搜索资源列表
FU_Rootkit
- hide processes, elevate process privileges, fake out the Windows Event Viewer so that forensics is impossible, and even hide device drivers (NEW!) All this without any hooking.
anquan_mg
- 网络安全--取证与蜜罐(计算机取证技术部分).pdf-network security -- with the evidence Honeypot (Computer Forensics). Pdf
X-Ways-forensics-readme
- 计算机取证界的权威软件X-Ways forensics的中文使用帮助,在网上很难找到的,chm格式
毕业论文_Windows下取证研究
- 论文从计算机取证角度出发,详细研究操作系统内核、入侵与反入侵策略、网络监测技术、系统分析技术等。用软件工程的方法,设计实现适合于Windows NT/2000/XP操作系统下的计算机取证软件-papers from the perspective of Computer Forensics, a detailed study operating system kernel, the invasion and the anti-invasion strategy, network monitori
LiveView_0.7b_Public_src.tar
- Live View 是一个采用 Java 开发的图形化工具,用来从直接从某个磁盘分区或者整个磁盘来创建一个 VMware 的虚拟机。 最新版0.7b已经支持Vista和Windows Server 2008-LiveView is a forensics tool that creates a VMware virtual machine out of a raw (dd-style) disk image. This allows an examiner to "boo
iehist
- 一个通过读取index.dat获取IE历史记录的程序,可用于电子取证技术。-IE index.dat get by reading a history of the program can be used for electronic forensics.
计算机取证概述
- 计算机取证概述-Overview of computer forensics
research_and_design_of_protocol_analysis_based_nid
- 论文,《基于协议分析的网络入侵取证系统的研究与设计》-Papers, based on protocol analysis of Network Intrusion Forensics System Research and Design
wangluoquzhengjishuyanjiu
- 网络取证技术研究,通过对其相关技术研究为广大研究者提供参考资料。-Network Forensics, through its relevant technical studies to provide reference materials for the general researcher.
wangluoquzhengfenbushiguanli
- 网络取证日志分布式安全管理,为从事网络犯罪取证方面研究的读者提供参考。-Log Distributed Network Forensics Security Management, in order to engage in cyber-crime research evidence to provide reference readers.
wangluoquzhengyufenxixitongfenxi
- 本文档关于网络取证与分析系统的设计与实现,通过介绍说明其功能实现。-This document on Network Forensics and Analysis System Design and Implementation, through the presentation of its functions.
Oreilly.iPhone.Forensics
- 本书是关于iPhone编程的学习,因为是一个概论,所以我选择开发环境为CHM-This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!
htmlhelp
- 能够实现计算机网页取证,是一个数字取证软件-Computer forensics enables website is a digital forensics software
Prospects_on_Blind_Digital_Image_Forensics_Technol
- 数字图像盲取证技术作为一种不依赖任何预签名提取或预嵌入信息来鉴别图像真伪和来源的技术, 正逐步成为多媒 体安全领域新的研究热点,基于真实性鉴别的数字图像盲取证技术综述-Digital image forensics technology as a signature does not depend on any pre-extracted or pre-embedded information to identify the source of the image authenticity
COFEE-ORIGINAL-TORRENT
- COFEE全称为“计算机在线法庭科学证据提取器(Computer Online Forensic Evidence Extractor)”,是一款微软免费提供给国际刑警组织使用的证据提取工具,微软是这样描述的COFEE的:“有了COFEE,没有合适的计算机取证能力的执法机构可以轻松、可靠而且高效地收集现场证据。一个只有最基础的计算机知识的人也可以在不超过10分钟的时间里学会如何使用配置好的COFEE设备,执法人员可以像专家一样收集重要的犯罪证据,其复杂程度就像将USB插入计算机那样。”-COFE
Digital-Forensics
- I wrote simple article about Digital Forensics in Electronics for You megazine. This is primer for digital forensics concepts.
Scene-of-the-Cybercrime---Computer-Forensics-Hand
- Scene of the Cybercrime - Computer Forensics Handbook
myPCA_Nicolas
- PCA可用于图像检测的盲取证方面,效果非常好-PCA can be used for blind image forensics testing, the effect is very good
Android-Forensics
- Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform
Forensics
- A Tutorial of the Wavelet Transform (Forensics)