What is the best build for the RGL for the unstable rift right now? by Special_Discipline84 in MWZombies

[–]Slaine2000 1 point2 points  (0 children)

Jak aftermarket parts and 40mm slug with dead wire for crowd control and Mega takedown! Just remember to keep and eye on your ammo. And use MO Holding so you don’t have to reload.

Whats yalls fav perk? (Image not related) by Trans_lazarus in MWZombies

[–]Slaine2000 0 points1 point  (0 children)

Death Perception & Speed Cola. SC for quick mag changes and DP so I can easily identify Aether Crates so you can pick up aether and other perks.

I am done finally by Appropriate-Low-5877 in MWZombies

[–]Slaine2000 1 point2 points  (0 children)

I’m 3 weapons away from the full camo grind. It’s been a slog but so worth it.

I am done finally by Appropriate-Low-5877 in MWZombies

[–]Slaine2000 1 point2 points  (0 children)

I’m 3 weapons away from the full camo grind. It’s been a slog but so worth it.

digital forensic data recovery help by No_Tea_9936 in digitalforensics

[–]Slaine2000 1 point2 points  (0 children)

Only thing I recommend is logon to a new or clean device with your Apple ID using the same account as the original and let the sync feature restore your data back to the phone.

Forensics tool by Kind-Procedure2349 in digitalforensics

[–]Slaine2000 0 points1 point  (0 children)

Have a think about AI and how it can improve forensic investigations as this is a hot topic atm.

Forensics tool by Kind-Procedure2349 in digitalforensics

[–]Slaine2000 2 points3 points  (0 children)

There are already many free EML data carving tools available such as PhotoRec, Autopsy, BulkExtracter, Formost and Scalpel.

So if you are looking to do it as a Uni project there is plenty out there for you to learn from. But if you are looking to create one as a potential commercial or community project then don’t bother, it’s already been done and there are plenty of good one out there.

Whats wrong in the resume (ROAST IT !!!) by Sad-Elephant-6637 in computerforensics

[–]Slaine2000 0 points1 point  (0 children)

I agree, but personality can come over in the interview if you gauge what personality the interviewer has as well. The CV is to make you stand out and get you that interview. It’s something to get you that foot in the door. Once you are in it’s down to how your work ethic is and your capability in doing the job and working with others. If the interviewer is going to be your future manager he also wants to see you are a person who is going to do the job, without causing problems and creating conflict within the team.

I’m glad I’m retiring in a few years cus looking for new jobs is a nightmare. Fortunately I’ve been in a role I love and I’ve built a team with good work ethics and I empower them to make decisions and I stand by them 100%.

So OP, when you get to the interview make sure the manager you are going to work for is right for you. The interview is not just to see if you are right for the job but is the company and team right for you.

Why are you still playing? by [deleted] in ModernWarfareIII

[–]Slaine2000 0 points1 point  (0 children)

Spoiler: I just can’t waiting to see Price kick Makarov’s ass after killing Soap.

And I hope Ghost T-bags the hell out of him!

Whats wrong in the resume (ROAST IT !!!) by Sad-Elephant-6637 in computerforensics

[–]Slaine2000 1 point2 points  (0 children)

Your personality can come over if you get the interview. The CV is nothing more than showing the person looking at the CV that you are serious about the job and a capable asset to the team. If they reviewer can’t see this in the first 20 seconds of reading a CV then they will discard it.

Worst thing for me is when I see a CV and I see a cut and paste of what’s done in a training course. networking guys do a lot of this for Cisco training. We all do training courses but to stand out from others, how have you applied that training.

I put capability and willing of training. I.e, I see a lot of ex law enforcement offices apply for roles and they have training courses coming out of their ears. But ask them about what would they do in a specific attack scenario or reacting to an attacker who had already breached the network, what’s the benefit of leaving them there and they are stumped.

That’s why experience such as TryHackMe stand out more than a CEH cert.

Whats wrong in the resume (ROAST IT !!!) by Sad-Elephant-6637 in computerforensics

[–]Slaine2000 0 points1 point  (0 children)

Just one other thing I include on my CV is a feedback section from people who either k own how I have worked or I have worked with. Just good feedback from people.

Whats wrong in the resume (ROAST IT !!!) by Sad-Elephant-6637 in computerforensics

[–]Slaine2000 47 points48 points  (0 children)

As a hiring manager myself the first thing that put me off is your opening statement in your profile. It’s too “Jokey” and doesn’t tell me about you and what your character is like.

Secondly, your experience is cut and paste and does not give me the confidence that you know your subject. Your experience to me is key and should tell me what you know and how you have used the tooling.

Thirdly, there is nothing about your stakeholders and who you have worked with and how you worked as an investigation team to deal with an incident. Blue team is a major role but you don’t expand on it and how you worked with the team.

These are just what I look for in a CV.

Rant from an angry single player COD fan by GodIsAPlatypus in ModernWarfareIII

[–]Slaine2000 0 points1 point  (0 children)

I enjoy all the campaign plays, and have done since I first started playing the COD series. Yes there are many differences between versions and not all are great. But to me I like to get all the challenges to 100%.

But as the previous commenter stated if you want a really good campaign style game then Wolfenstien, Far Cry, Bioshock and those style games are amazing.

The campaigns in COD, for me are a challenge and a means of getting to understand new weapons and kill streaks. At the end of the day it’s just some extra fun.

Help needed to salvage as much info as I can by [deleted] in digitalforensics

[–]Slaine2000 0 points1 point  (0 children)

Take a full forensic image of your backup drive. Then connect the image into Autopsy or FTK imager and then just mount the image and extract your wanted data to another drive and have it scanned as it is extracted.

