lowmanio.co.uk
Lowmanio.co.uk - My rabbits, Pixel and Nybble
https://www.lowmanio.co.uk/rabbits
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Born: 23rd May 2007. Colour: White and brown. Likes: Alfalfa treats, being left to sleep, chewing cables. Born: 1st August 2007. I'm on Forensics Lunch!
lowmanio.co.uk
Lowmanio.co.uk - Blog entry: Board Game Foamcore Inserts
https://www.lowmanio.co.uk/blog/entries/board-game-foamcore-inserts
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Board Game Foamcore Inserts. Sun, 15 Feb 2015 03:37PM. Category: Homemade arts and crafts. Comprising of coins, terrain tiles, various tokens, buildings, meeple. In hi...
lowmanio.co.uk
Lowmanio.co.uk - Programming projects
https://www.lowmanio.co.uk/projects/code
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Most of these scripts and code snippets can be found in my GitHub repository: https:/ github.com/lowmanio/Lowmanio-Code-Snippets. Windows File Tunnelling example.
lowmanio.co.uk
Lowmanio.co.uk - CATEGORY: Forensics & science
https://www.lowmanio.co.uk/blog/categories/forensics-&-science
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Articles with the category: Forensics and science. Bullet casing in the Pentlands. Mon, 05 Apr 2010 05:27PM. I went for a walk in the Pentlands. Sorry for not blogging...
lowmanio.co.uk
Lowmanio.co.uk - Blog entry: Storing passwords in your browser
https://www.lowmanio.co.uk/blog/entries/storing-passwords-in-your-browser
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Storing passwords in your browser. Sun, 25 Jan 2015 12:01PM. Category: Cyber Security and Threat Management. Can someone extract out the passwords forensically? Easy p...
lowmanio.co.uk
Lowmanio.co.uk - Blog entry: Malware Steganography
https://www.lowmanio.co.uk/blog/entries/malware-steganography
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Sun, 12 Apr 2015 02:56PM. Category: Digital Forensics and Malware. 6 years ago (yikes! I wrote about image steganography. I have modified the script I supplied in my l...
lowmanio.co.uk
Lowmanio.co.uk - Blog entry: CompTIA Security+ Exam
https://www.lowmanio.co.uk/blog/entries/comptia-security+-exam
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Wed, 08 Oct 2014 07:05PM. Category: Cyber Security and Threat Management. A few weeks ago I took the CompTIA Security (version SY0-301). CompTIA Security Review Guide.
lowmanio.co.uk
Lowmanio.co.uk - TAG: Malware
https://www.lowmanio.co.uk/blog/tags/malware
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Articles with the tag: Malware. What makes malware sophisticated? Sat, 25 Apr 2015 11:46AM. And the conference slide pack here. Sun, 12 Apr 2015 02:56PM. That makes th...
lowmanio.co.uk
Lowmanio.co.uk - TAG: sophisticated cyber attack
https://www.lowmanio.co.uk/blog/tags/sophisticated-cyber-attack
Find me on Facebook. Web History Visualisation For Forensic Investigations [published paper]. Web History Visualisation For Forensic Investigations [thesis]. The Effect of File and Disk Encryption on Computer Forensics. The Criminology of Computer Crime. Central Issues in Network Management. Virtual Machines for the Intel 386 Architecture. Articles with the tag: sophisticated cyber attack. What makes malware sophisticated? Sat, 25 Apr 2015 11:46AM. And the conference slide pack here. Using Python 2.6.