<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7207469758402217263</id><updated>2016-12-14T05:31:39.398-08:00</updated><title type='text'>SecurityBlog</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/7207469758402217263/posts/default'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>walid abdulla</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-8901725111743358764</id><published>2016-10-21T14:38:00.001-07:00</published><updated>2016-10-21T14:40:46.002-07:00</updated><title type='text'>CRACKING ANDROID PATTERNS, PINS AND PASSWORDS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;headline&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px solid rgb(255, 255, 255) !important; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px 0px 5px; outline: 0px; overflow: hidden; padding: 5px; text-transform: uppercase;&quot;&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-JuKWa7oZzIA/WAqLT3-ZEqI/AAAAAAAACqo/DPcYCVE1mXAm_sVdmEnALrGeDyePP97YwCLcB/s1600/123.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://1.bp.blogspot.com/-JuKWa7oZzIA/WAqLT3-ZEqI/AAAAAAAACqo/DPcYCVE1mXAm_sVdmEnALrGeDyePP97YwCLcB/s400/123.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;headline&quot; style=&quot;border: 0px solid rgb(255, 255, 255); margin: 0px 0px 5px; outline: 0px; overflow: hidden; padding: 5px;&quot;&gt;&lt;h2 style=&quot;border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;CRACKING ANDROID PATTERNS, PINS AND PASSWORDS&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px solid rgb(255, 255, 255); float: right; margin: 3px 5px 0px 0px; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;articleinfo&quot; style=&quot;border: 0px; font-size: 10pt; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border: 1px solid rgb(148, 149, 153); margin: 0px 0px 5px; outline: 0px; padding: 2px 2px 2px 5px; text-transform: none;&quot;&gt;&lt;span class=&quot;author&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: white; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Written by DFM team&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px; font-size: 10pt; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px; font-size: 10pt; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;border: 0px; color: #666666; font-family: &amp;quot;lucida grande&amp;quot;, &amp;quot;lucida sans unicode&amp;quot;, &amp;quot;lucida sans&amp;quot;, &amp;quot;dejavu sans&amp;quot;, &amp;quot;bitstream vera sans&amp;quot;, &amp;quot;liberation sans&amp;quot;, verdana, &amp;quot;verdana ref&amp;quot;, sans-serif; font-size: 16.8px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;CRACKING ANDROID PATTERNS, PINS AND PASSWORDS&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;border: 0px; font-size: 10pt; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Circumventing &amp;amp; Cracking the Android 3 Ps&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px; font-size: 10pt; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;If you’ve even begun the journey into mobile device forensics, you’ve already likely encountered the dreaded “lock screen” on a device secured by a pattern, PIN or password. This article provides background on how Android implements the lock screens and techniques for circumventing and cracking them. Like many forensic techniques, this information could be used for nefarious purposes; however, our intentions are to empower practitioners who use forensics for legal purposes.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px; font-size: 10pt; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;In the past, many mobile users did not want to lock their device, as it was an inconvenience. Today, a growing number of users are becoming security conscious and have realized that the inconvenience of a locked device pales in comparison to issues resulting from a stolen or lost phone. As such, mobile forensic examiners are increasingly encountering&lt;br /&gt;locked devices. It also stands to reason that sophisticated criminals who use smartphones will almost certainly have a locked device.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px solid rgb(255, 255, 255); margin: 0px; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px solid rgb(255, 255, 255); margin: 0px; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border: 0px solid rgb(255, 255, 255); margin: 0px; outline: 0px; padding: 0px; text-transform: none;&quot;&gt;&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px !important; font-size: 10pt; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px !important; font-size: 10pt; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Find out more &amp;nbsp;and read the full article. Or if you&#39;re a subscriber, login and&amp;nbsp;&lt;a href=&quot;http://viewer.zmags.com/publication/4ef4da69#/4ef4da69/16&quot; mce_href=&quot;http://viewer.zmags.com/publication/4ef4da69#/4ef4da69/16&quot; style=&quot;border: 0px; color: #0000cc; font-size: 13.3333px; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;Read online&quot;&gt;read the article online&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; float: left; font-size: 14px; margin: 0px; outline: 0px; padding: 0px; text-align: left; width: auto;&quot;&gt;&lt;br /&gt;&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/8901725111743358764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/cracking-android-patterns-pins-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/8901725111743358764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/8901725111743358764'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/cracking-android-patterns-pins-and.html' title='CRACKING ANDROID PATTERNS, PINS AND PASSWORDS'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-JuKWa7oZzIA/WAqLT3-ZEqI/AAAAAAAACqo/DPcYCVE1mXAm_sVdmEnALrGeDyePP97YwCLcB/s72-c/123.