Scenario You have just started a new role as a Security Consultant for Frozen Yoghurt Limited. Name of Company: Frozen Yoghurt Ltd, UK Description: This company specializes in the in-shop sale of [...]

Malware Analysis

- Posted in Project by

MALWARE ANALYSIS: Malware analysis is the process of examining malicious software to understand its functionality, origin, and potential impact. This involves studying the malware's code, behavior, [...]

Recycle Bin Forensic

- Posted in Windows Artifacts by

The Recycle Bin is a feature in Microsoft Windows that allows users to recover deleted files. When a file is deleted from the computer, it is not immediately erased from the hard drive but instead it [...]

JUMPLIST

- Posted in Windows Artifacts by

Jump Lists were introduced with the release of Windows 7. Jump Lists are automatically created by Windows to allow users to ‘jump to’ or access items they frequently or recently accessed. Jump [...]

PDF FORENSIC

- Posted in Project by

Scenario You are a forensic examiner in a large firm. David, a colleague of yours from the HR department, received two resumes for an open position within the firm. David viewed the resumes and [...]