Hey Readers, A great way to supplement a strong password is to use another form of authentication while signing into your accounts. You may often hear this called two-factor authentication(2FA) or multi-factor authentication. We will discuss in more detail what multi-factor authentication is and how it can help secure your accounts and devices. Furthermore, we … Read moreBasic Online Security: Multi-Factor Authentication
Hey readers, My last post on program execution touched on a way to see program execution using file explorer. However, today we will be looking at how you can get more information about: file access, internet browsing history, last visit time, visit count, and much more which is recorded by an unlikely program. What you … Read moreWindows Explorer Evidence Using Browsing History.
Let’s set the stage, a computer has been compromised and now you need to figure out what programs the attacker executed while on the system. In this post, I will show you a few locations in both the Windows registry and the Windows file system that can help you gather evidence on program execution. What … Read moreForensics: Program Execution
Hey readers, With the new year underway, I thought it would be a good idea to do a series of posts on basic internet security and best practices. I will be starting this series with passwords, as it is likely one of the most important things that users must get a handle on. Am I … Read moreBasic Online Security: Passwords
Wuddup reader, Today we will be looking through a few Windows registry hives to find information like what USB devices have been used, what user accessed the device, where it was located and much more. I encourage you to follow along as this is a fairly painless investigation. Getting Started: Before we get going let’s … Read moreBasic USB Forensics in Windows
Email is an old and insecure form of communication on the internet. Therefore choosing an email provider is important business. In this post, I will talk about some problems that surface when using some email providers and how their practices can be a gross invasion of your online privacy. Okay, let’s start with a scenario, … Read moreLet’s Talk About E-mail.
Did you know there could be over 20 domains trying to collect information and serve ads on a website? Each of these domains could be hitting your network with over 10 scripts. Scripts are responsible for tracking you across many sites. So they can track your shopping habits, interests, and browsing behavior. Also, while browsing … Read moreEssential Browser Extensions For Security
One of the most used applications on your computer is your web browser. Although Firefox is a great browser that respects the user’s privacy. Using default settings in Firefox can result in some security and tracking flaws. After a few minor changes in Firefox’s settings results in a more secure browsing experience. Step 1: … Read moreSecuring Firefox
When you loaded this webpage today, you used an application like a phone app or a web browser. The application then needs to transport the web page information held on web-servers likely states away. Your computer uses either the transport protocol TCP or UDP to transport effectively. TCP TCP stands for Transmission … Read moreInternet Transportation TCP and UDP