Digital Forensics

877

Solutions

2

Articles & Videos

1K

Contributors

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Refine results

a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that the…

219 views
Learn The Basics of Ethical Hacking & Pen Testing

Computer and network security is one of the fastest growing and most essential industries in technology, meaning companies will pay big bucks for ethical hackers. This is the perfect course to leap into this lucrative career, learning how to use ethical hacking to reveal ...

aside from c:\users\username\appdata\roaming\microsoft\windows\recent and c:\users\username\appdata\roaming\microsoft\office\recent

are there any others folders on a windows 7 machine that would g…

235 views

Hi,


I am victim of UK based company named as "Coinscrypt Ltd" having website : https://coinscrypt.net. I have invested there 3 Bitcoins (i.e. costs INR. 1,78,000 approx.) on dated June 19, 2016. …

7110 views

Hey guys,

I need the capability to remote wipe a laptop and also see where it is. What software can do this?

159 views

From what I understand, anything on WikiPedia is public domain, and therefore available for the taking. True?

Also, does WikiPedia have another site where images can be gotten?

What other sites …

755 views

HI, we all know that Microsoft uses the Index.DAT file as a database for Internet caching (specifically for IE), but I was wondering what are the equivalent to the Index.DAT file in the other major br…

650 views

Hi, I'd like to know if any of you have a list of the different file paths where Microsoft stores the Index.DAT Internet Explorer cache file?

I know that different versions of the Windows O/S store…

547 views

Hi, we all know that the Microsoft Internet Explorer cache file begins with "Client UrlCache MMF Ver 5.x", so that got me to thinking...how many versions of the cache file are there, and what versions…

647 views

If you use logs from a windows server (i.e. windows logs, IIS logs) for an investigation as evidence, and you image the drive on the server where the logs are located using something like FTP Imager -…

771 views

Hi, I have a  forensic image of a hard drive that was created using the DD command line program (also know as GNU DD). The DD program, which is commonly used in Linux and Unix, basically creates a raw…

6110 views
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

What would be a forensically sound acquisition of a users mailbox from an exchange server 2010? we wouldn't have capacity to image the entire mailbox database server - nor should we be doing, if only …

367 views

Hello Experts,

I have a Seagate 750GB SATA HDD that I need to recover data from. The HDD powers up fine and when connected to my computer via SATA to USB Converter Windows will list the Drive lette…

30116 views

We are configuring both the Examiner and SAFE server. The SAFE server does not require alot of resources, but I believe the Examiner does. I am trying to size the Examiner server and leave room for gr…

285 views

Hi

How i can know if image has hidden file system ?

is there any command in linux can show that?

8449 views

Hi there, my apologies in advance if this is the wrong mailing list for
this type of question. I have a problem with a previously-RAID1'd
FreeBSD filesystem I was hoping someone could help me with. Th…

14525 views

Good evening experts,

I have a very bad situation at hand. I was in the process of moving thousands of jpg files ( an accumulating of family pics, screen shots, etc..) to another hard drive. I shou…

9105 views

what are some of the best utilities for analyzing a raw dd image for forensic analysis?

so far, i've used autopsy, belkasoft(trial), prodiscover, FTKImager, bulk extractor

all those have been ex…

171 views

i'm doing a project for a forensics class, and i've extracted pagefile.sys from a raw image file

how do i view/ or parse the contents of the pagefile.sys once it's been extracted?

thanks

-dav…

4210 views

Hi, I connected my iPhone 5S to my Windows PC via a USB cable. Pursuant to that connection I was able to see the following folder/file structure:

     - Fulano iPhone                               …

7123 views
Course: MongoDB Object-Document Mapper for NodeJS

NodeJS (JavaScript on the server) is awesome, but some developers get confused about NoSQL when it comes to working in Node with MongoDB (NoSQL database). Do you need a better explanation of how to use Node.js with MongoDB? The most popular choice is the Mongoose library.

i think the title explains it all :)

I need to convert a raw dd image to vmdk for use on windows virtualbox

i am trying liveview right now but having some problems with it ... looks like it has …

4651 views

We had a successful phishing attempt whereby a couple users were tricked into clicking a link in an email and giving their username and passwords.
Really silly i know.

I can see on our Exchange CA…

6126 views

i need a grep and strings for windows.

can someone recommend

I've done a google search and found copies that dont work, etc..

693 views

I would like to know what the technical definition of "content" is as it pertains to MS Office documents. We all know that the word "content," in the vernacular means -- something that is contained wi…

23133 views

do any of you who have responsibilities for doing forensics analysis of IT equiptment for more internal disciplinary cases rather than criminal/prosecution policies..have any sort of documented policy…

490 views

Hi, I'd like to know if anyone has an "official" set of definitions for the document properties within an MS Word (or any MS Office) document? -- I am not looking for the properties themselves. I have…

769 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (22,627)
  2. OS Security
    (21,406)
  3. Encryption
    (6,811)
  4. Vulnerabilities
    (6,559)
  5. Storage
    (40,948)
  6. Windows XP
    (118,202)
  7. Disaster Recovery
    (7,239)
  8. Anti-Virus Apps
    (22,034)
  9. Windows 7
    (44,126)
  10. Software-Other
    (37,269)