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-5698643823354672953</id><published>2016-10-20T18:27:00.001-07:00</published><updated>2016-11-29T02:29:34.592-08:00</updated><title type='text'>Comparison Forensic Microscope</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 class=&quot;page-title&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; color: #003359; font-family: Verdana, Geneva, sans-serif; font-size: 24px; line-height: 1em; margin: 0px 0px 16px; outline: 0px; padding: 0px 0px 5px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Comparison Forensic Microscope&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-cbDZJ6itCk4/WAluef_cWdI/AAAAAAAACqE/n-J4aL4Q9YQYmQ4CpvvaKti48kHXfqKOwCLcB/s1600/16200-TB-500x500.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://3.bp.blogspot.com/-cbDZJ6itCk4/WAluef_cWdI/AAAAAAAACqE/n-J4aL4Q9YQYmQ4CpvvaKti48kHXfqKOwCLcB/s400/16200-TB-500x500.jpg&quot; width=&quot;400&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/comparison-forensic-microscope_20.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/5698643823354672953/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/comparison-forensic-microscope_20.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/5698643823354672953'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/5698643823354672953'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/comparison-forensic-microscope_20.html' title='Comparison Forensic Microscope'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-cbDZJ6itCk4/WAluef_cWdI/AAAAAAAACqE/n-J4aL4Q9YQYmQ4CpvvaKti48kHXfqKOwCLcB/s72-c/16200-TB-500x500.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-794729221230589894</id><published>2016-10-19T21:51:00.001-07:00</published><updated>2016-10-19T21:51:06.245-07:00</updated><title type='text'>Crimes of Fashion | How Criminals have Influenced ...</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/--L7K02poa70/WAhNG5TxixI/AAAAAAAACpU/YstqCQzhzVkSyPUQbXhCIe_bHZ7djkM_wCLcB/s1600/555.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://3.bp.blogspot.com/--L7K02poa70/WAhNG5TxixI/AAAAAAAACpU/YstqCQzhzVkSyPUQbXhCIe_bHZ7djkM_wCLcB/s400/555.jpg&quot; width=&quot;371&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;&lt;br&gt;&lt;h3 class=&quot;r&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 18px; font-weight: normal; margin: 0px; overflow: hidden; padding: 0px; text-align: left; text-overflow: ellipsis; white-space: nowrap;&quot;&gt;&lt;span dir=&quot;ltr&quot; style=&quot;unicode-bidi: isolate;&quot;&gt;Crimes of Fashion | How Criminals have Influenced ...&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span dir=&quot;ltr&quot; style=&quot;unicode-bidi: isolate;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span dir=&quot;ltr&quot; style=&quot;unicode-bidi: isolate;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/crimes-of-fashion-how-criminals-have.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/794729221230589894/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/crimes-of-fashion-how-criminals-have.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/794729221230589894'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/794729221230589894'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/crimes-of-fashion-how-criminals-have.html' title='Crimes of Fashion | How Criminals have Influenced ...'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/--L7K02poa70/WAhNG5TxixI/AAAAAAAACpU/YstqCQzhzVkSyPUQbXhCIe_bHZ7djkM_wCLcB/s72-c/555.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-5700055216829295605</id><published>2016-10-19T16:24:00.005-07:00</published><updated>2016-10-19T16:24:55.658-07:00</updated><title type='text'>DNA Evidence: How It&#39;s Done - Forensic Science Simplified</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-pBUG-N1pVqg/WAgAclbVU_I/AAAAAAAACoE/Fh5cWmAX0xwTHSpRfjNT_mLnOySvy_g_QCLcB/s1600/Jackie.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;418&quot; src=&quot;https://2.bp.blogspot.com/-pBUG-N1pVqg/WAgAclbVU_I/AAAAAAAACoE/Fh5cWmAX0xwTHSpRfjNT_mLnOySvy_g_QCLcB/s640/Jackie.jpg&quot; width=&quot;640&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;h3 class=&quot;r&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 18px; font-weight: normal; margin: 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; white-space: nowrap;&quot;&gt;&lt;br&gt;&lt;/h3&gt;&lt;h3 class=&quot;r&quot; style=&quot;background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 18px; font-weight: normal; margin: 0px; overflow: hidden; padding: 0px; text-overflow: ellipsis; white-space: nowrap;&quot;&gt;DNA Evidence: How It&amp;#39;s Done - Forensic Science Simplified&lt;/h3&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/dna-evidence-how-its-done-forensic.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/5700055216829295605/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/dna-evidence-how-its-done-forensic.