Pub Date : 2019-10-08DOI: 10.1002/9781119560302.ch9
Joakim Kävrestad
2. offline mode In this mode, RedisInsight analyzes your redis backup files. These files can either be present in your system or on s3. RedisInsight accepts a list of rdb files given to it and analyzes all the information required from these files instead of downloading it from your redis instance. In order to analyze backup files stored in s3, RedisInsight should have ReadOnly permission to your s3 bucket where the files are stored. Specify the name of the s3 bucket and the path to the rdb file.
{"title":"Memory Analysis","authors":"Joakim Kävrestad","doi":"10.1002/9781119560302.ch9","DOIUrl":"https://doi.org/10.1002/9781119560302.ch9","url":null,"abstract":"2. offline mode In this mode, RedisInsight analyzes your redis backup files. These files can either be present in your system or on s3. RedisInsight accepts a list of rdb files given to it and analyzes all the information required from these files instead of downloading it from your redis instance. In order to analyze backup files stored in s3, RedisInsight should have ReadOnly permission to your s3 bucket where the files are stored. Specify the name of the s3 bucket and the path to the rdb file.","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"2 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116749312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-31DOI: 10.1007/978-3-030-38954-3
Joakim Kävrestad
{"title":"Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications","authors":"Joakim Kävrestad","doi":"10.1007/978-3-030-38954-3","DOIUrl":"https://doi.org/10.1007/978-3-030-38954-3","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123009798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-67450-6_5
Joakim Kävrestad
{"title":"Analyzing Data and Writing Reports","authors":"Joakim Kävrestad","doi":"10.1007/978-3-319-67450-6_5","DOIUrl":"https://doi.org/10.1007/978-3-319-67450-6_5","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-38954-3_4
Joakim Kävrestad
{"title":"Notable Artifacts","authors":"Joakim Kävrestad","doi":"10.1007/978-3-030-38954-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-38954-3_4","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-38954-3_14
Joakim Kävrestad
{"title":"Finding Artifacts","authors":"Joakim Kävrestad","doi":"10.1007/978-3-030-38954-3_14","DOIUrl":"https://doi.org/10.1007/978-3-030-38954-3_14","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-96319-8_5
Joakim Kävrestad
{"title":"Decryption and Password Enforcing","authors":"Joakim Kävrestad","doi":"10.1007/978-3-319-96319-8_5","DOIUrl":"https://doi.org/10.1007/978-3-319-96319-8_5","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"441 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131668448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-96319-8_14
Joakim Kävrestad
{"title":"Open-Source or Freeware Tools","authors":"Joakim Kävrestad","doi":"10.1007/978-3-319-96319-8_14","DOIUrl":"https://doi.org/10.1007/978-3-319-96319-8_14","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"9 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-96319-8_17
Joakim Kävrestad
{"title":"Memory Analysis in Criminal Investigations","authors":"Joakim Kävrestad","doi":"10.1007/978-3-319-96319-8_17","DOIUrl":"https://doi.org/10.1007/978-3-319-96319-8_17","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-38954-3_3
Joakim Kävrestad
{"title":"Computer Theory","authors":"Joakim Kävrestad","doi":"10.1007/978-3-030-38954-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-38954-3_3","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129843403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-96319-8_10
Joakim Kävrestad
{"title":"Cracking","authors":"Joakim Kävrestad","doi":"10.1007/978-3-319-96319-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-96319-8_10","url":null,"abstract":"","PeriodicalId":368941,"journal":{"name":"Fundamentals of Digital Forensics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123659488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}