File dates and times Dates and times can be altered to blend malware into its surroundings. Malware may change its dates and times so that it will appear consistent with …
ExpertTrack Courses Welcome to this ExpertTrack course. This course forms part of the ExpertTrack series of courses. Over the next number courses, you’ll explore core activities and have the opportunity …
File size A file actually has two different sizes. The first relates to the size of the file itself, referred to as the logical size, i.e., how big the file …
Attribute 0x40 $OBJECT_ID The purpose of the Object Id attribute is to identify individual files on a network. This attribute is known as a resident attribute meaning that all the …
File name The name of a file is stored as metadata within the file system the file is saved to. Occasionally the name of a file can also be identified …
Course Instructor Bio Welcome to the course. My name is Steve Shepherd MBE and I will be your course instructor. I am a passionate about cyber security and related matters …
Attribute 0x30 $FILE_NAME The File Name attribute contains the actual file name itself together with the logical size (true size of file) and physical size (size of the file on …
Obfuscation Google dictionary says: Malware does not want to be seen. It will hide on your computer and for the most, attempt to blend into your system. The malware may …