Microsoft – Snake biting its own tail

How important is it to have an update release properly tested before releasing? Probably Microsoft overlooked the fact while releasing the patch ( KB 2756920) on 8th of January 2013. The Patch was released to rectify the vulnerability existed in Dot net framework 3.5.1 as mentioned at This vulnerability allowed the attacker to raise the privilege level (Privilege […]

Read More »

Volume Shadow Copy as an aid to forensic investigations

While conducting forensics examinations I have come across several instances where past activity record on the system had proved helpful. Volume Shadow copy forensics is one of them. What is Volume shadow copy service (VSS):  Also known as volume snapshot service; the feature was introduced with Windows XP. The Idea was to create a backup […]

Read More »

Network tools for Linux

Here are some free, open-source, and useful network tools for Linux: 1) tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Distributed under the BSD license. The […]

Read More »