Completed
USB device log
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Anti-Forensics and Occult Computing Techniques - AIDE 2012
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Short Version
- 3 Why Occult Computing?
- 4 What's this talk about?
- 5 Disks, Tracks, Sectors
- 6 Private portable browsers
- 7 Boot media
- 8 Tools for selective file wiping
- 9 Selective File Encryption
- 10 Defrag issues
- 11 USB device log
- 12 Hibernation file
- 13 Tool/Solution Kiddies
- 14 Timestomp
- 15 Shadow Copy
- 16 Booby Trapped Device?
- 17 Two partitions on a thumbdrive
- 18 Cloud Computing?
- 19 Thermite
- 20 Wipe Tools
- 21 One wipe?
- 22 Enhanced Secure Erase
- 23 Other tools
- 24 Change the hash of the file