115 тысяч подписчиков
155 видео
base64 explained - used for good (email, web) and for evil (malware)
Granting custom root access on a Linux system - sudoers file tutorial
who gained root access on my Linux system - an analysis of sudo logs
gaining root access on a Linux system - sudo tutorial
Want Internet access on a cruise without buying a WiFi package? - try GigSky eSIMs
file permission problems - maybe masking is your problem - umask tutorial
Advanced usage of the linux cd command - change directory tutorial
process monitors for Linux - comparing top and htop
Wyze Cam RTSP setup using Docker on Proxmox - no firmware changes, no monthly charges
Hiding and deleting history on Linux systems - how the hackers hide their actions from you
Basic intro to The Sleuth Kit command line tools
Passthrough physical disk to Virtual Machine - Proxmox tutorial series
Bootable Windows environment for forensics - WinFE
LCL 05 - copying, moving, and deleting files - Linux Command Line tutorial for forensics
LCL 06 - hardware info - Linux Command Line tutorial for forensics
network mapping using the address resolution protocol (arp)
Redundant Array of Independent Disks (RAID) - forensic imaging and re-assembly
OpenVPN install on Proxmox LXC - VPN tutorial
LCL 27 - locate & find - Linux Command Line tutorial for forensics
Android and iOS backup analysis using *LEAPP tools and Linux based tools
Bootable Linux environment for forensics - Sumuri PALADIN
How to create a bootable USB with persistent partition - CAINE distro
LCL 08 - getting help with commands - Linux Command Line tutorial for forensics
tmux tutorial - how to do awesome things with this terminal multiplexer
Logical Volume Manager (LVM) - imaging and forensics
Local DNS with Dnsmasq running in Ubuntu LXC - Proxmox tutorial series
Creating Containers in Proxmox using LXC - setting up a Snapdrop server in LXC vs Virtual Machine
LCL 21 - Process control commands - Linux Command Line tutorial for forensics
The vi text editor - basic intro - Linux Command Line tutorial for forensics
Linux Command Line tutorial - Setting up your system - creating a virtual machine and LiveBoot media
LCL 30 - sed - Linux Command Line tutorial for forensics
The /proc directory - a look into the folder that contains all the running processes
NAS troubleshooting - solutions using Windows to find the invisible NAS
What’s my IP address- wait which IP? Private or Public?
Magnet Virtual Summit Capture The Flag 2023 - iOS walk through
Dynamic Host Configuration Protocol (DHCP) basics tutorial
Connect to your WiFi using Linux command line
Magnet User Summit - Capture The Flag - May 2023 - Cipher
Day in the Life of DFIR - interview with Professor Ali Hadi, Ph.D., Senior Cybersecurity Specialist.
Logical Volume Manager (LVM) - basics tutorial
LCL 10 - changing file attributes - Linux Command Line tutorial for forensics
CAINE - 11 - FTKImager - data acquisition tool for imaging, live capture, and memory capture
LCL 16 - using hdparm to interface with SATA/IDE/SSD drives - Linux Command Line tutorial forensics
iSCSI Target setup on NAS tutorial - the whats and hows of using iSCSI
LCL 29 - grep - Linux Command Line tutorial for forensics
Dynamic Host Configuration Protocol (DHCP) server tutorial
Windows Shortcuts tricks you may not know - especially for Digital Forensics and Incident Response
Triage with Sumuri PALADIN - the Find menu
Logical Volume Manager (LVM) - resizing volumes and adding drives
Getting around the Linux filesystem - Linux Command Line tutorial for forensics
LCL 31 - cut - Linux Command Line tutorial for forensics
Reading Linux filesystems with Windows - ext2/ext3/ext4, XFS, ZFS, BTFS
secure shell (ssh) tutorial - installing and using ssh. setting up ssh keys on the server
mounting and unmounting disks/partitions - Linux Command Line tutorial for forensics - 15
Redundant Array of Independent Disks (RAID) - creating, formatting, and disaster recovery
terminal vs shell vs console - why this is important for linux forensics
Linux forensics - locations of interest - Magnet Forensics Quick Reference Guide
Linux forensics - locations of interest - Magnet Forensics Quick Reference Guide part 2