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/5700055216829295605'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/5700055216829295605'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/dna-evidence-how-its-done-forensic.html' title='DNA Evidence: How It&#39;s Done - Forensic Science Simplified'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-pBUG-N1pVqg/WAgAclbVU_I/AAAAAAAACoE/Fh5cWmAX0xwTHSpRfjNT_mLnOySvy_g_QCLcB/s72-c/Jackie.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-2977872580034784145</id><published>2016-10-18T19:27:00.002-07:00</published><updated>2016-10-18T19:32:31.811-07:00</updated><title type='text'>Ladies And Crime Scene</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-zvNflyk2Sc4/WAbZr2ilO3I/AAAAAAAACnc/JY9hzPyvcBAfLbvOnr1cu76bqymw7sVwgCLcB/s1600/images%2B%252811%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;299&quot; src=&quot;https://3.bp.blogspot.com/-zvNflyk2Sc4/WAbZr2ilO3I/AAAAAAAACnc/JY9hzPyvcBAfLbvOnr1cu76bqymw7sVwgCLcB/s400/images%2B%252811%2529.jpg&quot; width=&quot;400&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;background-color: #f9f9f9; color: #111111; font-family: ProximaNova, Arial, Helvetica, sans-serif; font-size: 2.666em; font-weight: normal; letter-spacing: -1px; line-height: 1; margin: 0.25em 0px; padding: 0px; text-rendering: optimizeLegibility; word-wrap: break-word;&quot;&gt;&lt;/h1&gt;&lt;h4 style=&quot;background-color: #f9f9f9; color: #111111; font-family: &amp;quot;proximanova&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 2.666em; font-weight: normal; letter-spacing: -1px; line-height: 1; margin: 0.25em 0px; padding: 0px; text-align: left; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 20px; font-weight: bold; letter-spacing: normal;&quot;&gt;Jayson Doelz Murder Case:&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 20px; font-weight: bold; letter-spacing: normal;&quot;&gt;Woman Who allegedly cleaned crime Scene Given bail&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 20px; font-weight: bold; letter-spacing: normal;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;byline&quot; style=&quot;background-color: #f9f9f9; color: #737373; font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 0px 0px 0.5em; outline: none 0px; padding: 0px; word-wrap: break-word;&quot;&gt;By &lt;a href=&quot;http://www.abc.net.au/news/rebecca-opie/6799868&quot; style=&quot;color: #310099; margin: 0px; padding: 0px; text-decoration: none; word-wrap: break-word;&quot; target=&quot;_self&quot; title=&quot;&quot;&gt;Rebecca Opie&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;published&quot; style=&quot;background-color: #f9f9f9; color: #737373; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 1.3334; margin-bottom: 1em; padding: 0px; word-wrap: break-word;&quot;&gt;Posted &lt;span class=&quot;timestamp&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot; ts=&quot;September 09, 2016 12:47:57&quot;&gt;&lt;span class=&quot;noprint&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;9 Sep 2016, 4:47am&lt;/span&gt;&lt;span class=&quot;print&quot; style=&quot;left: -32768px; margin: 0px; padding: 0px; position: absolute; top: -32768px; visibility: hidden; word-wrap: break-word;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;span class=&quot;timestamp&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot; ts=&quot;September 09, 2016 12:47:57&quot;&gt;&lt;span class=&quot;noprint&quot; style=&quot;margin: 0px; padding: 0px; word-wrap: break-word;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/ladies-and-crime-scene_18.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/2977872580034784145/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/ladies-and-crime-scene_18.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/2977872580034784145'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/2977872580034784145'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/ladies-and-crime-scene_18.html' title='Ladies And Crime Scene'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-zvNflyk2Sc4/WAbZr2ilO3I/AAAAAAAACnc/JY9hzPyvcBAfLbvOnr1cu76bqymw7sVwgCLcB/s72-c/images%2B%252811%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-6788319676180914684</id><published>2016-10-17T17:21:00.001-07:00</published><updated>2016-10-17T17:21:51.493-07:00</updated><title type='text'>DS 7 System </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-LkyeJB5bfYs/WAVqI_mRQ-I/AAAAAAAACm4/ewgv8DUFaLkPZb-jqt5_P4KfLzDFyk-6gCLcB/s1600/ds-banner.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; src=&quot;https://3.bp.blogspot.com/-LkyeJB5bfYs/WAVqI_mRQ-I/AAAAAAAACm4/ewgv8DUFaLkPZb-jqt5_P4KfLzDFyk-6gCLcB/s640/ds-banner.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;DS7 Digital Mobile Forensic&lt;/h2&gt;&lt;div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;DS was the first mobile forensic tool on the market. Designed from the ground up for forensically sound examinations of cell phones and other devices, DS set the industry standard for mobile investigations. Your tool should include logical and physical acquisitions as well as password bypassing and file system extractions in one easy-to- use tool. Extracting data from devices is only the beginning.