115 тысяч подписчиков
155 видео
base64 explained - used for good (email, web) and for evil (malware)
Granting custom root access on a Linux system - sudoers file tutorial
who gained root access on my Linux system - an analysis of sudo logs
gaining root access on a Linux system - sudo tutorial
Want Internet access on a cruise without buying a WiFi package? - try GigSky eSIMs
file permission problems - maybe masking is your problem - umask tutorial
Advanced usage of the linux cd command - change directory tutorial
process monitors for Linux - comparing top and htop
Wyze Cam RTSP setup using Docker on Proxmox - no firmware changes, no monthly charges
Hiding and deleting history on Linux systems - how the hackers hide their actions from you
Basic intro to The Sleuth Kit command line tools
Passthrough physical disk to Virtual Machine - Proxmox tutorial series
OpenVPN install on Proxmox LXC - VPN tutorial
LCL 27 - locate & find - Linux Command Line tutorial for forensics
Android and iOS backup analysis using *LEAPP tools and Linux based tools
Bootable Linux environment for forensics - Sumuri PALADIN
How to create a bootable USB with persistent partition - CAINE distro
LCL 08 - getting help with commands - Linux Command Line tutorial for forensics
tmux tutorial - how to do awesome things with this terminal multiplexer
Logical Volume Manager (LVM) - imaging and forensics
Local DNS with Dnsmasq running in Ubuntu LXC - Proxmox tutorial series
Creating Containers in Proxmox using LXC - setting up a Snapdrop server in LXC vs Virtual Machine
LCL 21 - Process control commands - Linux Command Line tutorial for forensics
The vi text editor - basic intro - Linux Command Line tutorial for forensics
Linux Command Line tutorial - Setting up your system - creating a virtual machine and LiveBoot media
LCL 30 - sed - Linux Command Line tutorial for forensics
The /proc directory - a look into the folder that contains all the running processes
NAS troubleshooting - solutions using Windows to find the invisible NAS
What’s my IP address- wait which IP? Private or Public?
Magnet Virtual Summit Capture The Flag 2023 - iOS walk through
Dynamic Host Configuration Protocol (DHCP) basics tutorial
Connect to your WiFi using Linux command line
Magnet User Summit - Capture The Flag - May 2023 - Cipher
Day in the Life of DFIR - interview with Professor Ali Hadi, Ph.D., Senior Cybersecurity Specialist.
Logical Volume Manager (LVM) - basics tutorial
LCL 10 - changing file attributes - Linux Command Line tutorial for forensics
CAINE - 11 - FTKImager - data acquisition tool for imaging, live capture, and memory capture
LCL 16 - using hdparm to interface with SATA/IDE/SSD drives - Linux Command Line tutorial forensics
iSCSI Target setup on NAS tutorial - the whats and hows of using iSCSI
LCL 29 - grep - Linux Command Line tutorial for forensics
Dynamic Host Configuration Protocol (DHCP) server tutorial
Windows Shortcuts tricks you may not know - especially for Digital Forensics and Incident Response
Triage with Sumuri PALADIN - the Find menu
Logical Volume Manager (LVM) - resizing volumes and adding drives
Getting around the Linux filesystem - Linux Command Line tutorial for forensics
LCL 31 - cut - Linux Command Line tutorial for forensics
Reading Linux filesystems with Windows - ext2/ext3/ext4, XFS, ZFS, BTFS
secure shell (ssh) tutorial - installing and using ssh. setting up ssh keys on the server
mounting and unmounting disks/partitions - Linux Command Line tutorial for forensics - 15
Redundant Array of Independent Disks (RAID) - creating, formatting, and disaster recovery
LCL 14 - partitioning and formatting with parted and mkfs - Linux Command Line tutorial forensics
mount and backup iOS devices with Linux
LCL 09 - users and groups - Linux Command Line tutorial for forensics
How to enable Wifi drivers in Linux
USB 3.1 WriteBlocker from WiebeTech by CRU - unboxing and review
CAINE 13.0 new release - review and installation tutorial
Logical Volume Manager (LVM) - creating and restoring snapshots
Advanced mounting of dd & EWF images using ewfmount - Linux Command Line tutorial forensics - 20
CAINE - 05 - DDRescue-GUI
Tips and Tricks - 02 - forensically wiping IDE/SATA/SCSI/SSD (SATA/NVMe) drives
LCL 19 - EWF imaging and verification tools - Linux Command Line tutorial for forensics