What is Forensic Informatics? What are Forensic Information Methods?
Corruption, theft and abuse have now gone from paper to electronic media, and almost all of the data in public and private institutions are now …
Knowledge pool for Information Technologies
Corruption, theft and abuse have now gone from paper to electronic media, and almost all of the data in public and private institutions are now …
The scalpel is one of the nice tools that can be used for recovering files that have been deleted from the system for one reason …
The process of bringing back data that has become inaccessible, deleted, corrupted or lost in any way and cannot be reached by normal methods is …
First of all, knowing what you understand and expect from the concept of “pentest” will help you in this process. Because this was afterwards by …
We have described Docker widely. It is a by-product of Docker Fig. Docker is a tool that allows managing the distribution of Linux applications running …
What is Docker? Docker is a software platform that allows you to quickly compile, test and distribute your applications. Docker packages the software into standardized …
We will be discussing the installation of SQL Server 2019, the stable version of which has been released on November 4, 2019. The main features …
We will explain the “uname” command that you can use on your Linux operating system. With this command, you can get the kernel information and …
Before we start with Gophish, we will explain what Phishing is. What is Phishing? It is a type of online attack in which fraudsters send …
DVWA(Damn Vulnerable Web Application), For pentesters and web security users who want to improve themselves in the field of web application security. It is an …