&lt;span class=&quot;blockquote-left&quot; style=&quot;border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: initial; border-left-style: initial; border-right-color: rgb(246, 131, 40); border-right-style: solid; border-top-color: initial; border-top-style: initial; border-width: 0px 5px 0px 0px; box-sizing: border-box; color: #161616; float: left; font-family: inherit; font-size: 17.5px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 25px; margin: 10px 15px 10px 0px; padding: 5px 10px 5px 0px; vertical-align: baseline; width: 330px;&quot;&gt;&lt;span class=&quot;icon-quotes-left tcolor2&quot; style=&quot;-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: rgb(246, 131, 40) !important; font-family: icomoon; font-size: inherit; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; speak: none; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&amp;nbsp;Logical, physical, and file system extractions in one low cost tool.&lt;span class=&quot;icon-quotes-right tcolor2&quot; style=&quot;-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: rgb(246, 131, 40) !important; font-family: icomoon; font-size: inherit; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; speak: none; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;DS takes your investigation to the next level with advanced analysis capabilities, data and application parsing, automated deleted data recovery, and much more.&amp;nbsp;&lt;span class=&quot;blockquote-right&quot; style=&quot;border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(246, 131, 40); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 5px; box-sizing: border-box; color: #161616; float: right; font-family: inherit; font-size: 17.5px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 25px; margin: 10px 0px 10px 15px; padding: 5px 0px 5px 25px; vertical-align: baseline; width: 330px;&quot;&gt;&lt;span class=&quot;icon-quotes-left tcolor2&quot; style=&quot;-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: rgb(246, 131, 40) !important; font-family: icomoon; font-size: inherit; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; speak: none; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&amp;nbsp;Automated data parsers &amp;amp; deleted data recovery make your job easier.&amp;nbsp;&lt;span class=&quot;icon-quotes-right tcolor2&quot; style=&quot;-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: rgb(246, 131, 40) !important; font-family: icomoon; font-size: inherit; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; speak: none; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&lt;/span&gt;Add to this list of features integration with Google Earth to pinpoint GPS data found on devices, case comparing to see what has&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;changed on a device from one point in time to another, comprehensive reporting, and importing data from iTunes backups, BlackBerry Backups, cell tower location spreadsheets, Cellebrite &amp;amp; Tarantula data, and GPS/KML files and you won&#39;t be able to find another mobile forensic tool that can match the features of DS. Each license of DS comes with&amp;nbsp;&lt;a class=&quot;tcolor&quot; href=&quot;https://www.paraben.com/link2.html&quot; style=&quot;background: 0px 0px; border: 0px; box-sizing: border-box; color: rgb(246, 131, 40) !important; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Link2&lt;/a&gt;&amp;nbsp;for visual link analysis.&lt;br style=&quot;box-sizing: border-box;&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://www.scmagazine.com/paraben-ds/review/4623/&quot; style=&quot;background: 0px 0px; border: 0px; box-sizing: border-box; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline-offset: -2px; outline: -webkit-focus-ring-color auto 5px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;img align=&quot;left&quot; alt=&quot;SC Magazine Awards - Five Star Review &amp;amp; Best Buy&quot; src=&quot;https://www.paraben.com/images/products/scmag-awards.jpg&quot; style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot; /&gt;For a simple, well thought-out and executed mobile device forensics tool this one is at the top of the heap. Its capabilities are narrow and very deep. It does one thing – mobile device forensics – and it does that extremely well. We make the Paraben DS our Best Buy. - SC Magazine&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h6 class=&quot;black mbottom20&quot; style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: rgb(22, 22, 22) !important; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 400; line-height: 28px; margin-bottom: 20px !important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Logical Acquisitions&lt;/h6&gt;&lt;div class=&quot;gray mbottom20&quot; style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px !important; padding: 0px; vertical-align: baseline;&quot;&gt;DS 7 supports logical acquisitions of over 8,000 mobile devices. Acquired data includes everything from call logs, SMS, pictures, contacts, and other user data to recovery of deleted data from extracted databases.