configuration processes, including the concept of a configuration file and therefore the locations during which the configuration files are often stored. Although this section focuses on the configuration process, and not on the configuration commands themselves, you must know all the …

How to Configuring Cisco IOS Software Read More »

Introduction to Amazon Glacier Service

Introduction to Amazon Glacier Service

Introduction to Amazon Glacier Service this is the blog topic in that you will learn S3 and Glacier Select, Amazon Glacier, Storage Pricing & Other Storage-Related Services like Amazon Elastic File System, AWS Storage Gateway, AWS Snowball etc S3 and Glacier Select AWS provides a different way to access data stored on either S3 or Glacier: Select. The feature lets you apply SQL-like queries to stored objects so that only relevant data from within objects …

Introduction to Amazon Glacier Service Read More »

covering-track-on-network

Covering Track on Networks

The Covering Track on Networks including networks,Windows, Linux, etc. So let’s start by seeing how track is also covered over networks. Please note that ready to i will be able to be able to cover only ways and slightly bit about how the attacker uses them, but information doesn’t meant to dig deep into technical aspects of each kind of attack. Using Reverse IMP Shells An attacker starts this attack by first infecting a victim’s …

Covering Track on Networks Read More »

Covering-Tracks

Covering Tracks

Covering Tracks we’ve got how an attacker hides malicious files on a target computer using various stenographic techniques, NTFS streams, among others, to keep up future access to the target. Now that the attacker has succeeded in performing this malicious operation, following step are to get rid of any resultant traces/tracks within the system, Covering tracks is one in all the most stage during system hacking. during this stage, the attacker tries to cover and …

Covering Tracks Read More »