Hello and welcome to this new series of Student Video Tutorial. This series is basically related Digital Forensics. I will cover wide range of Digital Forensics together with Computer Hacking Forensic Investigation, CHFI.
In this video, we will see FTK IMAGER and use it for Acquiring Disk Image.
Namaste & Swagat cha Tech guff episode 2 maa. Yo episode maa mah Top 4 Nepali APPS ko baarema kura garchu. Ra you kura chai mero personal favourite ko roop maa prastut garnechu. Yo episode maa cover hune top 4 app : – Hamrobazar, Esewa, Net TV, Hamro Keyboard
Tech Guff – EP.2 | Top 4 Nepali APPS | Hamrobazar, Esewa, Net TV, Hamro Keyboard
The Self-claimed White Hat Hacking group OurMine is back in the news and this time it has targeted Vevo and released nearly 3.12TB of its internal data online. According to analysis, some of the documents released online are of sensitive nature.
OurMine is known for targeting famous organizations’ websites or social media accounts of known celebrities to demonstrate how weak the security measures implemented by these high profile firms are. To hack Vevo and acquire such massive amount of data; OurMine hackers hijackedOkta accountof a Vevo employee.
Okta is a workplace app. When the data was hacked, the group reached out to the employee and was told to “fuck off” therefore the hackers posted the data online and sent Gizmodo an email stating that they would remove the data if the company asks them to do so.
– User installs Bitcoin Wallet in PC or Smartphones.
– User will get First Bitcoin Address (Later on, can be created more).
– These address can be shared with friends or any required circle of your own to send money and vice versa.
Balances – block chain
The block chain is a shared public ledger on which the entire Bitcoin network relies. All confirmed transactions are included in the block chain. This way, Bitcoin wallets can calculate their spendable balance and new transactions can be verified to be spending bitcoins that are actually owned by the spender. The integrity and the chronological order of the block chain are enforced with cryptography. “via : https://bitcoin.org/en/how-it-works”