&lt;/div&gt;&lt;h6 class=&quot;black mbottom20&quot; style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: rgb(22, 22, 22) !important; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 400; line-height: 28px; margin-bottom: 20px !important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;DS 14 Day License - $499.00&lt;/strong&gt;&lt;/h6&gt;&lt;div class=&quot;gray mbottom20&quot; style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px !important; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;color: #7e7e7e;&quot;&gt;The 14 day license of DS gives you all the features of DS for a full 14 days. Once your license expires, you can still review acquired data using the license of DS Viewer that&#39;s included with your 14 day license purchase. This option is perfect for anyone who does a limited amount of mobile forensic examinations.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;gray mbottom20&quot; style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px !important; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/div&gt;&lt;ul style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #7e7e7e; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 10px; padding: 0px 0px 0px 40px; vertical-align: baseline;&quot;&gt;&lt;ul style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: disc; margin: 0px; padding: 0px 0px 0px 40px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Includes:&lt;/strong&gt;&lt;ul style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: disc; margin: 0px; padding: 0px 0px 0px 40px; vertical-align: baseline;&quot;&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;14 Day License of DS (Key Based)&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Perpetual License of&amp;nbsp;&lt;a href=&quot;https://www.paraben.com/link2.html&quot; style=&quot;background: 0px 0px; border: 0px; box-sizing: border-box; color: #3d3d3d; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;&lt;u style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Link2&lt;/u&gt;&lt;/a&gt;&amp;nbsp;for Link Analysis&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Perpetual License of DS Viewer for Reviewing DS Case Files After Your 14 Day License Expires&lt;/li&gt;&lt;/ul&gt;&lt;br style=&quot;box-sizing: border-box;&quot; /&gt;&lt;br style=&quot;box-sizing: border-box;&quot; /&gt;Please Note: The DS-Short Access License can only be installed on one computer and cannot be transferred.&lt;/ul&gt;&lt;ul style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: disc; margin: 0px; padding: 0px 0px 0px 40px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;div style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #9f9f9f; font-family: Roboto, Helvetica, Arial, sans-serif; font-size: 13px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/6788319676180914684/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/ds-7-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/6788319676180914684'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/6788319676180914684'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/ds-7-system.html' title='DS 7 System '/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-LkyeJB5bfYs/WAVqI_mRQ-I/AAAAAAAACm4/ewgv8DUFaLkPZb-jqt5_P4KfLzDFyk-6gCLcB/s72-c/ds-banner.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-3009956620663389596</id><published>2016-10-17T15:44:00.001-07:00</published><updated>2016-12-01T03:52:40.154-08:00</updated><title type='text'>Woman Crime Scene Best Gore</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-wlinuxJgRFM/WAVUB2NelQI/AAAAAAAACmo/MYxJbJnEn7oGkOIavmF9KUxRc9VK2HHkwCLcB/s1600/images%2B%25281%2529.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://3.bp.blogspot.com/-wlinuxJgRFM/WAVUB2NelQI/AAAAAAAACmo/MYxJbJnEn7oGkOIavmF9KUxRc9VK2HHkwCLcB/s640/images%2B%25281%2529.jpg&quot; width=&quot;425&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;h2 style=&quot;height: 0px; text-align: left;&quot;&gt;&lt;/h2&gt;&lt;div&gt;&lt;br&gt;&lt;br&gt;&lt;header style=&quot;background-color: #f0f4f4; color: #263333; font-family: &amp;quot;Source Sans Pro&amp;quot;; font-size: 16px; margin: 0em auto 45px; max-width: 100%; text-align: center; width: auto;&quot;&gt;&lt;h2 style=&quot;color: rgba(38, 51, 51, 0.901961); font-size: 30px; font-weight: 300; letter-spacing: 2px; line-height: 1.2em; margin: 0px 0px 0.3em; text-align: left; text-transform: capitalize;&quot;&gt;&lt;/h2&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Evidence And Objectivity In CSI: CrimeScene Investigation&lt;/h3&gt;&lt;span style=&quot;color: #263333; font-size: 0.85em; font-style: italic;&quot;&gt;January 16, 2016&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;color: #263333; font-size: 0.85em; font-style: italic;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/header&gt;&lt;br&gt;&lt;div class=&quot;body entry-content&quot; style=&quot;background-color: #f0f4f4; color: #263333; font-family: &amp;quot;Source Sans Pro&amp;quot;; font-size: 16px; margin: 0em auto 24px; max-width: 100%; width: auto;&quot;&gt;&lt;div class=&quot;sqs-layout sqs-grid-12 columns-12&quot; data-layout-label=&quot;Post Body&quot; data-type=&quot;item&quot; data-updated-on=&quot;1452924953925&quot; id=&quot;item-5699de9c57eb8d0f11422eb5&quot;&gt;&lt;div class=&quot;row sqs-row&quot; style=&quot;margin-left: -17px; margin-right: -17px; width: auto !important;&quot;&gt;&lt;div class=&quot;col sqs-col-12 span-12&quot; style=&quot;float: left; padding-right: 0px; width: 1053px;&quot;&gt;&lt;div class=&quot;sqs-block html-block sqs-block-html&quot; data-block-type=&quot;2&quot; id=&quot;block-fb281bb87e29733e9b59&quot; style=&quot;box-shadow: