I haven't blogged here much recently. A couple of years back I started a digital forensics consulting firm, Trace Digital Forensics, and have been doing most of my blogging over there. I'm going to try to get back to posting some security, crypto and IT related content here and will cross-post some of the forensics content.
If you need a digital forensics consultant, email me. I can handle most cases involving Windows, Mac, Android and iOS. I'm also working on an arrangement to subcontract for audio and video specialty work. I am open to working either side of a case and am happy to evaluate reports from opposing experts and/or recommend lines of questioning.
Subscribe to:
Post Comments (Atom)
Understanding Scope in Go
As per my New Year's resolution, I've been learning to program in Go and reading The Go Programming Language . On page 141 of the...
-
Most cryptographic algorithms deal with numbers that are 128 bits or larger. A 128-bit number has 2 128 possible values, but how big ...
-
This is in response to a Tenable blog post " Do Passwords Matter? " I have several issues with the post that I address here. Pa...
No comments:
Post a Comment