USB Boot Drives Recommended by Computer Crime Author
In his latest U.S. best seller computer crime book Open Source Intelligence Techniques, fifth Edition, author […]
Congratulations to the winners of the NolaCon 2016 OSINT CTF competition!
We had an outstanding showing with 41 participating teams working to identify 55 […]
OSINT CTF Contest! (Open Source Intelligence Capture the Flag)
What is SHA-1 and how is it used?
SHA-1 (Secure Hash Algorithm 1) is one of four standardized cryptographic algorithms in the Secure Hash Algorithm family […]