±Partners and Sponsors
New Today: 1
New Yesterday: 4
· Webmail Forensics – Digging deeper into Browsers and Mobile Applications
· Operation Endeavour: The Tip of the Iceberg?
· Forensic analysis of the ESE database in Internet Explorer 10
· WhatsApp – discovering timestamps of deleted messages
· Man In The Middle Attack: Forensics
· Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
· Windows 8 File History Analysis
· Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
· Bitcoin Forensics Part II: The Secret Web Strikes Back
±Follow Forensic Focus
Search found 1160 matches
jaclaz[/quote]It certainly would. Especially when used in a batch file.
Unfortunately most all schools are in the business to m ...
- Topic: Question: forensic oriented scripting or programming courses
- Replies: 9
- Views: 874
Your posts have ...