Introductie

Het komt steeds vaker voor dat de hulp wordt ingeroepen van digitaal forensisch onderzoekers. Onderzoek van pc's, netwerken, mobiele telefoons en aanverwante media vragen diepgaande kennis. Naast deze kennis zijn de tools voor het achterhalen van bepaalde gegevens en de interpretatie van gegevens zeer belangrijk. Deze blog zal proberen oplossingen aan te dragen voor hulp bij digitaal onderzoek. Verschillende tools passeren de revue, interessante artikelen worden verder uitgediept, links naar andere forensische sites en handleidingen ter ondersteuning komen aan bod.
ip information

dinsdag 31 juli 2007

Gnucitizen's GHDB

GNUCITIZEN is a creative hacker organization. So, what does that mean? Well, it means that everything on GNUCITIZEN is about creativity and hacking. It also means that the content and all projects released as part of the organization are written and developed by, guess what, creative hackers. Creativity and hacking are closely related terms and very often they can substitute each other, but we like to put them together just to stress our identity.

How does GNUCITIZEN differentiate from other hacker organizations? Although 99.9% of the content published under the GNUCITIZEN hat is mostly about security, we tackle hacking from many different angles. To hack something does not necessarily means to penetrate it security-wise. Hacking is a creative form of expressing ourselves in a clever way. GNUCITIZEN members fall back to IT security very often, since this is what we can do best. However, we have other creative project on the line as well. Currently we concentrate our efforts on the Web2.0 sphere. We find it a very fascinating thing to work on.

http://www.gnucitizen.org/projects/ghdb

GHDB (a.k.a. Google Hacking Database) is HTML/JavaScript wrapper application that uses advance JavaScript techniques to scrape information from Johnny’s Google Hacking Database without the need for hosted server side scripts.

In attempt to show the real dangers of AJAX APIs they’ve created a completely harmless interface to Johnny’s Google Hacking Database. Keep in mind that no service side scripts are required from the Gnucitizen side. Also, keep in mind that all they provide is a single HTML page with a few JavaScript files to glue the interface together.

maandag 30 juli 2007

Returnil Virtual System

http://www.returnilvirtualsystem.com/index.htm


Returnil Virtual System is a powerful technology that clones a copy of your System Partition in memory and can create a file based Virtual Partition where you can save documents, data, and files while using the System Protection feature. Returnil Virtual System protects your computer from harmful viruses, Spyware and unwanted programs, preserves your computer settings, and ensures your Internet Privacy. Simply restart your computer to erase all changes.


When the Returnil protection is ON, your Windows system is running on a virtual partition meaning that every single change in the system partition actually takes place in memory. Therefore, all data and modifications will be lost after your system reboots. By restarting you PC, Returnil will discard all attempted changes made to your System Partition while Protection is ON.

When the Returnil Protection is OFF, you can install or remove any programs, create documents, install security upgrades and software patches, alter configurations, and update user accounts. All changes in the system partition will remain following a reboot.

Features

The Returnil Virtual System:
> Keeps your System Partition safe when browsing the Internet
> Viruses, Trojans, Worms, Adware, Spyware, and unwanted content disappear with a simple reboot
> Enforces settings and protects your internet privacy
> Helps reduce overall disk wear by using memory rather than HDD cloning technology
> Saves you time, money, and lost hair by maintaining or improving peak computer performance
> Reduces or eliminates the need for routine disk de-fragmentation of your system partition
> Your spam filter is strong, but not infallible – Returnil will eliminate the consequences of opening infected e-mail and/or attachments
> Leaves absolutely no traces of computer activities
> Eliminates all activities even if your computer is powered-off or crashes
> Eliminates the danger of evaluating new software that does not require a reboot to install
> Offers stronger, simpler and smarter protection for your PC
> Seamless integration with supported Windows Operating Systems
> Easy to use, simple to configure, and the one tool in your arsenal that will be there to save the day when all else fails!

Hacker Evolution




From the creators of a successful hacker games series (Digital Hazard, BS Hacker, etc) Hacker Evolution is a new hacking simulation game, featuring unparalleled graphics and features.You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it.When a stock market, a central bank, satellite uplink and transoceanic fiber optics links crash, you know this is more then a simple event. Something big is behind all this, and you have to figure out what is it.You hack into computers, look for exploits and information, steal money to buy hardware upgrades in an attempt to put all the pieces of a big puzzle, together.Set in a virtual operating system environment, the game is packed with all the features required to bring the hacker feeling and experience to every gamer.The concept behind Hacker Evolution is to create a game that challenges the gamer's intelligence, attention and focus, creating a captivating mind game. Solve puzzles, examine code and bits of information, to help you achieve your objectives.




Game features:
Modding capability to allow the creation of custom levels.
The included mod editor, allows you to create new game levels easily.
Multiple interface skins
Complex levels and gameplay to guarantee the best experience
Optional freelance jobs to offer more variety
Complex command console with over 20 commands and tools System requirements:

Real Time Visitors !