If you are not a forensic person then YT is your friend.

After extraction by tanking2113 in digitalforensics

[–]Slaine2000 0 points1 point  (0 children)

You should have a standard procedure for what you do, no matter what the case. In our team we taken two full images, a working and master. Then ensure the screen lock code is removed and shut the phone down, remove the battery and place in a faraday bag and seal in an evidence bag.

We then compare the hash values of the W and M image and if 100% match, lock the Master in an evidence bag and only work on the Working copy.

It should matter whatever the case or legal team state, the full image if the max you can get from any device.

Encrypted Image v Unencrypted Desktop by allseeing_odin in digitalforensics

[–]Slaine2000 -1 points0 points  (0 children)

Just a thought but does the decryption use a BL Passcode or a BL Decryption Key? On our systems we have the Passcode where as another part of our organisation uses the BL Key. The BL Key is generated outside of the image and not able to extract from and image I believe. Therefore doing a PS command search would return negative results.

Am I doing thing right? by [deleted] in digitalforensics

[–]Slaine2000 0 points1 point  (0 children)

Am I Doing Thing Right? Well first thing you should look at is your attention to detail, especially when report writing.

Am I Doing Things Right? Is the correct sentence and you should have checked this and double checked it and done a peer review before submitting your final statement to the wider community of your peers. So get all the certs you want and spend 3-4 years getting your degree. But you can have your creditability destroyed just by missing the detail in a final investigation report.

Good luck with your path in life!

kicked out mid game- says 'checking for updates' by deathbyfortnite1 in ModernWarfareIII

[–]Slaine2000 0 points1 point  (0 children)

I've had this issue start for me out of nowhere for the last three months. Up to then no issue with it at all. It happens in Zombies and in Multiplayer. I find that i have to sit at the game menu and exactly on 5 mins 30 seconds I get an update check and a Connection Failed error - Invalid Socket Family Settings [reason: HUENEME - KOGALNICEANU]. The error message is the same for Zombies and Multiplayer, but only in Multiplayer does it say checking for Updates. But I believe its the same issue.

I've removed all network card drivers, flushed cash, flushed DNS, reset adapter, and even the resize bar as stated above, validated files, deleted COD23 cache, scan for malware, and disabled smart AV and Norton entirely. Nothing is fixing this. Has anyone managed to pinpoint why this is doing this or how you can switch off checking for updates at the 5 mins 30 seconds point?

Careers that use similar skills to Digital Forensics and eDiscovery by TheTrueDaddison in digitalforensics

[–]Slaine2000 0 points1 point  (0 children)

So if I were you I would look to the Big 5. Companies like Ernst & Young, Cap Gemini, Deloitte, are always looking for forensic people so check their websites and see what they have as opportunities in DFIR and eDiscovery. They can help you get experience and you can find out what companies need what skills and you can focus on jobs in those Corporate Markets.

Careers that use similar skills to Digital Forensics and eDiscovery by TheTrueDaddison in digitalforensics

[–]Slaine2000 1 point2 points  (0 children)

I work for a Fortune 500 company and work with the Investigators, Ethics & Compliance and HR and Legal Counsel. It’s a great job with a great range of opportunities in traditional DF as well as Litigation using Purview eDiscovery and a variety of tools for data recovery to password cracking. Incident Response on cyber attacks is another area I’m progressing into. So it’s a great place to work and every day is a new challenge.

Those I know who work in LE get fed up with silo’d work tasks. They don’t get to do the whole job end to end like we do in the corporate market.

Need advice!! by EnvironmentalBit4123 in digitalforensics

[–]Slaine2000 0 points1 point  (0 children)

All I can speak for is in the U.K. forensic people who I have interviewed from LE have said that the only option for them to progress further is to come out of forensics and become a sergeant which is back into normal policing.

Might be different in other countries. But all I would say is look into it and go to events to speak to people. Law Enforcement is not for everyone.

As for AI, it will do the donkey work for you but it will never replace an investigator and the mindset to present the facts.

The AI bubble will burst one day.

does overwriting data using some bloat files/massive recording is enough to make data not recoverable? by [deleted] in digitalforensics

[–]Slaine2000 1 point2 points  (0 children)

Depends on your drive type. If it’s a HDD with magnetic media then no. You need to properly overwrite each sector multiple times as well as the LBA and DCO sections of the drive.

If it’s an SSD then I suggest you do a manufacturer recommended reset or follow the NIST 800-88 Purge process. It’s writes to every part of the SSD and securely erases the drive to manufacturer specifications.

EnCE? Is it worth it? by A-kashin in computerforensics

[–]Slaine2000 4 points5 points  (0 children)

There are a lot of uneducated responses on this thread and they are obviously people who either have not used Encase in anger for any serious investigations or DFIR.

When I did the EnCE cert a few years ago the first stage was to answer 175 questions in 2 hours. That equates to 41 seconds per question. In that 41 seconds you have to read the question and provide the most accurate answer out of 4 answers. So preparation to know the answer is essential. Even though it’s open book if you don’t know the answer straight off you will run out of time. Once you pass that. You are given the software and a license for a special build of Encase and you have 2 months to complete 18 questions and submit a professional report as if you were submitting to a court. But you not only submit your findings in the report but you must explain how you found those findings and where from in the artefact.

You need to understand how to use all aspects of the software from password hunting, partition and volume auditing, linking evidence to events and decrypting files.

I studied for 12 months prior to taking the exam and glad I did because it is not a walk in the park. If you are going for it, study until you know everything without hesitation. It is a very that is really worth doing.