It is what it is.
  • U: Anonymous
  • D: 2018-11-11 15:37:49
  • C: Unknown
Compression is used

RELEASE >

ReScene version pyReScene Auto 0.7 iLLiTERATE File size CRC
Download
37,377
Stored files
4,517 275C36E8
5,148 A16E2B24
RAR-files
icollege.computer.hacking.forensic.investigator.chfi-illiterate.rar 50,000,000 BA6B6D2D
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r00 50,000,000 AE0DC41E
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r01 50,000,000 C68AA1B1
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r02 50,000,000 8198CDF4
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r03 50,000,000 8D3FF61F
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r04 50,000,000 06423D4F
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r05 50,000,000 4E02E303
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r06 50,000,000 E7F39A0C
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r07 50,000,000 73FBA7B5
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r08 50,000,000 189ADC70
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r09 50,000,000 AF684E53
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r10 50,000,000 014B0F1D
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r11 50,000,000 604C93CD
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r12 50,000,000 3B050F44
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r13 50,000,000 EBC17389
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r14 50,000,000 2FADA13C
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r15 50,000,000 5E79CDE1
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r16 50,000,000 2EB4A87E
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r17 50,000,000 DA71384D
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r18 50,000,000 92AAB1DD
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r19 50,000,000 062855D3
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r20 50,000,000 11FA74A5
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r21 50,000,000 0E953A24
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r22 50,000,000 8D6F5251
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r23 50,000,000 094A2F34
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r24 50,000,000 A5C2CEC4
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r25 50,000,000 568EC1FF
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r26 50,000,000 DFCC9FC2
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r27 50,000,000 BEB36EC5
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r28 50,000,000 8EDC8F0B
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r29 50,000,000 A0E5BAFC
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r30 50,000,000 22F48F4E
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r31 50,000,000 352E88B2
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r32 50,000,000 571EF3DE
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r33 50,000,000 25FEEEEF
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r34 50,000,000 FF5B5AF6
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r35 50,000,000 FA2AA962
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r36 50,000,000 5CCEBC7D
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r37 50,000,000 6D31F929
