Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #3 - Basic Software Cracking

 

Rating :

 

Comments

 
  • mjacob
    mjacob at May 07,2015
    Good introduction in the history and problems mobile forensics. The video quality is pretty bad and overall not worth listening through the entire presentation.
  • marinoms
    marinoms at May 08,2015
    I agree that the content sounded like it was good. The growing field of mobile forensics is a topic I really want to become a professional in. Due the bad quality I couldn't watch the whole thing.
  • mrgodfrey3
    mrgodfrey3 at July 14,2015
    Sales pitch by the speaker for their products. Audio is horrible. Some of the content is still relevant and of interest.
  • tshafi
    tshafi at September 25,2015
    I found this to be very eye opening. The challenge of hash comparisons comes to mind as well as write blocking, two things that help in maintaining testimony to the integrity of the acquisition. Another thing to note is the diversity of the operating systems and the devices juxtaposed with the lack of hardware and software for tackling the devices. Remote wipe poses an interesting challenge, although I suppose with the PCs devices can be remotely wiped, but the programs are more available for the phones, since security is in such demand for the phones. Phone privacy and security relates to the issue of encryption, which protects the consumer, but makes forensics a challenge. Perhaps the development devices that can be used in the field will best suit the challenges. Hand held devices that can be versatile and have software updates often.
  • bmanahan188
    bmanahan188 at November 02,2015
    Mobile Device Forensics is clearly a rapidly expanding field due to the popularity of cellphones. It has its own unique challenges that are outlined in this video. It’s interesting that once again we see that the two most popular OS’s are spilt between close and open-sourced. This is a complex field that I hope to learn more about in the future, especially as more resources become available.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved