Password policies - Password creation

Created: Thursday, 13 September 2018

Designing a password policy for applications facing the internet has always been a hot issue. Basically, the decision to enforce a set of rules, revolves around how much you trust your users or how much freedom you are willing to concede, when...

Reconstructing a RAID 5 that holds an NTFS volume without knowing its configuration.

Created: Tuesday, 03 July 2018

To save readers' precious time I would like to emphasize the fact that that this guide applies in raids containing an NTFS formatted volume.

Firstly, keep in mind that this guide serves as a proof of concept, hopefully it will prove...

VirusTotal EnCase6 Hash Set

Created: Monday, 15 December 2014

For the examiners who wish to locate malware in EnCase 6 based on virus signature, I have downloaded the latest VirusTotal database and compiled to an EnCase 6 Hash Set. Note that hashes are MD5 you need to hash your files first. ...

Built with...

Created: Saturday, 05 January 2013

In March 2024, all backed and client libraries are updated, and the site moved to python3.12 rutime.

In April 2023, this site was migrated to GAE standard environment using python3.10 rutime. All back end libraries have been updated as...

© 2012 - 2024 Armen Arsakian updated atFriday 29 March 2024Contact: contact at arsakian.com

-2484 . 4431:v0.85