rgba(128, 128, 128, 0) 0px 0px 0px 1px inset; clear: none; height: auto; outline: none; padding: 0px 17px 17px; position: relative; transition: box-shadow 0.2s ease-in-out;&quot;&gt;&lt;div class=&quot;sqs-block-content&quot; style=&quot;cursor: auto; outline: none;&quot;&gt;&lt;div style=&quot;line-height: 1.6em;&quot;&gt;&lt;/div&gt;By Anna Reser&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;sqs-block html-block sqs-block-html&quot; data-block-type=&quot;2&quot; id=&quot;block-yui_3_17_2_1_1452922701614_72420&quot; style=&quot;box-shadow: rgba(128, 128, 128, 0) 0px 0px 0px 1px inset; clear: none; height: auto; outline: none; padding: 17px; position: relative; transition: box-shadow 0.2s ease-in-out;&quot;&gt;&lt;div class=&quot;sqs-block-content&quot; style=&quot;cursor: auto; outline: none;&quot;&gt;&lt;div style=&quot;line-height: 1.6em;&quot;&gt;A specter hangs over those of us who write about contemporary popular culture and science: that of the ratings behemoth and 15 season network darling, &lt;a href=&quot;http://www.cbs.com/shows/csi/&quot; style=&quot;color: #353ad0; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;CSI: Crime Scene Investigation&lt;/em&gt;&lt;/a&gt;. Because of the immense influence of &lt;em&gt;CSI&lt;/em&gt; on crime drama, especially where it makes certain claims about the utility and truthfulness of scientific method and its conspicuous cast of women investigators, the show is ripe for analysis. As the granddaddy of science on television in the US, &lt;em&gt;CSI&lt;/em&gt; has left its mark on not only its numerous spin-offs, but also the entire genre of crime drama. The &lt;em&gt;CSI&lt;/em&gt; universe is one where objective truths are available to investigators who employ scientific methods to collect physical evidence, which is always valued over personal testimony.The evidence, we are constantly reminded, cannot lie. Predictably, women investigators do a lot less of this science than the men, and women victims suffer both horrifying violence and misrepresentation by the moralizing tone of the show. We should take seriously the possibility that the show’s universe is one that viewers believe to be analogous to the real world, and we can look at how women are treated in this universe as an index of widely-held beliefs about women in science and how science is applied to cases involving violence against women. &lt;br&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/woman-crime-scene-best-gore.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/3009956620663389596/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/woman-crime-scene-best-gore.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/3009956620663389596'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/3009956620663389596'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/woman-crime-scene-best-gore.html' title='Woman Crime Scene Best Gore'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-wlinuxJgRFM/WAVUB2NelQI/AAAAAAAACmo/MYxJbJnEn7oGkOIavmF9KUxRc9VK2HHkwCLcB/s72-c/images%2B%25281%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-404471235844077067</id><published>2016-10-17T14:47:00.002-07:00</published><updated>2016-12-01T03:26:01.307-08:00</updated><title type='text'>49% of UK online users don&#39;t delete their old web accounts</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-3qPnDkNx5ZA/WAVG0Y9bnNI/AAAAAAAACmI/reqQ0Nw2ZHYDYaKRpVes4-AqeeF0m5dWACLcB/s1600/samsung-surveillance-cameras-900x480.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://3.bp.blogspot.com/-3qPnDkNx5ZA/WAVG0Y9bnNI/AAAAAAAACmI/reqQ0Nw2ZHYDYaKRpVes4-AqeeF0m5dWACLcB/s400/samsung-surveillance-cameras-900x480.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;/h2&gt;&lt;div&gt;&lt;h1 class=&quot;articleHeadline&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: CartoGothicStdBold, sans-serif; font-size: 31px; font-weight: normal; line-height: 1.1em; margin: 8px 0px 15px; outline: 0px; padding: 0px;&quot;&gt;49% of UK online users don&#39;t delete their old web accounts&lt;/h1&gt;&lt;/div&gt;&lt;div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;Nearly half (49 percent) of the UK public don&#39;t delete accounts on the web that they no longer use.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;Comparitech.com&lt;a href=&quot;https://www.comparitech.com/blog/information-security/get-security-serious-clean-up-your-old-accounts/&quot; style=&quot;background: transparent; border: none; color: #cc0000; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;warns&lt;/a&gt;&amp;nbsp;that each time a user opens an account, such as social media, online shopping or email, it greatly increases the “attack surface” that a cyber-criminal can exploit, especially if the same username and passwords are continually used.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;For instance, all the users who forgot about their old&lt;a href=&quot;http://www.scmagazineuk.com/myspace-accounts-breach-confirmed-millions-of-accounts-potentially-compromised/article/499842/&quot; style=&quot;background: transparent; border: none; color: #cc0000; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;&quot;&gt;&amp;nbsp;MySpace&lt;/a&gt;&amp;nbsp;accounts that likely haven&#39;t been touched in a decade were part of a huge data breach this year. One may not care what hackers could see from the last 10 years or so, but the dangerous part is that many other user accounts on the web have the same exact credentials.