Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web


You’ve probably seen those deep-web images floating around on the Internet. Usually, it goes something like this: There is a towering iceberg and the deeper the underwater portion extends, the more “hidden” and “exotic” the content is described to be. Sometimes these images are accurate to a point, but most are just making things up.
Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web
So what exactly is ‘deep web’ then? Are there really hidden secrets and treasure buried under some cloak and dagger type conspiracy? Well, in short, the answer depends on your idea of treasure and conspiracy.

Encryption Is Not Enough !, Research & Conclusion (Part 1)


By : BIJAY ACHARYA
Hello World ! Well, welcome in my post. This will be in series, and this is first part. Throughout the series, I will share my research and findings with you. And that will be on topic, Encryption Is Not Enough. We will see, how Encryption is broken & what countermeasures should be implemented to secure it.

 

Image via traxarmstrong.com

Let’s begin, Why do we encrypt ?
-We encrypt, simply for privacy & secrecy
-We encrypt, in pro term : for Confidentiality & Integrity. Well, these are basics for encryption.

CHFI Exam Study Guide (Part 1) – Reporting Detected Cyber Crimes, ETI Theory of Investigation, Contents of Forensic Report, CHFI Exam Questions


Download Link
Our free CHFI exam study guide covers topics such as Windows Forensics, Cyber Crime, Digital Evidence and Data Acquisition and Duplication, to name a few. Begin refreshing your memory with our interactive study guide today, so you can be on your way to becoming a certified Computer Hacking and Forensics investigator. Let’s begin. 

Subscribe : SVT
Follow : BJ
Like : Ethical Hacking News & Update

Full Article HERE