PinnedPublished inInfoSec Write-upsInstalling Volatility 3 on Windows just in 4 Steps: A Guide for BeginnersVolatility 3 is a powerful python tool for memory analysis, often used in digital forensics investigations. However, installing and using…Jun 24, 2024Jun 24, 2024
PinnedAbout Me — Vihanga (The Bird Guy)Hi, my name is Vihanga Koojana in Sinhala language it is the sound birds make, and it means sound of birds. If you say it in Sinhalese…Jun 18, 2024Jun 18, 2024
Cryptography | How to decrypt using Caeser cipherIn the previous article, you learned how Caeser cipher encryption works. In this article, you will learn how the decryption performs…Jul 3, 2024Jul 3, 2024
Cryptography | How to encrypt using Caeser cipherIt is still possible to start with the Caesar Cipher and travel to the present day in terms of confidentiality. Securing of communications…Jul 2, 20241Jul 2, 20241