That InfoSec Guy

InfoSec ramblings and other loosely related topics

Menu
Skip to content
  • Home
  • About Me
  • Documents
    • Data Breach Reports
      • Equifax
      • Marriott
  • PGP Public Key
  • Projects
    • Malware Hash Tables
    • Project Black Water
  • Random Quotes
    • Hidden Quotes
  • Resources
    • Forensic Tools
    • Security Awareness Training
    • Videos
    • Tools
  • Scams
FTK Windows Server 2008 SYSTEM Filter
  • Forensics

FTK Windows Server 2008 SYSTEM Filter

  • Posted on 2013-07-302019-02-19
  • by George Silowash

I recently found it necessary to quickly grab a large amount of SYSTEM registry files to determine the current control set and time zone information. FTK displays this information upon…

Read More
More FTK Filters
  • Forensics

More FTK Filters

  • Posted on 2013-07-152019-01-19
  • by George Silowash

In my last post, I mentioned two useful FTK filters for quickly finding files of interest. Below are two more that may be helpful to a digital investigator examining a…

Read More
FTK Filters are Your Friend
  • Forensics

FTK Filters are Your Friend

  • Posted on 2013-07-122019-01-19
  • by George Silowash

I have been working on a forensic investigation of about 20 Windows Server 2008 R2 VMs using FTK 4.2. FTK makes examining many systems manageable. One feature that has saved…

Read More
  • INFOSEC

Going Paperless: Where Paper Meets Bits and Bytes

  • Posted on 2012-08-292019-01-19
  • by George Silowash

A client consulted me about going to a paperless environment. His company utilizes several different forms and numerous other documents through the course of daily business. These documents were typically…

Read More
Logging User Activities within Linux with bash scripts
  • INFOSEC

Logging User Activities within Linux with bash scripts

  • Posted on 2012-08-232019-01-19
  • by George Silowash

I am just starting to learn the power of bash scripting. So, this script below may not be the best way of doing this, but hear me out. I often find…

Read More
  • INFOSEC

pam_tally2 Authentication issues

  • Posted on 2012-08-232019-01-19
  • by George Silowash

The other day I was trying to log in with a newly created user in CentOS Linux with the The United States Government Configuration Baseline (USGCB) security settings applied. The…

Read More
  • INFOSEC

Corporate Data Leakage in the “Clouds”

  • Posted on 2010-07-082019-01-19
  • by George Silowash

Folks, I am a bit sick of hearing “cloud” used as the latest buzzword to describe anything from a simple website hosted on a shared server sitting in a datacenter…

Read More
  • INFOSEC

Security Short: Wireless ENCRYPTION…..ENCRYPTION!

  • Posted on 2010-06-242019-01-19
  • by George Silowash

Admin Note: This post is in response to a recent posting I made regarding Google’s wireless collection activities. This “Security Short” provides some brief information on improving the security of…

Read More
  • INFOSEC

Security Short: OPSEC for the home

  • Posted on 2010-06-232019-01-19
  • by George Silowash

Enterprises develop policies for protecting all kinds of assets, both physical and virtual. Some of these policies cover Operations Security or OPSEC. Examples of OPSEC include not displaying your company…

Read More
  • INFOSEC

Security Short: SSID What?

  • Posted on 2010-06-222019-01-19
  • by George Silowash

Admin Note: This post is in response to a recent posting I made regarding Google’s wireless collection activities. This “Security Short” provides some brief information on improving the security of…

Read More

Posts pagination

Previous Page Page 1 Page 2 Page 3 … Page 5 Next Page

Recent Posts

  • Protected: The Never-Ending Deluge of Vendor Emails: A CIO’s Nightmare
  • Dump Your Users’ Email Forwarding Recipients from Office 365
  • Raspberry Pi Backup
  • More Credential Phishing
  • Threat Intelligence

Categories

  • Forensics
  • Ham Radio
  • INFOSEC
  • Life
  • Random
  • Raspberry Pi
  • Scams
  • Tech
  • Threat Intel
  • Water Cooler

Archives

Things I Read

  • Schneier on Security
  • Ars Technica
  • CIO
  • Bellingcat: the home of online investigations
  • IntelTechniques
© Copyright 2025 – That InfoSec Guy
Bezel Theme by SimpleFreeThemes ⋅ Powered by WordPress