Dedicated towards the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The field is the application of several information security principles and aims to provide for attribution and event reconstruction following forth from audit processes. This subreddit is not limited to just the computers and encompasses all media that may also fall under digital forensics (e.g., cellphones, video, etc.).
Subreddit for students or anyone studying Network Security. This is the place to ask questions regarding your netsec homework, or perhaps you need resources for certain subjects, either way you'll find them here! If you have info or resources you want added to resources, just let us know!
A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security.
Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited the classical example of encrypting messages so that only the key-holder can read it. Cryptography lives at an intersection of math, programming, and computer science. This subreddit covers the theory and practice of modern and *strong* cryptography, and it is a technical subreddit focused on the algorithms and implementations of cryptography.
Welcome to the guide by Zempirians to help you along the path from a neophyte to an elite... From here you will learn the resources to expand your knowledge and from there you can access our stronger resources for hands on training and wargames.... Free Public Access to Zempirians Training Lab - http://training.zempirians.com
Welcome to **Tales From Tech Support**, where we share our stories of: * *Incredible Feats* of Networking Heroics; * *Tech Troubleshooting* Under the Direst Circumstances; * *Unsolvable Problems* Cracked by Sheer Genius and/or Pure Luck; * *Moral Support* after Having Dealt with Difficult Clients; * And of course, **Stupid User Stories!** We've got a bit of a lull in the queue just now, so kick back, grab a cold one, and share your best tales among friends here at TFTS!
Windows PowerShell (POSH) is a command-line shell and associated scripting language created by Microsoft. Offering full access to COM, WMI and .NET, POSH is a full-featured task automation framework for distributed Microsoft platforms and solutions.
For all issues/questions/materials regarding the Certified Information Systems Security Professional (CISSP®) exam. Welcome to the *friendly* forum for anything regarding studying, writing, and working with the CISSP® exam certification. We understand its difficulty and are here to help!
Are you an activist worried about the boys in blue knocking down your door? Are you afraid of the TSA telling you to boot up your computer along with spreading your cheeks? Well come on into /r/antiforensics! Learn how you can better your privacy by making it much more difficult to do any investigation on your computers. Read articles, have discussions with fellow subscribers, or just share your stories! Knowledge is power!