digital forensics | incident response

Mind Mapping Volatility

 memory forensics, learning

Great sources of DFIR information are endless: books, blogs, repositories, Twitter, lectures, conferences, and journals. One of the hardest skills I am yet to master is transferring this huge amount

The Cuckoo's Egg: Redux

 theory, books

So many people recommend 'The Cuckoo's Egg' as a must-read for information security professionals. For those in the dark, the book follows the author Cliff Stoll tracking unauthorised access to

Dude! Where's my HTTP/2?

 chrome, http/2

HTTP/2 is fundamentally different from HTTP/1.x; but it is not some edge-case of internet traffic. Figures that I found from April 2016 indicated it was 68% of