Skip to main content
Introduction to Mac Repair - Tips for Troubleshooting and Fixing Macs

Introduction to Mac Repair - Tips for Troubleshooting and Fixing Macs

Various nuances of dealing with Mac computers in terms of troubleshooting and repair are being scrutinized and explained by Eli the Computer Guy in this entry. Here the tech expert provides a comparison of Windows workstations and Macs with regard to complexity of fixing and typical issues that are most likely to occur. Furthermore, Eli gives a walkthrough on some of the essential properties of Mac user interface.

John Dee
John Dee
5.7K
OS X Anti-Forensics Techniques 3 - Expanding the Attack Space

OS X Anti-Forensics Techniques 3 - Expanding the Attack Space

Providing a yet deeper insight into methods for avoiding forensics while using Mac OS X, the Grugq enumerates several more attack vectors, including those associated with zero width Unicode, application file formats, browser cookies and SQLite. In conclusion, the researcher highlights some essential anti-forensics recommendations overall, and answers a few questions from the HIRBSecConf attendees on the topic.

John Dee
John Dee
4.6K
OS X Anti-Forensics Techniques 2 - Assaulting OS X

OS X Anti-Forensics Techniques 2 - Assaulting OS X

Continuing the review of Mac OS X in the context of anti-forensics methodology, the Grugq delves here into file system attacks, in particular focusing on exploitable aspects of HFS+. The researcher provides an analysis of this file system’s components and makes an insight into the essence of B*tree nodes and data forks, singling out the ways to use those while conducting HFS+ attacks.

Admin
Admin
7.0K
OS X Anti-Forensics Techniques - How the Leopard Hides His Spots

OS X Anti-Forensics Techniques - How the Leopard Hides His Spots

The Grugq, a well-known anti-forensics researcher with substantial computer security background, outlines the key issues related to counter-forensics for the OS X platform while participating in HIRBSecConf event. During this presentation entitled “How the Leopard Hides His Spots”, the Grugq, in particular, describes the techniques that help evade application-level file format attacks, HFS-specific attacks, SQLite-based attacks, etc., based on his previous experience.

Admin
Admin
17.6K