Practice

81 results - showing 61 - 80
1 2 3 4 5
Ordering
462
Overview This page contains links to dd images used for testing by CFTT of software applications...
599
Overview This page contains links to dd images for the use of testing software applications with...
488
This page contains links to compressed dd images used to test metadata based deleted file recovery forensic tools. Metadata...
408
This page has linkes to two dd images containing container files: files --- (MD5) 6782bae87146dd8bb4dc06ee7462d572 nests...
446
The following tools: Micro Systemation GSM .XRY v3.6, Guidance Software's Neutrino v1.4.14, Paraben's Device Seizure v2.1 build 3079.29886, Cellebrite...
428
The following binary images were created by performing either a JTAG or Chip-off data extraction technique. The...
393
The files contained in this archive can be used as a control to test the accuracy and effectiveness of...
460
Five memory images were created by Jesse Kornblum of ManTech . The archive, a .RAR file, (http://www.rarlab.com/) contains images...
633
The Rhino Hunt data set requires examination of a small image file and three network traces. This image...
411
This image (Encase, iLook, compressed dd) is to evaluate if an imaging tool can recognize the file systems...
501
The evil Boris and Natasha have escaped from jail and are up to their old tricks. They have stolen...
435
Background The drone images, research results and data on this page were produced as part of the...
409
The Windows registry is a system-defined database in which applications and system components store and retrieve configuration data. The...
758
The purpose of this work is to learn various types of data leakage, and practice its investigation techniques. ...
659
On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was found abandoned along with a wireless PCMCIA...
449
This is a public resource for the improvement of students and professionals alike. We have released full Virtual Machine...
81 results - showing 61 - 80
1 2 3 4 5
Results per page: