Forensic Analysis on Linux (Unix)

Operating Systems come in a few competing choices, of which the major players are Apple’s MacOS, Microsoft’s Windows and then the various flavours of Linux, of which most are open sourced while the remainder are proprietary to their vendors. Of the three, Windows is the most dissimilar, with MacOS and Read more…

By Andrew Odendaal, ago

Comparing Interface Types in Cyber Forensics

In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling. They can be considered as: Graphical User Interfaces (GUI’s) Interactive Text-based Consoles Command-line interfaces (CLI’s) Of these, the main competitors are really just GUIs and CLIs as they certainly differentiate most from Read more…

By Andrew Odendaal, ago

Altering Computer Evidence

Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities. Part of a cybercriminal’s gameplay is to cover up or otherwise alter digital evidence in one form or another. There are many reasons why cybercriminals may try to alter computer evidence; Read more…

By Andrew Odendaal, ago

Software development processes

Introduction to Software Development Processes Gabry defines the Software Development Methodology to be a set of related activities that lead to the production of the software (2017). While this is the simplest concept of the processes, there are many formalised industry best practises in operation today; some of these include Read more…

By Andrew Odendaal, ago

Approaches to software reuse

Introduction to Software Reuse Software reuse is the process of creating software from antecedent and extant components. There are a range of approaches that can be taken when following a reuse pattern, these can usually be grouped into one of the following abstractions: Class Libraries Reusable Components Application Frameworks Patterns / Read more…

By Andrew Odendaal, ago