Computer Science Knowledge Base

      • 🌱Basics/Intro
          • CLOOK.excalidraw
      • 🌱Basics/Intro
      • 🌱Basics/Intro
      • RAM
      • 🌱Basics/Intro
        • 2. Link
        • 3. Network
        • 5-7. Application
      • 🌱Basics/Intro
      • HTTP
      • 🌱Basics/Intro
      • Linux
      • Userspace
      • Windows
      • 🌱Basics/Intro
      • Caching
      • Compression
      • Concurrency & Parallelism
      • Encodings
      • FOSS (Free and Open Source Software)
      • Hashing
      • Number Systems (binary & hex)
      • Programming Paradigms
      • Python
      • 🌱Basics/Intro
      • White, Grey & Black Hat Hacking
    Home

    ❯

    Security and Cryptography

    ❯

    🌱Basics/Intro
        • 🌱Basics/Intro
            • CLOOK.excalidraw
        • 🌱Basics/Intro
        • 🌱Basics/Intro
        • RAM
        • 🌱Basics/Intro
          • 2. Link
          • 3. Network
          • 5-7. Application
        • 🌱Basics/Intro
        • HTTP
        • 🌱Basics/Intro
        • Linux
        • Userspace
        • Windows
        • 🌱Basics/Intro
        • Caching
        • Compression
        • Concurrency & Parallelism
        • Encodings
        • FOSS (Free and Open Source Software)
        • Hashing
        • Number Systems (binary & hex)
        • Programming Paradigms
        • Python
        • 🌱Basics/Intro
        • White, Grey & Black Hat Hacking

      🌱Basics/Intro

      Jan 09, 20241 min read

      • (A Detailed Guide to Digital Forensics: Tools, Scope, Jobs, and Competition | LinkedIn

      Additional Resources

      • Talks/interviews
        • We interviewed a former Valorant Vanguard Anticheat Developer… (youtube.com)
      • Personal Security
        • Greymarkets
          • Remove Personal Info from Google - DeleteMe (joindeleteme.com)
          • Incogni
      • AI
        • Disrupting malicious uses of AI by state-affiliated threat actors (openai.com)
        • Forecasting potential misuses of language models for disinformation campaigns and how to reduce risk (openai.com)
        • Staying ahead of threat actors in the age of AI | Microsoft Security Blog
      • OSINT
        • mstic/PublicFeeds/ThreatActorNaming/MicrosoftMapping.json at master · microsoft/mstic (github.com)
      • Channels
        • Eric Parker - YouTube

      Graph View

      Backlinks

      • No backlinks found

      Created with Quartz v4.4.0 © 2025

      The Compsci KB by Kieran Wood is licensed under CC BY-SA 4.0

      • GitHub
      • LinkedIn
      • Personal
      • Canadian Coding
      • Blog