How-to Guides

How to update the firmware on a Samsung monitor

This guide explains the exact steps for updating the firmware on Samsung monitor, and will hopefully save you a lot…

November 25, 2021

How to Install Volatility 2 and Volatility 3 on Debian, Ubuntu, or Kali Linux

Volatility is a powerful memory forensics tool. This guide will show you how to install Volatility 2 and Volatility 3…

October 6, 2021

How to use Farsight Security’s DNSDB to harness the power of passive DNS

DNS describes the structure of resources on the internet. It can provide lots of valuable information about (attacker or target)…

May 22, 2021

How to examine a credential harvesting page using Microsoft Edge

Recently I analyzed a credential harvesting page with some interesting characteristics that made a great teaching moment. In this post,…

May 10, 2021

How to configure a nginx reverse proxy with Let’s Encrypt certificates

Let's Encrypt allows nginx reverse proxy servers to have a real, trusted SSL certificate, even for internal sites.

February 26, 2021

How to forward a forensic copy of an email as an attachment

If you receive a fraudulent email, can be very useful to send a full forensic copy to an organization that…

August 28, 2019

How to view email headers

Email headers contain very useful information for tracing a message's origin and troubleshooting its delivery. Email headers are written with…

August 27, 2019

Demystifying DMARC: A guide to preventing email spoofing

DMARC can stop spoofed spam and phishing from reaching you and your customers, protecting your information security and your brand.…

June 15, 2018

How to compile and install FFmpeg on Debian/Ubuntu

Here's how to build and install FFmpeg from source with all the bells and whistles (i.e codec support).  We'll install…

June 5, 2018

How to install YARA and write basic YARA rules to identify malware

YARA is described as "The pattern matching Swiss knife for malware researchers (and everyone else)". Think of it as like…

June 15, 2017