Blog

Welcome to my blog posts. Initially, this site was dedicated solely to cybersecurity, information technology, and other technical-related topics. While I still have posts on these topics, I’ve also expanded to non-technology items that I hope other people may find helpful.

For my latest posts on technical topics, I encourage you to create an account on my company website, Natsar.com.

Using Digital Forensics to Solve Missing Person Cases
person looking out of a window
CorelDRAW and OneDrive Failing to Install on Mac OS
CorelDRAW installation successful screenshot
Cyberattacks and How To Protect Your Computer and Data – Part 3 of 3
LASartorBanner
Cyberattacks and How To Protect Your Computer and Data – Part 2 of 3
Connection not private example
Cyberattacks and How To Protect Your Computer and Data – Part 1 of 3
Cyber Kill Chain
The digital breadcrumbs in the Parkland, FL shooting: Were they followed?
Screenshot showing lookup of IP using Domain Dossier
Windows 10 Parental Control Settings
Screenshot of Windows 10 child settings
iOS 11 Parental Control Settings
IMG_0005-1
Who Are You Allowing in Your House at Night?
Picture of a child with a cell phone
Cybersecurity Considerations with Bring Your Own Device (BYOD) Implementations
Word cloud for BYOD
Reducing Classified Spillage Incidents
Screenshot of Windows folder structure
Why Multifactor Authentication is so Important
Screenshot of Google Authenticator app
Sitting in the Hot Seat: OPM Director Answers Tough Questions about 2015 Breach
OPM Breach
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifications, and Accreditation
Screen Shot 2015-05-10 at 8.56.40 PM
Protecting your Family Against Inappropriate Internet Content
Social Media
Using a SAN or NAS to Store Digital Evidence
EMC SAN
How Digital Pictures and Videos can be a Threat to Privacy
MicroSD
Creating a Mobile Digital Forensics Laboratory
3
How to Prevent your Computer from Being Used by Cybercriminals
APT_Lifecycle
Domain vs. Local Accounts in the Windows Registry
Registry
Creating Screenshots and Recordings in Digital Forensic Investigations Using Free Mac Tools
Screen_Shot_2013-04-05_at_6.37.03_PM
Finding Deleted URLs in Mozilla Firefox places.sqlite File
Mozilla-29
Understanding Peer to Peer Investigations in Child Exploitation Cases
P2P_peer-to_peer
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.