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;“Each time you create a new account, your ‘attack surface&#39; – as those in the industry call it – increases. You become an easier target. Combine these details with other personal data that you sprinkled around the website, and you become prime pickings for identity fraud,” said Lee Munson, security researcher for Comparitech.com.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;Munson came up with five ways that web users can make themselves safer and more secure online:&lt;/div&gt;&lt;br style=&quot;background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px;&quot; /&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;1. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b style=&quot;background: transparent; border: none; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Delete old user accounts&amp;nbsp;&lt;/b&gt;– every time an online account is created and personal information is shared, it is one more possible opportunity for cyber-criminals.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;2. &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b style=&quot;background: transparent; border: none; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&amp;nbsp;Don&#39;t use the same password for more than one account&lt;/b&gt;&amp;nbsp;– Using the same password for multiple accounts is like having one key that opens your car, your house, your safe and your bicycle lock. If someone gets hold of it, you&#39;re in big trouble. A password manager can help.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;3. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b style=&quot;background: transparent; border: none; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Don&#39;t login to online accounts via free WiFi&lt;/b&gt;&amp;nbsp;– This often presents an easy target for hackers to steal personal data and account login details. Use your mobile network if you must access an account in public.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;4. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b style=&quot;background: transparent; border: none; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;If two factor authentication is available, use it&lt;/b&gt;&amp;nbsp;– If someone hacks your account and tries to login from an unfamiliar location, they will usually be prompted to pass additional security, usually by entering a code sent to your phone.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background: rgb(255, 255, 255); border: none; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; outline: 0px; padding: 0px;&quot;&gt;5. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b style=&quot;background: transparent; border: none; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Keep your operating system updated&lt;/b&gt;&amp;nbsp;– System updates often patch security holes. Hackers know that not everyone runs the latest updates and will exploit vulnerabilities in old operating systems.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/404471235844077067/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/49-of-uk-online-users-dont-delete-their.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/404471235844077067'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/404471235844077067'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/49-of-uk-online-users-dont-delete-their.html' title='49% of UK online users don&#39;t delete their old web accounts'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-3qPnDkNx5ZA/WAVG0Y9bnNI/AAAAAAAACmI/reqQ0Nw2ZHYDYaKRpVes4-AqeeF0m5dWACLcB/s72-c/samsung-surveillance-cameras-900x480.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-3665874424660071216</id><published>2016-10-17T14:39:00.004-07:00</published><updated>2016-10-17T14:39:53.860-07:00</updated><title type='text'>Digital Forensic And Investigations </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-tSbJcgQ_jWw/WAVE-EXQvEI/AAAAAAAACmA/rTsI5Ws85-AD8xR4r1FSRO-4uFI9H6-HACLcB/s1600/45.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://1.bp.blogspot.com/-tSbJcgQ_jWw/WAVE-EXQvEI/AAAAAAAACmA/rTsI5Ws85-AD8xR4r1FSRO-4uFI9H6-HACLcB/s1600/45.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Digital Forensic And Investigations&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Book By :&lt;span style=&quot;background-color: white; color: #666666; font-family: arial, helvetica, sans-serif; font-size: 16px; font-style: italic;&quot;&gt;Andrew Sheldon&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/digital-forensic-and-investigations.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/3665874424660071216/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/digital-forensic-and-investigations.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/3665874424660071216'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/3665874424660071216'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/digital-forensic-and-investigations.html' title='Digital Forensic And Investigations '/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-tSbJcgQ_jWw/WAVE-EXQvEI/AAAAAAAACmA/rTsI5Ws85-AD8xR4r1FSRO-4uFI9H6-HACLcB/s72-c/45.