Wednesday, January 21, 2015

Tricks To Simplify Exchange Email Forensics

Microsoft Exchange Server has provided a secure messaging environment and offers a database to store the communication information. The user database gets saved in two forms: mailboxes and the public folders that gets saved as priv.edb and pub.edb file respectively and for simplification it required Exchange email analysis.
For Exchange email forensics, most of the investigators prefer using third party tools that helps to analyze Outlook data but Microsoft has embedded options in this server applications for eDiscovery and compliance purpose. 

Wednesday, December 3, 2014

SQL Injection Attack – Injecting Harmful/Malicious SQL Code

SQL Injection Attack & Its Types


 Similar to other things SQL also has two sides, one good and the other bad. On one side the programming language is used for management of relational database whereas on the other it can also be utilized for execution of malicious attacks by attackers. One example is SQL injection attack, by means of which malicious codes are injected into the server and then into the SQL database. This results in extraction of useful and valuable information from the system by backdoor. The attack generally affects the link between a server and client-mostly a web server, where security layers such as SSL, TLS, etc. are not utilized, and the browser. This is because normally data exchanged between web browsers and web servers is in the form of plain text-which leaves users vulnerable to eavesdropping. In such cases attacker are able to intercept all data being shared.


Wednesday, November 12, 2014

Cyber Crime Awareness For Rising Frauds Through Emails

Cyber Space is a word that defines worldwide network of computers and is now days popularly termed as Internet. The more its usage is increasing; higher are the chances that it is being misused.One of the major part of internet is e-mails and its usage has been increased extensively over the decade. Identity theft, diffusion of obscene material, online fraud, cyber stalking or bullying etc are some of the consequences that have rotted the cyber space environment.

Wednesday, November 5, 2014

Laws Of Facebook: Know Them And Abide By Them

Facebook is a single word that has the potential to strike up millions of things in the human mind. Undoubtedly, this is amongst the many impacts made by this social network, which has completely revolutionized how people communicate these days.

Wednesday, October 8, 2014

IP Tracking Tool - A Necessity These Days to Trace Location of Received Emails

These days the requirement of IP tracking tool has become a necessity and the main motive of this article is to devise suitable methods to track IP addresses of received emails. The reason being that the necessity to track IP address especially of received emails has shown a high rise and this cannot be done manually without any tool. However, an individual can track his/ her own IP address on a PC by executing the ‘ipconfig’ command in the command prompt window. On doing this, the IP address gets displayed on the command prompt screen. But before we get into the details of IP tracking tool to trace IP Address, let us learn what IP Address is.

Saturday, October 4, 2014

EXPLORING RAINBOW TABLES

When we are using any computer which requires password authentication, the need to hide the passwords arises. The passwords related to systems are stored in the database either hashed or in plain text or using various other methods. These tables are vulnerable to theft as plaintext passwords are a dangerous attempt. Mostly, the passwords are stored as cryptographic hashes of user’s passwords. By using hashes for the passwords no one can determine the actual password. The authentication requires matching of two values, the entered one and the value stored in databases. The access is granted only when the two values match.