Password policies - Password creation

Created: Thursday, 13 September 2018

Designing a password policy for applications facing the internet has always been a hot issue. Basically, the decision to enforce a set of rules, revolves around how much you trust your users or how much freedom you are willing to concede, when...

Reconstructing a RAID 5 that holds an NTFS volume without knowing its configuration.

Created: Tuesday, 03 July 2018

To save readers' precious time I would like to emphasize the fact that that this guide applies in raids containing an NTFS formatted volume.

Firstly, keep in mind that this guide serves as a proof of concept, hopefully it will prove...

VirusTotal EnCase6 Hash Set

Created: Monday, 15 December 2014

For the examiners who wish to locate malware in EnCase 6 based on virus signature, I have downloaded the latest VirusTotal database and compiled to an EnCase 6 Hash Set. Note that hashes are MD5 you need to hash your files first. ...

About

Created: Sunday, 27 January 2013

Professional Experience

Since March 2012, I have worked as a Digital Forensics Examiner, handling a wide range of investigations, including:

  • Copyright infringement
  • Data...

© 2012 - 2026 Armen Arsakian updated atSunday 15 March 2026Contact: contact at arsakian.com

-3196 . 5143:v0.85