computer-forensics Questions

7

I have a single vmware disk image file with vmdk extension I am trying to mount this and explore all of the partitions (including hidden ones). I've tried to follow several guides, such as : http...
Inion asked 11/3, 2014 at 13:51

2

Solved

Lately I've been exploring the vast and terrible world of intellectual property law and people seem to think that if you create something(software) on your time, with your equipment, it typically b...
Supralapsarian asked 8/2, 2016 at 0:58

14

Solved

Whats the easiest way to find out what programming language an application was written in? I would like to know if its vb or c++ or delphi or .net etc from the program exe file.
Darcie asked 16/12, 2008 at 14:26

1

Solved

I have a couple of standard ways of detecting a modified image such as Luminance gradient Copy move detection Metadata Extraction Histogram analysis ELA(Error level analysis) Quantization ...

1

Solved

this question is for study purpose, although I think it is a sensitive topic? My question was really simple. "How can I modify, instead of just extracting cache from Firefox?" BUT as I did se...
Ferromagnetic asked 3/11, 2016 at 0:48

9

Solved

A recent problem* left me wondering whether there is a text editor out there that lets you see every single character of the file, even if they are invisible? Specifically, I'm not looking for hex ...
Lemuroid asked 26/3, 2010 at 21:30

3

Solved

Is it possible to read Windows 2008 LDM partitions in Linux? We have five 512GB LUNS exported through ISCSI to a dead Windows 2008 and this box doesn't want them anymore. Windows believes they ar...
Diaphoretic asked 8/12, 2011 at 7:2

3

Solved

I have a hard drive that I want to overwrite, not with null bytes, but with a message. 48 69 64 64 65 6e 20 = "Hidden " Here's my command thus far: echo "Hidden " > /myfile dd if=/myfile of=/...
Cassius asked 21/12, 2013 at 0:59

5

Solved

I've got a 16GB memory card off someone that won't load properly (asks to be reformatted). I'm trying to get jpegs off it. I've run dd to dump the contents to a file, which worked splendidly. The ...
Incapacity asked 25/2, 2012 at 17:45

8

One of my custom developed ASP.NET sites was hacked today: "Hacked By Swan (Please Stop Wars !.. )" It is using ASP.NET and SQL Server 2005 and IIS 6.0 and Windows 2003 server. I am not using Ajax...
Undervalue asked 21/11, 2008 at 10:49
1

© 2022 - 2024 — McMap. All rights reserved.