2012
an archive of posts from this year
Dec 4, 2012 | Microsoft Volume Licence with KMS |
---|---|
Sep 20, 2012 | Demystifying Registry (1) |
Sep 9, 2012 | Memory Forensics with Volatility |
Aug 8, 2012 | Anonymizing Activities: Tor (The Onion Routing) |
Jul 27, 2012 | Profiling Insider Threats - Pre-detection model |
Jul 16, 2012 | The Era of Cyber Sabotage & Warfare (Case Study: Stuxnet) |