RAR-files |
llosf-6fce-xqzt.rar |
50,000,000 |
A7EA060D |
llosf-6fce-xqzt.r00 |
50,000,000 |
47B39673 |
llosf-6fce-xqzt.r01 |
50,000,000 |
9D69C5DA |
llosf-6fce-xqzt.r02 |
50,000,000 |
E005607A |
llosf-6fce-xqzt.r03 |
50,000,000 |
75CC2012 |
llosf-6fce-xqzt.r04 |
3,881,403 |
DAD5EA19 |
|
Total size: |
253,881,403 |
|
|
Archived
files |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\03.History.mp4
[24565a553774a2c2]
|
8,709,307 |
9ACE74BE |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\05.Roles in computing.mp4
[3da6db05075894eb]
|
3,419,559 |
22E84750 |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\02.Introduction.mp4
[242a55b54099e241]
|
7,048,426 |
81282082 |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\07.Roles in forensics.mp4
[55b3728969f09fde]
|
7,150,689 |
E343F953 |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\06.Process management hands-on.mp4
[7a0a63990faab7d8]
|
3,940,218 |
517F2742 |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\04.Core concepts.mp4
[83d794b584d87b7]
|
7,291,523 |
C72D397B |
Operating System Forensics\2.1. Operating Systems and Digital Forensics\08.Future.mp4
[ef26afda121ea424]
|
6,174,254 |
58D07D81 |
Operating System Forensics\6.Conclusion\30.Next steps.mp4
[f2e25a7bfa2b5e20]
|
15,415,985 |
F1AC713D |
Operating System Forensics\4.3. File Recovery\22.Data hiding hands-on.mp4
[bb98c296a077d4df]
|
10,150,816 |
57406D49 |
Operating System Forensics\4.3. File Recovery\17.Data carving.mp4
[99c980066c4233d0]
|
4,902,282 |
BF47F288 |
Operating System Forensics\4.3. File Recovery\20.Slack space.mp4
[3cec9598afabf33d]
|
10,554,784 |
E460BFBF |
Operating System Forensics\4.3. File Recovery\21.Data hiding and ADS.mp4
[26e9cc7f4dcff5df]
|
6,130,544 |
F3360884 |
Operating System Forensics\4.3. File Recovery\16.Introduction.mp4
[d30952e67d8760f0]
|
4,372,236 |
84DA0777 |
Operating System Forensics\4.3. File Recovery\18.Data carving preparation.mp4
[2d21c50d8f0e5585]
|
14,332,355 |
99094173 |
Operating System Forensics\4.3. File Recovery\19.Data carving hands-on.mp4
[4603c362d9c40475]
|
17,068,565 |
0300B713 |
Operating System Forensics\3.2. File System Types\11.Windows hands-on.mp4
[a7f46da8aff5c6a5]
|
8,450,892 |
1CEEFBC7 |
Operating System Forensics\3.2. File System Types\09.Introduction.mp4
[bdf1919e3fc4a013]
|
6,616,067 |
6EB52189 |
Operating System Forensics\3.2. File System Types\10.Windows file systems.mp4
[9476669b2562ee0a]
|
5,339,365 |
47F60251 |
Operating System Forensics\3.2. File System Types\15.Apple hands-on.mp4
[d8a48935172cb23a]
|
4,597,868 |
C0F380D6 |
Operating System Forensics\3.2. File System Types\12.Linux file systems.mp4
[949cda29f32bc55b]
|
8,371,268 |
D96A273A |
Operating System Forensics\3.2. File System Types\14.Apple file systems.mp4
[42dd56067f9b27ba]
|
4,540,289 |
1A362B59 |
Operating System Forensics\3.2. File System Types\13.Linux hands-on.mp4
[d6cf15a5be5ccc8a]
|
8,636,803 |
A9AB9E99 |
Operating System Forensics\5.4. Live Acquisition\23.Introduction.mp4
[5700b08f8b833e57]
|
4,567,640 |
C11E7767 |
Operating System Forensics\5.4. Live Acquisition\26.Virtual memory.mp4
[a5ab079c536ff981]
|
5,503,746 |
08E11AB3 |
Operating System Forensics\5.4. Live Acquisition\27.Memory dump analysis with Volatility.mp4
[330bc3d34f248ed6]
|
9,981,530 |
81DEEFF1 |
Operating System Forensics\5.4. Live Acquisition\24.Addressing.mp4
[dc4f19d33b2fc0bb]
|
5,769,696 |
09B68619 |
Operating System Forensics\5.4. Live Acquisition\28.Processes.mp4
[f44f138e92800d4c]
|
11,784,011 |
8AE26E36 |
Operating System Forensics\5.4. Live Acquisition\25.Memory structure.mp4
[5397c770e4a4ec79]
|
3,989,067 |
6EEA662A |
Operating System Forensics\5.4. Live Acquisition\29.Network connections.mp4
[97fd162ea924271c]
|
5,191,293 |
6E108BF7 |
Operating System Forensics\1.Introduction\01.Operating system forensics.mp4
[f57a6a5e7cff75f3]
|
33,875,716 |
E505E188 |
Operating System Forensics\2.1. Operating Systems and Digital Forensics |
0 |
00000000 |
Operating System Forensics\6.Conclusion |
0 |
00000000 |
Operating System Forensics\4.3. File Recovery |
0 |
00000000 |
Operating System Forensics\3.2. File System Types |
0 |
00000000 |
Operating System Forensics\5.4. Live Acquisition |
0 |
00000000 |
Operating System Forensics\1.Introduction |
0 |
00000000 |
Operating System Forensics |
0 |
00000000 |
|
Total size: |
253,876,794 |
|
|