<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="http://racfor.zesoi.fer.hr/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>Računalna forenzika / Computer forensics en:racfor_wiki</title>
        <description></description>
        <link>http://racfor.zesoi.fer.hr/</link>
        <lastBuildDate>Wed, 29 Apr 2026 03:57:27 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>http://racfor.zesoi.fer.hr/lib/tpl/A_Centered_Perspective/images/favicon.ico</url>
            <title>Računalna forenzika / Computer forensics</title>
            <link>http://racfor.zesoi.fer.hr/</link>
        </image>
        <item>
            <title>en:racfor_wiki:block_cipher_modes</title>
            <link>http://racfor.zesoi.fer.hr/doku.php?id=en:racfor_wiki:block_cipher_modes&amp;rev=1733401457&amp;do=diff</link>
            <description>Block Cipher Modes

Abstract

Block cipher is one of the most widely-used tool in cryptography, and its mode of operation features the use of a symmetric-key block-cipher algorithm in providing information security such as confidentiality or authenticity. Five modes of operation with AES algorithm will be discussed in this paper: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).  These modes can provide cryptographic protecti…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>en:racfor_wiki</category>
            <pubDate>Thu, 05 Dec 2024 12:24:17 +0000</pubDate>
        </item>
        <item>
            <title>en:racfor_wiki:malware_hidden_in_video_files</title>
            <link>http://racfor.zesoi.fer.hr/doku.php?id=en:racfor_wiki:malware_hidden_in_video_files&amp;rev=1733401457&amp;do=diff</link>
            <description>Malware hidden in video files

Abstract

While we are extra careful with executable files, we consider video files harmless, even though they can execute relatively high-privilege program, such as Windows Media Player. In this article, we are going to discuss how harmful can video files really be, their way to infect a computer, the extensions used to exploit flaws, how to detect that something’s wrong and how can we defend ourselves against this type of malware.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>en:racfor_wiki</category>
            <pubDate>Thu, 05 Dec 2024 12:24:17 +0000</pubDate>
        </item>
        <item>
            <title>en:racfor_wiki:template</title>
            <link>http://racfor.zesoi.fer.hr/doku.php?id=en:racfor_wiki:template&amp;rev=1733401457&amp;do=diff</link>
            <description>Title

Abstract

How do you write an abstract? Identify your purpose. You're writing about a correlation between lack of lunches in schools and poor grades. … Explain the problem at hand. Abstracts state the “problem” behind your work. … Explain your methods. … (Source) Save your work regularly!!! Describe your results (informative abstract only). … Abstract should be no longer that 400 words. Please note that the table of contents in the  upper part of the page is generated automatically based …</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
        <category>en:racfor_wiki</category>
            <pubDate>Thu, 05 Dec 2024 12:24:17 +0000</pubDate>
        </item>
    </channel>
</rss>