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r38 50,000,000 D1F77FA1
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r39 50,000,000 49780B6D
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r40 50,000,000 570D171A
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r41 50,000,000 CC915207
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r42 50,000,000 1076F705
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r43 50,000,000 9DA0B3E8
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r44 50,000,000 15CC3F09
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r45 50,000,000 43CBC4CE
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r46 50,000,000 574A1E93
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r47 50,000,000 83126AAC
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r48 50,000,000 052057C6
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r49 50,000,000 7B25B9E4
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r50 50,000,000 12D760AC
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r51 50,000,000 3BDE2E91
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r52 50,000,000 8B104EBB
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r53 50,000,000 CA9B65E9
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r54 50,000,000 2E7F4922
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r55 50,000,000 BC2688F7
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r56 50,000,000 1F38B1A9
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r57 50,000,000 92815419
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r58 50,000,000 A24BBB08
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r59 50,000,000 045DCC25
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r60 50,000,000 BF9A6A36
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r61 50,000,000 E5A2B17C
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r62 50,000,000 D643E67A
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r63 50,000,000 91CA8EEB
icollege.computer.hacking.forensic.investigator.chfi-illiterate.r64 30,838,693 D36DDCEB

Total size: 3,280,838,693
Archived files
00001 Intro_to_Course_Pt._1.mp4 16,149,162 AB1854F6
00002 Intro_to_Course_Pt._2.mp4 22,617,332 4727DEBE
00003 Intro_to_Course_Pt._3.mp4 14,767,576 7662F52A
00004 Intro_to_Course_Pt._4.mp4 46,145,591 1AC693A4
00005 Intro_to_Course_Pt._5.mp4 25,585,021 C297C5C8
00006 Intro_to_Forensics_Pt._1.mp4 8,476,434 2A524D11
00007 Intro_to_Forensics_Pt._2.mp4 32,274,304 B9C98E44
00008 Intro_to_Forensics_Pt._3.mp4 29,190,846 65FE9B68
00009 Intro_to_Forensics_Pt._4.mp4 17,196,528 6709F9CE
00010 Intro_to_Forensics_Pt._5.mp4 17,295,793 FA6C9A5B
00011 Intro_to_Forensics_Pt._6.mp4 30,295,212 65B97792
00012 Intro_to_Forensics_Pt._7.mp4 34,459,189 A6843D34
00013 Intro_to_Forensics_Pt._8.mp4 18,378,352 A14DF3BB
00014 Forensics_Investigation_Process_Pt._1.mp4 32,638,929 12A27D69
00015 Forensics_Investigation_Process_Pt._2.mp4 9,420,512 5B73C790
00016 Forensics_Investigation_Process_Pt._3.mp4 32,855,358 E42E0D40
00017 Forensics_Investigation_Process_Pt._4.mp4 33,221,054 DCCCBAD3
00018 Forensics_Investigation_Process_Pt._5.mp4 28,724,358 11BF62D4
00019 Forensics_Investigation_Process_Pt._6.mp4 9,925,176 6BB2F091
00020 Forensics_Investigation_Process_Pt._7.mp4 9,992,735 A83F7D1E
