Log In

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
What are the different standards of mobile encryption in modern smartphones?

How effective is encryption against common threats? Has there been anything exciting lately? Apple's usually cooking up something new to...

By admin , 5 months ago

The “Quantum Analyzer 3000” – recovering deleted files

How does the Quantum Analyzer 3000 implement file recovery? Is it some sort of NAND mirroring implementation? Does anyone have...

By admin , 5 months ago

Are there Hack-a-thon type events focusing on cyber forensic?

Is there anything focused on cyber forensic? If you were to organize one, what kind of events would you include?

By AP Malla , 5 months ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla , 5 months ago

LATEST FORUM POSTS