2012
an archive of posts from this year
| Dec 4, 2012 | Microsoft Volume Licence with KMS |
|---|---|
| Sep 20, 2012 | Demystifying Registry (1) |
| Sep 9, 2012 | Memory Forensics with Volatility |
| Aug 8, 2012 | Anonymizing Activities: Tor (The Onion Routing) |
| Jul 27, 2012 | Profiling Insider Threats - Pre-detection model |
| Jul 16, 2012 | The Era of Cyber Sabotage & Warfare (Case Study: Stuxnet) |