Please turn JavaScript on
header-image

Hackercool Magazine

follow.it gives you an easy way to subscribe to Hackercool Magazine's news feed! Click on Follow below and we deliver the updates you want via email, phone or you can read them here on the website on your own news page.

You can also unsubscribe anytime painlessly. You can even combine feeds from Hackercool Magazine with other site's feeds!

Title: Home - Hackercool Magazine

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.14 / day

Message History

Hello, aspiring Cyber Forensic Investigators. In our previous blogpost, you learnt in detail about digital forensics. In this article, you will learn about Memory Forensics. When most people think about digital forensics, they imagine hard drives, deleted files and disk images. While disk forensics is still important, many modern attacks leave their most valuable evidence […]...


Read full story

Hello, aspiring cyber forensic investigators. In our previous blogpost, you have learnt in detail about Digital Forensics. In this article, you will learn about Cloud Forensics. As organizations move more data and services to the cloud, security incidents are no longer confined to laptops, servers or on-premise networks. Many investigations today involve virtual machines, clo...


Read full story

Hello, aspiring Cyber Forensic Investigators. In this article, you will learn about Foremost, a Forensic tool used for file carving. In digital forensics, one of the most common tasks is retrieving deleted or hidden files from storage media. Whether investigators are analyzing a compromised server, a suspect’s hard drive or a damaged USB stick, they […]

The post


Read full story

Hello aspiring Cyber Forensic Investigators. In our previous blogpost, you learnt in detail about Computer Forensics. In this article, you will learn about Bulk Extractor, a fast, automated forensic carving tool. Digital forensic investigations often require extracting useful information from massive amounts of data like disk images, memory dumps, captured network traffic and...


Read full story

Hello, aspiring Cyber Forensic Investigators. In our previous blogpost on Computer Forensics, you learnt about different types of forensics. In this article, you will learn about Volatility, a memory forensics tool. In modern digital forensics and incident response, analyzing volatile memory (RAM) has become just as important as examining hard drives to detect malware, runnin...


Read full story