00021 Forensics_Investigation_Process_Pt._8.mp4 41,498,861 B023868D
00022 Forensics_Investigation_Process_Pt._9.mp4 24,167,909 A9A3A8EC
00023 Forensics_Investigation_Process_Pt._10.mp4 26,855,732 430B9C8E
00024 Searching_and_Seizing_Pt._1.mp4 25,101,126 7B44BC4D
00025 Searching_and_Seizing_Pt._2.mp4 19,692,994 250A8162
00026 Searching_and_Seizing_Pt._3.mp4 28,425,672 E78DB1DB
00027 Searching_and_Seizing_Pt._4.mp4 27,953,545 6ACEDBDD
00028 Searching_and_Seizing_Pt._5.mp4 33,716,140 21839A76
00029 Digital_Evidence_Pt._1.mp4 13,811,149 C607562C
00030 Digital_Evidence_Pt._2.mp4 28,874,009 F93A3808
00031 Digital_Evidence_Pt._3.mp4 17,839,858 AE446D76
00032 Digital_Evidence_Pt._4.mp4 40,167,389 DAFFAEF9
00033 Digital_Evidence_Pt._5.mp4 17,473,079 CD2F4500
00034 Digital_Evidence_Pt._6.mp4 23,222,246 AA191791
00035 Digital_Evidence_Pt._7.mp4 22,381,309 CC953543
00036 First_Responder_Procedures_Pt._1.mp4 36,936,331 2F9E3C2B
00037 First_Responder_Procedures_Pt._2.mp4 36,526,500 FCA81213
00038 First_Responder_Procedures_Pt._3.mp4 28,920,409 5D8BDC87
00039 First_Responder_Procedures_Pt._4.mp4 19,285,573 B20ECD1D
00040 First_Responder_Procedures_Pt._5.mp4 21,616,024 4505D03C
00041 First_Responder_Procedures_Pt._6.mp4 16,418,772 4E512443
00042 First_Responder_Procedures_Pt._7.mp4 23,674,481 99BAE5D1
00043 First_Responder_Procedures_Pt._8.mp4 18,883,632 D3CA93B5
00044 Forensic_Lab_Pt._1.mp4 33,246,866 88E20AAE
00045 Forensic_Lab_Pt._2.mp4 34,529,602 362B9B95
00046 Forensic_Lab_Pt._3.mp4 20,583,783 DEF6D183
00047 Forensic_Lab_Pt._4.mp4 34,027,277 935BF0BA
00048 Forensic_Lab_Pt._5.mp4 32,520,776 39D03267
00049 Hard_Disks_and_File_Systems_Pt._1.mp4 28,428,173 312725F6
00050 Hard_Disks_and_File_Systems_Pt._2.mp4 16,566,338 553281DD
00051 Hard_Disks_and_File_Systems_Pt._3.mp4 9,009,726 DBA5737E
00052 Hard_Disks_and_File_Systems_Pt._4.mp4 12,233,207 C82DD91A
00053 Hard_Disks_and_File_Systems_Pt._5.mp4 19,505,428 D4950FBD
00054 Hard_Disks_and_File_Systems_Pt._6.mp4 21,873,680 E0DB07A2
00055 Hard_Disks_and_File_Systems_Pt._7.mp4 22,784,622 B1F12801
00056 Hard_Disks_and_File_Systems_Pt._8.mp4 13,570,995 F85438ED
00057 Hard_Disks_and_File_Systems_Pt._9.mp4 12,432,691 712F8E22
00058 Hard_Disks_and_File_Systems_Pt._10.mp4 30,162,524 6D0E6968
00059 Windows_Forensics_Pt._1.mp4 52,715,674 4A689A64
00060 Windows_Forensics_Pt._2.mp4 13,231,957 1A4B47CE
00061 Windows_Forensics_Pt._3.mp4 21,804,324 AE639CAF
00062 Windows_Forensics_Pt._4.mp4 47,548,185 DE10B56F
00063 Windows_Forensics_Pt._5.mp4 59,181,376 0657D3CC
00064 Windows_Forensics_Pt._6.mp4 29,618,897 FBE779A5
00065 Windows_Forensics_Pt._7.mp4 34,118,949 C978BD0B
00066 Windows_Forensics_Pt._8.mp4 25,683,110 3E279645
00067 Windows_Forensics_Pt._9.mp4 14,116,097 1AAF53AB
00068 Windows_Forensics_Pt._10.mp4 17,699,727 5FA53E11
00069 Data_Acquisition_and_Duplication_Pt._1.mp4 37,989,165 E0D6C338
00070 Data_Acquisition_and_Duplication_Pt._2.mp4 22,179,489 B54B2FDC
00071 Data_Acquisition_and_Duplication_Pt._3.mp4 26,842,102 1728DB46
00072 Data_Acquisition_and_Duplication_Pt._4.mp4 15,884,218 764775E7
00073 Data_Acquisition_and_Duplication_Pt._5.mp4 26,466,971 F95A0A33
00074 Data_Acquisition_and_Duplication_Pt._6.mp4 8,909,415 DEB15A8A
00075 Data_Acquisition_and_Duplication_Pt._7.mp4 27,210,854 7B1F0162
