top of page
Search

Yashshvi
Oct 13, 20233 min read
Write Blocker: Blocks Writing Access, Upholds Integrity, and Ensures Authenticity
In the rapidly changing principality of technology and the vast expanse of digital information, upholding the integrity of evidence...
574 views

Case Study
Sep 29, 20232 min read
Password Recovery of a Smartphone in less than 15 minutes: Another Technological Endeavor
In today's era, safeguarding personal data with passwords is the norm. However, this routine security measure presents a unique challenge...
293 views

Aditya Arora
Sep 19, 20235 min read
Network Forensics: Footprinting and Network Sniffing
Hello World! As cyber threats keep evolving, staying ahead is not an option but a necessity. Care to join me as I embark on demystifying...
242 views
bottom of page