This blog is no longer active and is maintained for archival purposes. It served as a resource and platform for sharing insights into forensic multimedia and digital forensics. Whilst the content remains accessible for historical reference, please note that methods, tools, and perspectives may have evolved since publication. For my current thoughts, writings, and projects, visit AutSide.Substack.com. Thank you for visiting and exploring this archive.
I don't want to burst your bubble, but I think there is something fishy about that site. I received an email from someone there who wanted to guest blog for me or in the least for me to link to them. When I googled her email all I could come up with were health and beauty tips. Not saying that she might not know anything about computer forensics, but she doesn't really appear to write about anything technical.
Therefore it might just be a scam to get people to link to their site.
I'm not saying your blog doesn't deserve to be in the top 50, I like it and follow it, but I would be somewhat cautious about this particular site...
I don't want to burst your bubble, but I think there is something fishy about that site. I received an email from someone there who wanted to guest blog for me or in the least for me to link to them. When I googled her email all I could come up with were health and beauty tips. Not saying that she might not know anything about computer forensics, but she doesn't really appear to write about anything technical.
ReplyDeleteTherefore it might just be a scam to get people to link to their site.
I'm not saying your blog doesn't deserve to be in the top 50, I like it and follow it, but I would be somewhat cautious about this particular site...
Thanks for the heads-up. I appreciate you looking after me. :-)
ReplyDeleteCheers and thanks for reading.
Jim