Blog
Live Evidence Investigation
ProDiscover

Live Evidence Investigation

  Live Evidence Investigation Project Name: Live Evidence Investigation Description: Live Evidence Investigation is a very difficult level of sophisticated job. In this blog we will try to understand step by step guide to concepts of Live Evidence Investigation. Author: Rohit D Sadgune Summary of Contents ·         RAM Forensics Basic …

Read More
Server Hacked
Linux Server Investigation

Compromised Linux Server Investigation

Compromised Linux Server Investigation Project Name: Compromised Linux Server Investigation Description: Compromised Linux Server Investigation in India is a very precise level of sophisticated job. In this blog we will try yo understand step by step guide to Linux server forensics investigation & incident response. In term of Compromised Linux Server …

Read More
prodiscover forensics
ProDiscover

How to use ProDiscover

How to use ProDiscover   Project Name: How to use ProDiscover Description: Step by step guide to How to use ProDiscover Incident Response customization Author: Rohit D Sadgune Summary of Contents In this blog we will learn following things How to start prodiscover incident response How to use ProDiscover Project …

Read More
Advance Data Recovery
Data Recovery

Advance Data Recovery

Advance Data Recovery 1.    Chances for Data Recovery of Deleted files 2.    Chances for Data Recovery of Formatted File Systems   Chances for Data Recovery of Deleted files Windows file systems Famous Windows file systems which includes FAT (with FAT32 extension), NTFS and newly produced file system ReFS for Windows …

Read More
Data Recovery Concept
Data Recovery

Data Recovery Concept

Data Recovery Concept   Data Recovery Concepts deal with following things What is data Loss Common Computer Problems Data Analysis Concepts Data Recovery Tips Data Recovery Technique Basic Data Recovery Advance Data Recovery Data Recovery is the process of extracting digital information in the form of data from damaged, failed, …

Read More
Cyber Threat
Indicator of Attack vs Indicator of Compromises

Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: –  Cyber Threats are nothing but system to system attack that creates adversary’s efforts on the confidentiality, integrity, or availability of a digital information resident on system. Cyber-attacks are increasing in …

How to keep your cell phones secure
Cyber Threat
How to keep your cell phones secure

How to keep your cell phones secure Project Name: How to keep your cell phones secure Description: Mobile malware is spreading exponentially today, stealing personal and professional information which may ruin one’s financial, professional and mental health. This blog shares all simple tips to understand how one’s cell phone can be …

Power of Security Operation Center
Cyber Threat
Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Cyber Security Lifecycle
Cyber Threat
1
Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Types of System Software
Cyber Threat
Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

Cyber Threat

Indicator of Attack vs Indicator of Compromises

Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: –  Cyber Threats are nothing but system to system attack that creates adversary’s efforts on the confidentiality, integrity, or availability of a digital information resident on system. Cyber-attacks are increasing in …

How to keep your cell phones secure
Cyber Threat

How to keep your cell phones secure

How to keep your cell phones secure Project Name: How to keep your cell phones secure Description: Mobile malware is spreading exponentially today, stealing personal and professional information which may ruin one’s financial, professional and mental health. This blog shares all simple tips to understand how one’s cell phone can be …

Power of Security Operation Center
Cyber Threat

Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Cyber Security Lifecycle
Cyber Threat
1

Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …