os

Understand-Anti-Forensics-Techniques

Understand Anti-Forensics Techniques

Understand Anti-Forensics Techniques are the actions and methods that hinder the forensic investigation process in order to protect the attackers and perpetrators from prosecution in a court of law. These techniques act against the investigation process such as detection, collection, and analysis of evidence files and sidetrack the forensic investigators. These techniques impact the quality and quantity of the evidence of a crime scene, thereby making the analysis and investigation difficult. Anti-forensic techniques, which include …

Understand Anti-Forensics Techniques Read More »

Overview-of-Mac-OS-X-File-Systems

Overview of Mac OS X File Systems

Overview of Mac OS X File Systems in this article Apple’s Mac OS X uses a different approach in storing the data, when compared to the Windows and Linux. This section will make investigators aware of the file systems that different versions of Mac operating systems use. Mac OS X File Systems 1. Hierarchical File System (HFS) Apple had developed the Hierarchical File System (HFS) in September 1985 to support the MAC OS in its …

Overview of Mac OS X File Systems Read More »

Booting-Process

What is the Booting Process?

Booting is the process of starting or resetting the computer when the user turns the system on. The process includes getting both the hardware and software ready and running. The booting process is of two types: Cold booting: The process happening when we first turn on the computer. Also called as hard boot, this happens when user completely cuts the power supply to the system. Warm booting is the process happening when we reset the …

What is the Booting Process? Read More »

How-to-Access-Cisco-Catalyst-&-Switch-CLI

How to Access Cisco Catalyst & Switch CLI

This article is explain How to Access Cisco Catalyst & Switch CLI , Cisco catalyst switches & Accessing the cisco IOS CLI. Cisco uses the concept of a command-line interface (CLI) with its router products and most of its Catalyst LAN switch products. The CLI may be a text-based interface during which the user, typically a network engineer, enters a text command and presses Enter. Pressing Enter sends the command to the switch, which tells …

How to Access Cisco Catalyst & Switch CLI Read More »

Overview-of-Network-Layer Functions

Overview of Network Layer Functions

Overview of Network Layer Functions Many protocol models have existed over the years, but today the TCP/IP model dominates. And at the network layer of TCP/IP, two options exist for the most protocol around which all other network layer functions revolve: IP version 4 (IPv4) and IP version 6 (IPv6). Both IPv4 and IPv6 define the same sorts of network layer functions, but with different details. This chapter introduces these network layer functions for IPv4, …

Overview of Network Layer Functions Read More »

Introduction-of-Amazon-Elastic-Compute-Cloud-(EC2)

Introduction of Amazon Elastic Compute Cloud (EC2)

Introduction of Amazon Elastic Compute Cloud (EC2) in this blog You will learn EC2 It’s an Amazon Elastic Compute Cloud and will explore the tools and practices wont to fully leverage the ability of the EC2 ecosystem. Amazon Elastic Compute Cloud (EC2) The ultimate focus of a standard data centre/server room is its precious servers. But, to create those servers useful, you’ll got to add racks, power supplies, cabling, switches, firewalls, and cooling. AWS’s Elastic …

Introduction of Amazon Elastic Compute Cloud (EC2) Read More »

The-10-Secrets-You-Will-Never-Know-About-Cyber-Security-And-Its-Important?

The 10 Secrets You Will Never Know About Cyber Security And Its Important?

The 10 Secrets You Will Never Know About Cyber Security And Its Important? Know about Cyber Security Whether you’re a techie or not, there’s a good chance that your life is very reliant on the net and its wonders. Your social media accounts are likely humming, and you recognize your way round the IOT devices you employ . All of those devices connect you to the cyber world in a method or another. Here are …

The 10 Secrets You Will Never Know About Cyber Security And Its Important? Read More »

Top-DNS-Interrogation-Tools

Top DNS Interrogation Tools

The DNS lookup tools retrieve the DNS records for a specific domain or host name. These too s retrieve data like domains and IP addresses, domain Whois records, DNS records, and network Whois record. Professional Toolset Professional Toolset assists IT professionals with troubleshooting, managing, and configuring the domain and email. Professional Toolset includes Domain/WWW tools, IP tools, Networking tools, and Email tools that assist with:• DNS troubleshooting, management and watching• Network administration and troubleshooting• Email …

Top DNS Interrogation Tools Read More »

What-are-different-types-of-attacks-on-a-system

What are different types of attacks on a system

Many approaches exist to gain access are different types of attacks on a system. One common requirement for all such approaches is that the attacker finds and exploits a system’s weakness or vulnerability. Types of attacks on a system Operating System Attacks Today’s Operating Systems (OS) are loaded with features and are increasingly complex. While users take advantage of these features, they are prone to more vulnerabilities, thus enticing attackers. Operating systems run many services …

What are different types of attacks on a system Read More »