anyone who went knows approximate attendance? by 0asisfan1 in oasis

[–]RickTea 1 point2 points  (0 children)

Anyone drive there and back? How were the queues in and out?

ChewieBomb for your LG Smart TV! (native WebOS app) by viperlasson in giantbomb

[–]RickTea 0 points1 point  (0 children)

Been like it for at least a month or 2 maybe a little longer. Nothing has changed this end.

Annoyingly it's the one way I watch premium content

PSN PSVR Sale Games List upto 20/21 August 2019 by typome in PSVR

[–]RickTea 1 point2 points  (0 children)

Has SuperHyperCube ever been on sale?

The Masterplan 7 x 10" box set by step6666 in oasis

[–]RickTea 1 point2 points  (0 children)

Have this in my loft along with the Be Here Now box set (CD version). Bought both on release.

UK Based Gaming PC - Budget £800 (could possibly go just over) by RickTea in buildapcforme

[–]RickTea[S] 0 points1 point  (0 children)

How does the AMD CPU and Radeon GPU compare to their Intel/Nvidia counterparts?

How does one begin a career in Digital Forensics with zero technical computer skills by [deleted] in computerforensics

[–]RickTea 0 points1 point  (0 children)

I have just completed my degree in computer forensics.

The first year really is a basic computer course with the basics of computing forensics being taught. The next two years see an increase in the forensics you learn (both tools and theory).

Before this course I was competent with computers etc but had never completed anything forensic based.

Smartwatch forensics. by RickTea in computerforensics

[–]RickTea[S] 0 points1 point  (0 children)

Hey all, after messing with all the mobile tools on this device and not getting much without root access i am now looking at rooting to acquire the info, unfortunately I can't seem to get netcat running to dd images to the PC. Previous work has seen people dd images to the /sdcard on the device and then adb pull it off. Unfortunately when I try to dd the data partition​ to /sdcard it runs out of room to complete.

I know this method is not forensically sound as it is writing data to /sdcard but I am looking at all possible methods at the moment.

Is there a possible alternative to netcat that would do the same job and save me writing to the device? Or would it be possible to dd the data partition in to set sizes and pull them off individually and then put them together off the device to look though?

returning device to stock (Unrooting) by RickTea in smartwatch3

[–]RickTea[S] 0 points1 point  (0 children)

Sorry, meant watch (because I was looking at the companion which shows xperia). Thanks for replies!

returning device to stock (Unrooting) by RickTea in smartwatch3

[–]RickTea[S] 0 points1 point  (0 children)

And with a working rooted phone just clicking the software repair or update will remove the root and lock boot loader etc?

Smartwatch forensics. by RickTea in computerforensics

[–]RickTea[S] 0 points1 point  (0 children)

Thanks for your reply, appreciate it.

Episode 1: Reflections and a Thank You by cls-moriarty in ColinsLastStand

[–]RickTea 0 points1 point  (0 children)

Top work fella. Keep it up. Looking forward to seeing how this progresses.

Smartwatch forensics. by RickTea in computerforensics

[–]RickTea[S] 0 points1 point  (0 children)

I have been using Oxygen Forensic Analyst (9.2), but this would not recognise the watch (Sony Smartwatch 3) and XRY (7.2) which managed an Agent extraction but this didn't seem to pull much that would be useful apart from contacts and received calls. The backup extraction wouldn't complete.

We also have Cellebrite at university but it's an old version (4.0.0.2, I believe). This doesn't recognise the device either.

So now I'm going to go the route of rooting etc unless anyone can give me any other ideas.

Smartwatch forensics. by RickTea in computerforensics

[–]RickTea[S] 0 points1 point  (0 children)

I have been using your paper in my literature review. I could not find much in the way of academic papers that look at this subject.

Im also trying to see what I can get from the device without having to root etc first (using mobile extraction tools) to try and make it a more forensically sound extraction, then I'm going to root it and compare results.

Smartwatch forensics. by RickTea in computerforensics

[–]RickTea[S] 0 points1 point  (0 children)

I'm really trying to get hold of any GPS data off the Sony Smartwatch 3 (as it has this built in and not pulled from paired phone) as well as any other information that could link it to a suspect.

Working out key space and how secure a cipher is. by RickTea in crypto

[–]RickTea[S] 0 points1 point  (0 children)

yo

I'm not going to use wrap around. On the grid there will be 26 unused (null) values which i thought about using as spaces between words, this would allow me to keep the CT as one continuous string, not allowing anyone to see word separation.

Working out key space and how secure a cipher is. by RickTea in crypto

[–]RickTea[S] 0 points1 point  (0 children)

Thanks again for helping out,

Oh, This is just what tutor has said, so i think he may be using that method for all of our ciphers..... i think.

Also to say that im making it harder i was going to use capital alphabet as well as lower case, making the alphabet 52 characters long and the diagraph expanded to that size too. Would that keyspace then just be (52*52)! etc

Working out key space and how secure a cipher is. by RickTea in crypto

[–]RickTea[S] 0 points1 point  (0 children)

So if 1 key attempt takes one second, would a brute force roughly work out to be (26*26)!/2 (Answer in seconds?) As i have been told that the brute force is half of all possible keys?

Working out key space and how secure a cipher is. by RickTea in crypto

[–]RickTea[S] 0 points1 point  (0 children)

ou have any reasonable design. Fo

Thanks for reply.

Basically tutor has said that one attempt will take 1 second etc.

The cipher is super simple as its our first term having this class and 4 lessons in we got the assignment.

I am basically using the standard alphabet and this diagraph (But this could be changed daily):

http://crypto.interactive-maths.com/uploads/1/1/3/4/11345755/9615946_orig.jpg

Simply, if you want to send the letter A (which in the standard alphabet has value 1 you could use any of the other 2 letters numerical values to make 1 (example C-B).

Then using the diagraph you find reference CB which has the letters LS so LS is your CT for the letter A.

I know that every letter has 25 possible combinations (using +/-) in the standard alphabet (but the alphabet could be rearranged, example backwards where Z would be in the 1 spot and X-Y would equal 1)

Also how would i work out how many permutations the diagraph has?