David E Lares SPractical Forensic-Response Concepts 101The forensic applied to computers (informatics) references any kind of scientific and research method that can be used for digital evidence…May 14May 14
David E Lares SForensic response for smartphones 101Let’s start with a quick network background.Apr 25Apr 25
David E Lares SFirewall filtering overviewTo introduce firewalls, we need to start this post by discussing networks, the backbone component of them all.Apr 12Apr 12
David E Lares SA brief overview of Ctypes in Python for WindowsAre you familiar with Python and C language? Check this resource.Apr 4Apr 4
David E Lares SinFAUN — Developer Community 🐾GeoIP lookups with NginxAssuming you already had a fresh installation of a Linux OS and the Nginx server (if not, check this post), we can perform server-side…Mar 26Mar 26
David E Lares SDMZ networks in a nutshellIt’s pretty much common to have enterprise networks that require some time to expose services on the Internet, not only to expose them but…Mar 21Mar 21
David E Lares SinSystem WeaknessAndroid Malware Analysis OverviewThe smartphone world is huge and this carries a lot of benefits but also vulnerabilities and risks. To achieve effective testing, we can…Mar 4Mar 4
David E Lares SinSystem WeaknessThe Role of the DNS’s SNF RecordBefore going into technical aspects, we use email as our main communication tool for business, the impact of misconfiguration, negligence…Feb 23Feb 23
David E Lares SA Crash Reading of ChecksumsHave you possibly heard about checksums, or even seen it in every download you make in a day, that little code that you see near a…Feb 9Feb 9
David E Lares SHDDs and static partitioningThe best way to install Linux IMO is by sectioning the OS installation and some of the main folders in separate partitions.Feb 9Feb 9