Skip to content
Sunday, June 1, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Mobile

Ethical Hacking IT Security Mobile 

TOOLS FOR MOBILE FORENSICS

January 20, 2020 Krishna FORENSIC TOOLKIT, MOBILEDIT FORENSIC, OXYGEN-FORENSIC, sms, TOOLKITS, TOOLS FOR MOBILE FORENSICS

OXYGEN-FORENSIC Oxygen Forensic Suite 2011 is mobile forensic software that goes beyond standard logical analysis of cell phones, smart phones

Read more
Ethical Hacking IT Security Mobile 

THE CHALLENGES OF MOBILE FORENSICS

January 20, 2020 Krishna CHALLENGES OF MOBILE FORENSICS, CYBER FORENSICS, Data volatility, DIGITAL DEVICE, MOBILE DEVICES, MOBILE FORENSICS, Operating system changes, SMART PHONES

Mobile devices are a staple of our lives. They keep us connected and do far more. It is not unusual

Read more
Ethical Hacking IT Security Mobile 

MOBILE FORENSIC ANALYSIS

January 20, 2020 Krishna ANALYSIS, cyber crime, CYBER FORENSICS, ELECTRONIC ACCESS, FLASH MEMORY, MOBILE FORENSIC ANALYSIS, MOBILE PHONE, MS DATA, SIM, sms

HOW TO IDENTIFY A SUBSCRIBER? Every mobile subscriber is issued with a smart card called a Subscriber Identity Module (SIM).

Read more
Ethical Hacking IT Security Mobile 

COMPUTER FORENSICS V/S MOBILE PHONE FORENSICS

January 20, 2020 Krishna ANALYSIS, COMPUTER FORENSICS, CYBER FORENSICS, DIGITAL DEVICES, FORENSIC ANALYSIS, HARDWARE, MOBILE PHONE FORENSICS, OPERATING SYSTEMS, portable devices

REPRODUCIBILITY OF EVIDENCE IN THE CASE OF DEAD FORENSIC ANALYSIS Digital investigations can involve dead and/or live analysis techniques. In

Read more
Ethical Hacking IT Security Mobile 

EXTRACTION METHODS OF MOBILE FORENSICS

January 20, 2020 Krishna CHARACTERISTICS, CHIP DESOLDERING, DECODING PHASE, DUMPING PHASE, EXTRACTION, information extraction, MANUAL EXTRACTION, MOBILE FORENSICS, PHYSICAL EXTRACTION

Generally products tend to split mobile forensics information extraction into two different methods, the physical extraction and the logical extraction.

Read more
Ethical Hacking IT Security Mobile 

INTRODUCTION TO MOBILE FORENSICS

January 20, 2020 Krishna ANDROID DEVICES, BLACKBERRY DEVICES, CHINESE DEVICES, DIGITAL DEVICE, FORENSICS, GENERAL PHONES, MOBILE DEVICES, MOBILE FORENSICS, MOBILE PHONE

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile

Read more
IT Security Mobile Networking Tutorial 

MOBILE SAFEGUARDS AND SOLUTIONS

January 8, 2020 Krishna

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also

Read more
IT Security Mobile Networking Tutorial 

BLUETOOTH WEAKNESSES

January 8, 2020 Krishna

ENCRYPTION The Bluetooth specification does not describe encryption, some manufacturers produce devices without encryption or the encryption mode is deactivated

Read more
IT Security Mobile Networking Tutorial 

BLUETOOTH ATTACKS

January 8, 2020 Krishna

BLUETOOTH ATTACKS ON MOBILE PHONES BLUESNARF: SNIFFING Bluesnarfing is the unauthorized access of information from a wireless device through a

Read more
IT Security Mobile Networking Tutorial 

BLUETOOTH

January 8, 2020 Krishna

WHAT IS BLUETOOTH? & HOW DOES IT WORK? Bluetooth is an open wireless protocol for exchanging data over short distances

Read more
  • ← Previous

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.