Anti-Forensics and Occult Computing Techniques - AIDE 2012

Anti-Forensics and Occult Computing Techniques - AIDE 2012

via YouTube Direct link

Shadow Copy

15 of 24

15 of 24

Shadow Copy

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Anti-Forensics and Occult Computing Techniques - AIDE 2012

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Short Version
  3. 3 Why Occult Computing?
  4. 4 What's this talk about?
  5. 5 Disks, Tracks, Sectors
  6. 6 Private portable browsers
  7. 7 Boot media
  8. 8 Tools for selective file wiping
  9. 9 Selective File Encryption
  10. 10 Defrag issues
  11. 11 USB device log
  12. 12 Hibernation file
  13. 13 Tool/Solution Kiddies
  14. 14 Timestomp
  15. 15 Shadow Copy
  16. 16 Booby Trapped Device?
  17. 17 Two partitions on a thumbdrive
  18. 18 Cloud Computing?
  19. 19 Thermite
  20. 20 Wipe Tools
  21. 21 One wipe?
  22. 22 Enhanced Secure Erase
  23. 23 Other tools
  24. 24 Change the hash of the file

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.