Recent content by AwesomeMachine

  1. A

    This is How To Really Use DD

    Learn the DD command Among other things, this post will tell you how to image system memory on a running machine to a CD, use dd to keyword search a physical drive with any type of partitions on it, and display disk byte offsets; how to use dd as a disk editor, outputting dd to the terminal...
  2. A

    Forensics Methodology

    Some Rules To Remember <t>Get to the scene fast<br/> <br/> Secure the machine physically<br/> <br/> Do not turn off a running machine<br/> <br/> Disconnect from the network by pulling out the network cable<br/> <br/> Change as little as possible (every key press and mouse click changes...
  3. A

    Most Valued Computer Forensic Certification?

    Certs are not good <t>The only valuable certs are the ones you get by having experience. There are several computer security and forensics certs which require a minimum amount of on the job experience. <br/> <br/> To work in law enforcement you have to be a sworn officer of the law. Police...

About us

  • Our community began in 2004. Since this time, we have grown to have over 29,000+ members within the DFIR & Cyber Security community.

    We are happy to announce that this forum is now under new ownership with the goal to once again become the main Digital Forensics Forum on the internet for DFIR, OSINT and Cyber Security.

    If you can think of ways to help us improve, please let us know.

    We pride ourselves on offering unbiased, critical discussion among people of all different backgrounds.

    We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu