How-to Guides

How to forward a forensic copy of an email as an attachment

If you receive a fraudulent email, can be very useful to send a full forensic copy to an organization that…

August 28, 2019

How to view email headers

Email headers contain very useful information for tracing a message's origin and troubleshooting its delivery. Email headers are written with…

August 27, 2019

Demystifying DMARC: A guide to preventing email spoofing

DMARC can stop spoofed spam and phishing from reaching you and your customers, protecting your information security and your brand.…

June 15, 2018

How to compile and install FFmpeg on Debian/Ubuntu

Here's how to build and install FFmpeg from source with all the bells and whistles (i.e codec support).  We'll install…

June 5, 2018

How to install YARA and write basic YARA rules to identify malware

YARA is described as "The pattern matching Swiss knife for malware researchers (and everyone else)". Think of it as like…

June 15, 2017

How to run graphical Linux applications on Windows 10 using the Windows Subsystem for Linux (WSL)

The Windows Subsystem for Linux (WSL) was introduced by Microsoft in the Windows 10 Anniversary Update. It allows users to…

June 11, 2017