Sunday, September 2, 2018
I have a new post up on my company webpage. I've been meaning to post this for a while. After the DNC was hacked in 2016, there were questions (mostly by people chasing one conspiracy theory or another) that the FBI made a mistake by not taking the DNC's server. Not only is taking the server not a typical practice (especially where the owner is a victim and not a perpetrator), it would be extraordinarily difficult. This post breaks down what a server actually is. For readers who are working in IT, there's probably nothing new to see here. For readers coming from a non-technical background, I hope this will prove interesting and informative.
The gist of my post is that, at one time, many servers were basically souped-up desktop computers. This is generally not the case anymore. The resources that ultimately make up a server may span several physical devices and each of those devices may support dozens of servers. It's a many-to-many relationship. Check out the post:
What is a server?
If you need a computer or mobile forensics consultant, I'm available: Trace Digital Forensics, LLC.
As per my New Year's resolution, I've been learning to program in Go and reading The Go Programming Language . On page 141 of the...
Most cryptographic algorithms deal with numbers that are 128 bits or larger. A 128-bit number has 2 128 possible values, but how big ...
This is in response to a Tenable blog post " Do Passwords Matter? " I have several issues with the post that I address here. Pa...