From 8a54929c235da61a585743ce3c61ce0016f7e2bd Mon Sep 17 00:00:00 2001 From: Joachim Metz Date: Thu, 1 Feb 2024 22:26:18 +0100 Subject: [PATCH] Removed dead references (#224) --- docs/analyzing_program_execution.md | 5 +---- docs/blogs.md | 2 -- docs/isplumia635.md | 2 +- docs/mac_os_x.md | 5 ----- docs/solaris.md | 1 - docs/virtual_hard_disk_(vhd).md | 1 - docs/vista_thumbcache.md | 1 - docs/windows_encrypted_file_system.md | 4 ---- docs/windows_memory_analysis.md | 2 -- docs/windows_registry.md | 1 - docs/zeitgeist.md | 4 +--- 11 files changed, 3 insertions(+), 25 deletions(-) diff --git a/docs/analyzing_program_execution.md b/docs/analyzing_program_execution.md index 8cac919b2..809c3b3b8 100644 --- a/docs/analyzing_program_execution.md +++ b/docs/analyzing_program_execution.md @@ -45,8 +45,7 @@ This article focuses on the direct program execution indicators. - Minidumps - Services and drivers - UserAssist Registry key -- [Windows Application - Compatibility](windows_application_compatibility.md) +- [Windows Application Compatibility](windows_application_compatibility.md) - RecentFileCache.bcf - Amcache.hve - AppCompatCache Registry key @@ -82,5 +81,3 @@ will vary per product. by [Harlan Carvey](harlan_carvey.md), July 06, 2013 - [It Is All About Program Execution](http://journeyintoir.blogspot.com/2014/01/it-is-all-about-program-execution.html), by Corey Harrell, January 14, 2014 -- [Know your Windows Processes or Die Trying](http://survey-smiles.com), - by Patrick Olsen, January 18, 2014 diff --git a/docs/blogs.md b/docs/blogs.md index b6ca71cd8..27ab15d6c 100644 --- a/docs/blogs.md +++ b/docs/blogs.md @@ -98,8 +98,6 @@ like: blogs, fora, tweets, tools and challenges (and test images). by Paul Bobby - [Security Ripcord: Cutaway Security Blog and Projects](https://www.cutawaysecurity.com/), by Don C. Weber - [Sketchymoose's Blog](https://sketchymoose.blogspot.com/) -- [System Forensics](http://survey-smiles.com), - by Patrick Olsen - [TaoSecurity](https://taosecurity.blogspot.com), by Richard Bejtlich - [The Apple Examiner](http://www.appleexaminer.com/) diff --git a/docs/isplumia635.md b/docs/isplumia635.md index 4a9ddc624..7aa172937 100644 --- a/docs/isplumia635.md +++ b/docs/isplumia635.md @@ -18,7 +18,7 @@ read via ISP, and then reassembled. What you need to dump the eMMC: -1. An ATF Turbo Flasher [1](http://survey-smiles.com) +1. An ATF Turbo Flasher 2. Soldering skills and ultra-fine tip soldering iron. 3. A hot air re-work station. The hot air re-work station used for this was an [LF-852D Hot Air Station](https://www.howardelectronics.com/). diff --git a/docs/mac_os_x.md b/docs/mac_os_x.md index 3b5d8f4e6..28155bac4 100644 --- a/docs/mac_os_x.md +++ b/docs/mac_os_x.md @@ -253,11 +253,6 @@ Mac OS. * [The Boot Loader](https://developer.apple.com/library/archive/documentation/Darwin/Conceptual/KernelProgramming/booting/booting.html), by Apple -### Alias - -* [Reversing Mac Alias v3 Data Objects](http://survey-smiles.com), - by Patrick Olsen, August 15, 2016 - ### Apple Examiner * [The Apple Examiner](http://www.appleexaminer.com/) diff --git a/docs/solaris.md b/docs/solaris.md index 410077c46..e8a2e3c88 100644 --- a/docs/solaris.md +++ b/docs/solaris.md @@ -23,4 +23,3 @@ Operating System are: * [Sun Solaris homepage](https://www.oracle.com/it-infrastructure/) * [Sun Blueprints - Using Computer Forensics When Investigating System Attacks](https://www.oracle.com/it-infrastructure/) * [Solaris Internals - The UFS File System - specifications, on disk layout](https://www.savvas.com/) -* [Solaris Internals - Getting to know the Solaris filesystems](http://survey-smiles.com) diff --git a/docs/virtual_hard_disk_(vhd).md b/docs/virtual_hard_disk_(vhd).md index 22f68ca8b..959ca9b5a 100644 --- a/docs/virtual_hard_disk_(vhd).md +++ b/docs/virtual_hard_disk_(vhd).md @@ -60,7 +60,6 @@ differential images of the previous snapshot. ### Snapshots * [Hyper-V Concepts - Snapshots](https://social.technet.microsoft.com/wiki/contents/articles/670.hyper-v-concepts-snapshots.aspx) -* [Hyper-V SnapShot Files – AVHD and VHD? What The ?](http://survey-smiles.com) * [Manually Merge .avhd to .vhd in Hyper-V](https://social.technet.microsoft.com/wiki/contents/articles/6257.manually-merge-avhd-to-vhd-in-hyper-v.aspx) ## Tools diff --git a/docs/vista_thumbcache.md b/docs/vista_thumbcache.md index 7ea90ae07..40a110663 100644 --- a/docs/vista_thumbcache.md +++ b/docs/vista_thumbcache.md @@ -86,7 +86,6 @@ pictures.pd5 can be extracted using [WPG Viewer](http://www.simplecarver.com/too ## External Links -* [Forensic Implications of Windows Vista, Barrie Stewart, 2007](http://survey-smiles.com) * [Windows Explorer Thumbnail Cache database (thumbcache.db) format](https://github.com/libyal/libwtcdb/blob/main/documentation/Windows%20Explorer%20Thumbnail%20Cache%20database%20format.asciidoc), by the [libwtcdb project](libwtcdb.md) diff --git a/docs/windows_encrypted_file_system.md b/docs/windows_encrypted_file_system.md index dd3172751..2a8d17d36 100644 --- a/docs/windows_encrypted_file_system.md +++ b/docs/windows_encrypted_file_system.md @@ -51,7 +51,3 @@ original encryption key (or passphrase) are lost. These include: It is possible to decrypt files using [ntfsdecrypt](https://github.com/nats/ntfsprogs/blob/master/ntfsprogs/ntfsdecrypt.c) tool. In this case, you should get the private key first (by running *cipher /x filename.pfx* on a [Windows](windows.md) system). - -# Other References - -* diff --git a/docs/windows_memory_analysis.md b/docs/windows_memory_analysis.md index ccd444814..9b070df72 100644 --- a/docs/windows_memory_analysis.md +++ b/docs/windows_memory_analysis.md @@ -132,8 +132,6 @@ distributed by Volatile Systems. ### Kernel debugging -* [Advanced Windows Debugging](http://survey-smiles.com), by - Mario Hewardt, Daniel Pravat, November 8, 2007 * [Advanced Windows Debugging: Memory Corruption Part II—Heaps](https://www.informit.com/articles/article.aspx?p=1081496), by Daniel Pravat and Mario Hewardt, November 9, 2007 * [Finding Kernel Global Variables in Windows](https://moyix.blogspot.com/2008/04/finding-kernel-global-variables-in.html), diff --git a/docs/windows_registry.md b/docs/windows_registry.md index 4d94681b6..979dc5909 100644 --- a/docs/windows_registry.md +++ b/docs/windows_registry.md @@ -1181,7 +1181,6 @@ name

* [Windows Incident Response Articles on Registry](https://windowsir.blogspot.com/search/label/Registry) * [Windows Registry Information](https://www.answers.com/redirectSearch?query=win-registry) * [Push the Red Button](https://moyix.blogspot.com/search/label/registry) -* [Security Accounts Manager](http://survey-smiles.com) * [Exporting registry hives from a live system](https://dfir.ru/2020/10/03/exporting-registry-hives-from-a-live-system/), by Maxim Suhanov, October 3, 2020 diff --git a/docs/zeitgeist.md b/docs/zeitgeist.md index 304f8c619..5a26b6256 100644 --- a/docs/zeitgeist.md +++ b/docs/zeitgeist.md @@ -20,6 +20,4 @@ The timestamp is formatter in milli seconds sinds POSIX epoch (Jan 1, ## External Links -- [Zeitgeist Project site](http://survey-smiles.com) -- [Wikipedia: Zeitgeist - (framework)](https://en.wikipedia.org/wiki/Zeitgeist_(framework)) +- [Wikipedia: Zeitgeist (framework)](https://en.wikipedia.org/wiki/Zeitgeist_(framework))