Latest News - Computer Science

Securing Digital Evidence

Securing Digital Evidence Part I: Local Operating System Exploitation The steps a malicious user would take to use fgdump to capture the passwords on a system The fgdump is a tool used to extract...

Software Installation Rollout

Software Installation Rollout Purpose and Timeline VirtualBox and Kali Linux are to be installed in the finance department within a university. This would allow the use of more than one operating...