The DevSec Blueprint's AWS DevSecOps PipelineIntroduction While exploring the world of DevSecOps, I came across Damien Burks’ The DevSec Blueprint - a comprehensive, free, and open-source learning guide that provides the foundational skills and knowledge needed to break into the field. After gr...Aug 30, 2025·7 min read
Tracing the Digital Footprints - File/Folder OpeningIn the intricate landscape of digital forensics, understanding how users interact with files and folders on a Windows system is paramount. Every open, save, move, or even a simple glance at a folder leaves behind a digital fingerprint, providing crit...Feb 27, 2021·7 min read
Tracing the Digital Footprints - Network Activity/Physical LocationIn the intricate world of digital forensics, understanding a system's network interactions and even its physical movements can be crucial for an investigation. Windows operating systems leave behind a wealth of data, often unintentionally, that can h...Feb 20, 2021·5 min read
Tracing the Digital Footprints - File DownloadUnderstanding how files arrive and are handled on a Windows system is a cornerstone of digital forensics. From everyday documents to potentially malicious software, every downloaded file leaves a trail. This blog post delves into key Windows artifact...Feb 13, 2021·5 min read
Tracing the Digital Footprints - Program ExecutionIn the realm of digital forensics, understanding how and when programs were executed on a Windows system is paramount. These insights can unravel the narrative of an incident, identify malicious activity, or reconstruct user behavior. Windows operati...Feb 7, 2021·6 min read