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-8315093920327898911</id><published>2016-10-16T21:02:00.001-07:00</published><updated>2016-10-16T21:08:42.356-07:00</updated><title type='text'>Secure ID Printing System</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br&gt;&lt;/h3&gt;&lt;div&gt;Its Used to systematic the entering of visitors into a secured building , developing the system depends on high secured products  &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-FJfb1VIEWBM/WARMtAO_yQI/AAAAAAAAClA/AW5q9fdHzcsZBdTZx_EXmr2_56VmpxZXgCLcB/s1600/Magicard-Brochure--page-001.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-FJfb1VIEWBM/WARMtAO_yQI/AAAAAAAAClA/AW5q9fdHzcsZBdTZx_EXmr2_56VmpxZXgCLcB/s640/Magicard-Brochure--page-001.jpg&quot; width=&quot;452&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/secure-id-printing-system.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/8315093920327898911/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/secure-id-printing-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/8315093920327898911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/8315093920327898911'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/secure-id-printing-system.html' title='Secure ID Printing System'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-FJfb1VIEWBM/WARMtAO_yQI/AAAAAAAAClA/AW5q9fdHzcsZBdTZx_EXmr2_56VmpxZXgCLcB/s72-c/Magicard-Brochure--page-001.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-1881284529272394712</id><published>2016-10-16T17:54:00.002-07:00</published><updated>2016-12-01T03:59:20.440-08:00</updated><title type='text'>Faraday bags  by Firewire Revolution</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h1 style=&quot;background-color: white; color: #303030; font-family: &amp;quot;PT Sans&amp;quot;; font-size: 60px; letter-spacing: -1px; line-height: 1.1; margin: 0px 0px 24px; text-rendering: optimizeLegibility;&quot;&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt;High quality Faraday bags for forensic experts, law-enforcement, military or corporations.&lt;/span&gt;&lt;span style=&quot;font-size: 18px;&quot;&gt; &lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;big&quot; style=&quot;background-color: white; color: #303030; font-family: &amp;quot;PT Sans&amp;quot;; font-size: 18px; margin-bottom: 36px;&quot;&gt;Keep your mobile devices shielded securely.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-W9ztG76pS94/WAQg7BEYd_I/AAAAAAAACkY/lTK0mzRY6M4AKXWLAHc59tR8NK624-VXgCLcB/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://4.bp.blogspot.com/-W9ztG76pS94/WAQg7BEYd_I/AAAAAAAACkY/lTK0mzRY6M4AKXWLAHc59tR8NK624-VXgCLcB/s640/1.jpg&quot; width=&quot;640&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/faraday-bags-by-firewire-revolution.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/1881284529272394712/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/faraday-bags-by-firewire-revolution.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/1881284529272394712'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/1881284529272394712'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/faraday-bags-by-firewire-revolution.html' title='Faraday bags  by Firewire Revolution'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-W9ztG76pS94/WAQg7BEYd_I/AAAAAAAACkY/lTK0mzRY6M4AKXWLAHc59tR8NK624-VXgCLcB/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7207469758402217263.post-5454750462296979835</id><published>2016-10-16T17:48:00.002-07:00</published><updated>2016-12-01T03:56:52.245-08:00</updated><title type='text'>Tanta Project July 2016</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Tanta Project July 2016&lt;/h2&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Full Alarm System in Shebshir , Tanta for El Seham Company for petrol and chemical&lt;/h3&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;United For General Trading finished that Project on 15 of July 2016&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-xkoLc2Uy2Rc/WAQemEi1yVI/AAAAAAAACkE/mVo26NjmttU5M3Z8jkHeDxnrf0plZOMDACLcB/s1600/44.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://2.bp.blogspot.com/-xkoLc2Uy2Rc/WAQemEi1yVI/AAAAAAAACkE/mVo26NjmttU5M3Z8jkHeDxnrf0plZOMDACLcB/s640/44.jpg&quot; width=&quot;480&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;&lt;br&gt;&lt;/div&gt;&lt;a href=&quot;http://securityugtblog.blogspot.com/2016/10/tanta-project-july-2016.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://securityugtblog.blogspot.com/feeds/5454750462296979835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/tanta-project-july-2016.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/5454750462296979835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7207469758402217263/posts/default/5454750462296979835'/><link rel='alternate' type='text/html' href='http://securityugtblog.blogspot.com/2016/10/tanta-project-july-2016.html' title='Tanta Project July 2016'/><author><name>walid abdulla</name><uri>https://plus.google.com/105050496642411782937</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh5.googleusercontent.com/-gQnpK_3TSFg/AAAAAAAAAAI/AAAAAAAACjc/NiYbBhqnxOs/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-xkoLc2Uy2Rc/WAQemEi1yVI/AAAAAAAACkE/mVo26NjmttU5M3Z8jkHeDxnrf0plZOMDACLcB/s72-c/44.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>