Tuesday 19 September 2006

ALL YOUR PICTURES "ARE" BELONGS TO US

Back in 2003, on a rainy night, an idea came to mind regarding the extraction of all the pictures from a host; ..and the title was inspired by the famous .."all your base are belong to us". [1]

I was looking at the thumbnail view of one of my folders and started wondering how does MS Windows® OS store information about thumbnails within each folder. Obviously that was the "thumbs.db" file which it was introduced with the release of W2K. (Note: Actually Win98 had the functionality of displaying thumbnails but you had to know the trick to enable this feature. In Windows Millennium the functionality was included but there was no thumb.db file).

Wednesday 30 July 2003

How to clear your terminal history on Linux

If you need to clear your terminal history in Linux you can use the following command. The history is saved in the .bash_history file in your home directory. 


cat /dev/null > ~/.bash_history && history -cw && exit


Tuesday 15 July 2003

One blog to rule them all..

After all these years of researching and posting in various blogs, forums etc, I decided to create a centralized repository for posting ideas, projects, solutions, suggestions and sometimes discussions about the latest issues around Information Security and Computer (anti)forensics. Bare in mind that anything posted in this blog is product of my own work and/or research, except it is stated otherwise, in which you will find all the relevant references. If you think I have missed a reference, please, do let me know. 

Any posts, ideas, examples, any part of the work, files, pictures, etc, found on this blog can be used freely as long as the appropriate reference is made back to my twitter account: @drgfragkos

Finally, any opinions expressed in this blog are personal opinions. Any code, programs and/or ideas found on this blog are given out as proof-of-concept and not for malicious usage. The purpose of the blog is to further understand and discuss Information Security, CyberSecurity, CyberDefense and Computer (anti)Forensics by looking into the strengths and/or weaknesses from different angles, through discussions and/or coding examples.

Hope you will have a fun ride..