Improve Privacy on Apple iPhone’s

Apple iOS 15 Guide I came across this guide while taking training with Intel Techniques. Very easy guide to follow – recommend check him out for any update versions. Please read and understand the entire guide before you take any action. First, choose the appropriate option for you (three options). [ Option One ] An […]

How to host your own Counter Strike Global Offensive Server?

Run your own gaming server on Ubuntu 18.04 Using a Linode Server. [ Create a Linode and Account ] Create a Linode running Ubuntu 18.04. Create a Steam account if you do not have one, and download Counter Strike: Global Offensive to your computer. A Steam game server login token (GSLT) is required to host a public CS:GO server. Without […]

Converting Time Zones

Introduction Timestamps play an important role in forensic investigations to build timelines of events and report on the times that activity occurred. One may find timestamps when reviewing files from desktops, servers, embedded computers, and other computerised devices with storage. You can view timestamps using tools such as FTK Imager, file browsers, and command line […]

Basic Linux Terminal Commands

Cheat Sheet [ Shortcuts ] CTRL L = Clear the terminal CTRL D = Logout CTRL A = Cursor to start of the line CTRL E = Cursor to end of the line CTRL U = Delete left CTRL K = Delete right CTRL W = Delete word on the left CTRL R = Reverse […]

There’s a tool for that![A big list of Digital Forensic Tools]

Everything you’ll need for incident response. Digital Forensics and Incident Response (FIR) teams are groups of people in an organisation responsible for managing the response to a security incident, including gathering evidence of the incident, remediating its effects, and implementing controls to prevent the incident from recurring in the future. [ IR Tools Collection ] […]

Introduction to Digital Forensics

What is Digital Forensics? Credit to frankwxu The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after: Proper search authority Chain of custody (Evidence Transmittal Letter) Validation with mathematics (hash function) Use of validated tools Repeatability Reporting Possible expert presentation The application of science to identification,collection, […]

How to search the darknet?

A list of tools and to help you navigate the darkweb. [ TOOLS ] Hunchly – Daily dark web reports can help you identify new hidden services. H-Indexer – Tor required. Tor66 Fresh Onions – Tor required. Onionscan – Free and open source tool for investigating the Dark Web. Onioff – Python script for inspecting […]

{macOS_commands} terminal commands for MacOS. a-z.

today we dive into the macOS terminal window  and discover the available commands we can run. so grab your coffee, sit down in the commanders seat, open that terminal window annnnnnnnddddddd……………type: { a } afconvert :// audio file convert afinfo :// audio file info afplay :// audio file play airport :// manage apple airport alias […]

{session private messenger} how to host an open group

i will assume that you’re already a user of Session since you’re interested in hosting/creating your own open group chat.  but just in case your asking….what is Session?  straight from them: “Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form […]

{firefox} browser privacy configuration

let’s be honest – websites and internet browsers know more about you and your family then god him/her/he/she/they/them/it/nil/null/peanut-self will ever know. even worst….if you want to take steps to be less identifiable, websites will just deny you access to their service or make you jump through hoops until you break and say fu*k it. there […]