top of page


Forensic Data Validation Tools
By Srihari Peddamail

Dr. Afsaneh Javadi
10 min read


Acquiring Data with dd and dcfldd in Linux
dd stands for “data dump” and is available on all UNIX and Linux distributions. dd can create a bit-by-bit copy of a physical drive...

Dr. Afsaneh Javadi
3 min read


Indicators Of Compromise
Indicators of compromise are very important to find our system is in danger and can help us either prevent an eventual breach from...

Dr. Afsaneh Javadi
6 min read


Kali Linux tools
Dr.Afsaneh Javadi, Anirban Poul, Lovepreet Kaur

Dr. Afsaneh Javadi
7 min read


RAID (Redundant Array of Independent Disks ) for Digital Forensics:
During forensics investigation, you may face a technology called RAID. In this lesson, we will learn what RAID is and some of its levels.

Dr. Afsaneh Javadi
1 min read


Why a forensics investigator should have complete understanding of File system?
After acquiring and preserving the evidence, evidence should be analyzed. Forensic tools can usually take a partition or a disk image as...

Dr. Afsaneh Javadi
4 min read


NMAP (Network Mapper)
Dr. Afsaneh Javadi, Karan Jindal

Dr. Afsaneh Javadi
8 min read


Forensic Data Acquisition
Data acquisition is the first step computer investigation process model. It is the process of making a forensic image from computer...

Dr. Afsaneh Javadi
1 min read


netcat: A computer networking utility for reading from and writing to network connection
Dr. Afsaneh Javadi

Dr. Afsaneh Javadi
5 min read


Mobile Forensics
Dr.Afsaneh Javadi, Dr.Kiarash Ehtiatkar

Dr. Afsaneh Javadi
11 min read


Autopsy: A free Forensics Tool
"Autopsy is computer software that makes it simpler to deploy many of the open source programs and plugins used in The Sleuth Kit. The...

Dr. Afsaneh Javadi
1 min read
bottom of page