Xploring Digital World Anant Gangwar
-
- Technology
Nominated as Top Artificial Intelligence (AI) Podcast by Threat.Technology.
Former name: "Latest Techs - Stay updated!"
This podcast gives you an exciting tour of the latest technologies being explored by the whole world to make them smarter. We talk about AI Security, Machine Learning, Digital Forensics, and other various tools & technologies that are essential in development, security, and investigation especially. Furthermore, you will get the answers regarding the use of technologies like Artificial Intelligence, Docker containers, Digital Forensics tools, etc in improving security frameworks, efficiency, and ease of the operation of available services. We believe in the "kaizen" concept - continuous learning, continuous growth.
-
Robots Security and Blockchain Swarm
Robot swarms could greatly benefit from shared knowledge. Decisions could be based on a shared view of the world. The ARGoS robot simulator is the state-of-the-art research platform to conduct simulations in swarm robotics. Each robot acts as an Ethereum blockchain node, maintaining a custom Ethereum network. The interface is intended to facilitate research in blockchain-based robot swarms by allowing Ethereum functions in ARGoS.
-
Mapping Digital Crimes with Cyber Acts
Crime mapping is done by analysts in law enforcement agencies to map, visualize, and analyze and correlate data sources to create a detailed picture of crime incidents and related factors within a community or other geographical area. It is a key component of crime analysis and the CompStat policing strategy. Here I've explained Digital crime mapping with Cyber Acts.
-
JTAG - ChipOff - ISP Forensics - Tools and Challenges
In order to delve as deeply as possible into a mobile device for your forensic investigation, you may need to access the device’s contents on a physical level—creating and sorting through a raw data dump of the smartphone’s NAND or NOR flash memory chips. There are many tools and techniques which allow forensic investigators to obtain this level of access, even if the smartphone is locked.
-
Forensics of Cloud Machine Learning Platforms
Machine Learning algorithms enable the investigators to interrogate the vast scattered data sets which are placed in social and wired networks and web or cloud computing. Its pattern recognition software is used to analyze huge amounts of data that are used to predict its current & future behavior. ML Forensics gains the capability to recognize the patterns of criminal activities through ML algorithms, in order to learn from the historical data about when and where the crime will take place.
-
ARVR and Digital Evidences
The latest craze of content sharing suits VR as users can cohabit Virtual Environment and contribute content unique to immersion. When placed in an immersive VR environment, the user's view is completely obstructed from the real world due to the Head Mounted Display. Complete immersion into VR amplifies the consequences of cyberbullying and sexual harassment, where the misconduct “feels all too real”.
-
Malware Analysis using Deep Exploit, REMNux & Cuckoobox
Malware analysis is the process of learning how malware functions and any potential repercussions of a given malware. Malware code can differ radically, and it's essential to know that malware can have many functionalities. These may come in the form of viruses, worms, spyware, and Trojan horses. Each type of malware gathers information about the infected device without the knowledge, or authorization of the user.