Here we go again! π #password #cybersecurity #funnyvideo #trending #viralvideo #jokes #meme #IT #infosec #fyp #technology #tech #software
Here we go again! π #password #cybersecurity #funnyvideo #trending #viralvideo #jokes #meme #IT #infosec #fyp #technology #tech #software
Do you know what this is? #cybersecurity #hacker #wifi #trending #viral #fyp #technology #internet #iphone #android #infosec #ai #IT #computer #computerscience #toys #pentesting #career #education
Did you know that deleted pictures can be recovered easily when using the right tools? #cybersecurity #infosec #IT #AI #computerscience #pictures #deleted #fyp #meme #cops #iphone #android #hacker
These vulnerability assessments can be painful sometimes. #cybersecurity #vulnerability #assessment #malware #virus #ransomware #IT #AI #infosec #meme #jokes #nessus #hacker #pentest
Do you think bitlocker can be broken? #bitlocker #microsoft #cybersecurity #hacker #infosec #computer #technology #encryption #password #IT #AI #computerscience #obama
Did you know that itβs possible to recover deleted text messages? #cellphone #iphone #android #galaxy #forensics #cybersecurity #IT #deleteddata #AI #computer #science #cops #digitalforensics #deleted #pictures #infosec #technology #newtechnologies
I think Kali has a version of it.
Itβs called Reaver Pro. Yes, itβs attacking the WPS of a wireless router. For clarification, itβs my own router.
Did you know that itβs possible to recover deleted artifacts like phone call records, messages, pictures, etcβ¦? #forensics #iphone #android #galaxy #cellphone #data #deleted #messages #cybersecurity #IT #AI #computer #evidence #pictures #infosec
Anyone knows what this is? π I love this tool. #hacker #ethicalhacker #cybersecurity #IT #infosec #computerscience #AI #wireless #computer #pentesting #technology #career #advice
Passwords can also be extracted from memory on a Mac. #MacOS #computer #memory #password #recovery #forensics #IT #computerscience #AI #cybersecurity #infosec #cybercrime #investigate
This is a forensic machine and GPU PowerStation combo. The GPUs are needed just to help when trying to break encryption. #forensics #asus #gpu #nvidia #cybersecurity #computer #IT #AI #technology #cybercrime #crime #investigation #gadgets
These are two forensic duplicators. The old Tableau TD2 and the newer Tableau TX1. These machines are used to wipe and clone/copy computer hard drives. #computer #forensics #cybersecurity #cybercrime #technology #IT #AI #crime #investigation
This is the Tableau TX1 machine utilized to image computer hard drives in a forensic way. These are fast and efficient. #computer #cybersecurity #cybercrime #technology #forensics #career #IT #computerscience #AI
Bought the TX1 already. Itβs faster and more efficient. Many more features. I still kept this one though.
Like new.
Yes, Iβve been using it since 2015. I bought 2 of these back then for about $400 each.
This is a device that I purchased to wipe computer hard drives in a forensic way. Once erased, nothing can be recovered. #computer #forensics #datarecovery #technology #cops #cybersecurity #cybercrime #IT #AI
Did you know that passwords could be extracted from your computerβs memory? #password #computer #forensics #lawenforcement #technology #data #recovery
Is it time to replace/upgrade my Tableau forensic duplicator? #computer #forensics #cybercrime #lawenforcement #technology #cybersecurity #cops
This is a computer forensics workstation that was bought a couple of years ago. Itβs still a very reliable machine. #cybersecurity #forensics #cybercrime