Starter Guide to Linux Forensics

The old saying is if your data isn’t backed up at least twice, it’s not backed up at all. For those not wise enough to heed this adage, there are a number of options available to you if you wish your data to be recovered. Assuming the drive itself is just corrupted somehow (maybe a malicious attack, maybe a user error) and not damaged beyond physical repair, the first step is to connect the drive to another computer. If that fails, it might be time to break out the computer forensics skills.

[Luis]’s guide is focused on Linux-specific drives and …read more

Continue reading Starter Guide to Linux Forensics

Critical Vulnerabilities Found in Pre-Installed Dell Software

By Jahanzaib Hassan

With so much of news surrounding major global malware attacks such as the recent NotPetya incident, not much has been talked about some flaws that exist within the popular Dell software. Security flaws that require immediate update Before letting you know about the technical details of the vulnerabilities, it is important to note that those […]

This is a post from HackRead.com Read the original post: Critical Vulnerabilities Found in Pre-Installed Dell Software

Continue reading Critical Vulnerabilities Found in Pre-Installed Dell Software

Wooden Laptop Enclosure: New Life for Old Thinkpad

Technology is designed to serve us and make our lives better. When a device gets outdated, it is either disposed of or is buried in a pile of junk never to be seen again. However, some individuals tend to develop a certain respect for their mechanical servants and make an effort to preserve them long after they have become redundant.

My relationship with my first laptop is a shining example of how to hold onto beloved hardware way too long. I converted that laptop into a desktop with a number of serious modifications which helped me learn about woodworking along …read more

Continue reading Wooden Laptop Enclosure: New Life for Old Thinkpad

Homemade Computer from 1970s Chips

Sometimes it starts with a 555 timer and an op-amp. Other times with a small microcontroller. But the timing’s not so great and needs a dedicated timing crystal circuit. And maybe some more memory, and maybe the ATtiny should be swapped out for some 74LS-series chips. And now of course it needs video output too. Before you know it, you’re staring at a 40-chip computer that hearkens back to a simpler, yet somehow more complex, time of computing. At least that’s where [Marcel] is with his breadboard computer based on 1970s-era chips.

For what it does, this homebrew computer is …read more

Continue reading Homemade Computer from 1970s Chips

Interpol identifies 9,000 computers in Asia owned by hackers, used to launch ransomware

Nearly 9,000 computer servers based in southeast Asia are infected with or currently dispensing malware, according to a newly unveiled Interpol-led operation heavily supported by multiple private sector cybersecurity firms and domestic law enforcement agencies. Hundreds of compromised websites popularly used in Southeast Asia — including regional government portals — also were identified as under the control of hackers, Interpol announced Monday. The news underscores an increasingly international effort between national law enforcement agencies and the broader digital defense industry to collaborate on cybercrime fighting operations. An assistant attorney general for the Justice Department’s Criminal Division, Leslie Caldwell, said last year that the FBI would need to rely on foreign help to stop hackers in the future. “Sharing intelligence was the basis of the success of this operation, and such cooperation is vital for long term effectiveness in managing cooperation networks for both future operations and day to day activity […]

The post Interpol identifies 9,000 computers in Asia owned by hackers, used to launch ransomware appeared first on Cyberscoop.

Continue reading Interpol identifies 9,000 computers in Asia owned by hackers, used to launch ransomware

Prison Inmates Built PCs from e-Waste and Connected Online Using Prison Network

Can you imagine your world without the Internet?

I know it’s hard to imagine your life without the Internet, and the same was the case of two Ohio prisoners who built personal computers from parts from e-waste, hid them in the ceiling, and connected t… Continue reading Prison Inmates Built PCs from e-Waste and Connected Online Using Prison Network

Another 74XX Series CPU

[Jack Eisenmann] is no stranger to building impressive DIY CPU’s on vast stretches of breadboard. This time [Jack] has done away with the seventeen breadboards he used in his last 8-bit computer and instead has gone a step further and designed a set of generously utilised PCB’s for the CPU. The result is the DUO Enterprise.

The CPU design is based around an 8-bit data bus and a 24-bit address bus. As usual, a minimal yet carefully chosen instruction set allows [Jack] to do all the heavy lifting in software as part of the compiler and operating system he is …read more

Continue reading Another 74XX Series CPU

Intel Optane memory announced: A steroid to speed up your computer

By Jahanzaib Hassan

Intel has finally announced a magic memory which would help in improving your computer’s speed. A chip named “Optane” has been announced by Intel to boost the speed of your PC, and it looks like the officials of Inter Corp. are very optimistic of this creation. According to the senior vice president of Intel, Navin […]

This is a post from HackRead.com Read the original post: Intel Optane memory announced: A steroid to speed up your computer

Continue reading Intel Optane memory announced: A steroid to speed up your computer