00076 Recovering_Deleted_Files_and_Partitions_Pt._1.mp4 25,648,823 354097AB
00077 Recovering_Deleted_Files_and_Partitions_Pt._2.mp4 20,412,660 F9E60F99
00078 Using_Access_Data_FTK_and_Special_Steps_Pt._1.mp4 27,947,342 62A72424
00079 Using_Access_Data_FTK_and_Special_Steps_Pt._2.mp4 20,045,166 79257C1D
00080 Using_Access_Data_FTK_and_Special_Steps_Pt._3.mp4 8,459,228 24232BD7
00081 Using_Access_Data_FTK_and_Special_Steps_Pt._4.mp4 8,346,400 679C37F0
00082 Using_Access_Data_FTK_and_Special_Steps_Pt._5.mp4 8,926,244 04452E4E
00083 Using_Access_Data_FTK_and_Special_Steps_Pt._6.mp4 6,861,809 708A03E2
00084 Using_Access_Data_FTK_and_Special_Steps_Pt._7.mp4 19,582,990 F9BCCBBB
00085 Using_Access_Data_FTK_and_Special_Steps_Pt._8.mp4 10,757,695 E8C76A42
00086 EnCase_Pt._1.mp4 15,246,808 6A5BBA01
00087 EnCase_Pt._2.mp4 15,732,998 47395A55
00088 EnCase_Pt._3.mp4 14,788,671 E646131F
00089 Stenography_Pt._1.mp4 27,113,470 0B2CB730
00090 Stenography_Pt._2.mp4 17,952,977 EBA09627
00091 Stenography_Pt._3.mp4 33,114,150 C56389A1
00092 Stenography_Pt._4.mp4 41,669,554 C144E2E4
00093 Passwords_Pt._1.mp4 42,544,471 5F7F9806
00094 Passwords_Pt._2.mp4 48,262,744 54584D09
00095 Passwords_Pt._3.mp4 31,764,402 028C6EAC
00096 Passwords_Pt._4.mp4 31,442,368 672D797F
00097 Log_Correlation_Pt._1.mp4 43,807,661 9E96A194
00098 Log_Correlation_Pt._2.mp4 45,936,299 7B282D25
00099 Log_Correlation_Pt._3.mp4 25,526,356 B323F988
00100 Log_Correlation_Pt._4.mp4 15,768,466 6039F50E
00101 Log_Correlation_Pt._5.mp4 37,457,713 C14C1205
00102 Log_Correlation_Pt._6.mp4 18,521,929 0BF9DDB5
00103 Network_Forensics_Pt._1.mp4 14,302,094 EC8EBEA3
00104 Network_Forensics_Pt._2.mp4 34,131,936 D7BB0805
00105 Network_Forensics_Pt._3.mp4 38,301,353 C22278A7
00106 Network_Forensics_Pt._4.mp4 9,389,298 EBE2823B
00107 Wireless_Attacks_Pt._1.mp4 39,959,267 B6CD25EF
00108 Wireless_Attacks_Pt._2.mp4 33,590,219 A13B2761
00109 Wireless_Attacks_Pt._3.mp4 18,605,956 EBD1887F
00110 Web_Attacks_Pt._1.mp4 31,342,561 2C5FFDC0
00111 Web_Attacks_Pt._2.mp4 39,146,243 7BED7589
00112 Web_Attacks_Pt._3.mp4 16,841,715 2DED88DC
00113 Web_Attacks_Pt._4.mp4 22,671,791 ACDB1F82
00114 Web_Attacks_Pt._5.mp4 30,974,496 E4033551
00115 Web_Attacks_Pt._6.mp4 13,502,242 70762359
00116 Web_Attacks_Pt._7.mp4 9,073,977 737873A7
00117 Web_Attacks_Pt._8.mp4 47,201,782 6FDC336B
00118 Email_Crimes_Pt._1.mp4 22,985,851 FBD2CE4C
00119 Email_Crimes_Pt._2.mp4 15,131,992 8F23461B
00120 Email_Crimes_Pt._3.mp4 15,049,151 07262EDA
00121 Email_Crimes_Pt._4.mp4 23,111,725 2790D1ED
00122 Mobile_Investigation_Pt._1.mp4 34,496,832 ECFF8DF3
00123 Mobile_Investigation_Pt._2.mp4 16,175,479 C225A3AB
00124 Mobile_Investigation_Pt._3.mp4 33,504,125 132BD72F
00125 Mobile_Investigation_Pt._4.mp4 26,114,274 47399D78
00126 Mobile_Investigation_Pt._5.mp4 24,351,286 BE368833
00127 Investigation_Reports_Pt._1.mp4 23,390,804 8D7BC6F3
00128 Investigation_Reports_Pt._2.mp4 26,420,539 06FD5FD4
00129 Investigation_Reports_Pt._3.mp4 29,526,601 369B405F
00130 Investigation_Reports_Pt._4.mp4 14,018,957 649CE582
00131 Expert_Witness_Pt._1.mp4 14,535,643 67372153
00132 Expert_Witness_Pt._2.mp4 39,523,133 B2326FF7
00133 Expert_Witness_Pt._3.mp4 40,467,027 40939EF2

Total size: 3,347,206,143
RAR Recovery
Present (Protect+) 95,324,968
Labels UNKNOWN