Description: In this video we will look at file signatures and metadata, and also the story of the collar bomber and how he was caught using digital forensics.
Please leave comments.
Tags: digital forensics , collar bomber , forensics , computer forensics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
What is there to say, as brilliant as the last one! :D
gud video tutorial.
coool !! Hey thanks for the tutorial mate. Keep it coming \m/