Digital Forensics

888

Solutions

2

Articles & Videos

1K

Contributors

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Refine results

We need to prove if a user has accessed a corporate business system from a specific machine. the audit trails in the system itself frustratingly do not log user access/record access, I am unsure at …

530 views
Courses: Start Training Online With Pros, Today
Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Hi ,

I have a client whose pc i am suspecting might be compromised. About a month ago her Amazon account was hacked and i found the fake username in the cache of Internet Explorer on her pc. The pc…

17217 views

are there any tools on windows, which for any user activity show which files/registry info on the system is being updated as a result of the user activity. I am sure there used to be something whereby…

280 views

are there any specialist tools to analyse print spool files, i.e. shd and spl.

And does anyone know what kind of information they will contain, i.e. is it purely metadata such as user, print …

3109 views

are there any forensics tools that can take a replica copy of how a website looked at a particular point in time, e.g. users facebook profile. How can you actually prove that is how the website looked…

4109 views

Do windows 7 and above devices give any clues on what documents a user sent to a printer, and if so where on the file system or registry would this evidence reside?

394 views

the artist name is
http://www.proantic.com/en/display.php?mode=obj&id=188866
mentioned..

the artist mentioned is rolier

is it possible to find the exact artist and history of other works and …

5108 views

a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that …

2100 views

aside from c:\users\username\appdata\roaming\microsoft\windows\recent and c:\users\username\appdata\roaming\microsoft\office\recent

are there any others folders on a windows 7 machine that would …

2135 views

Hi,


I am victim of UK based company named as "Coinscrypt Ltd" having website : https://coinscrypt.net. I have invested there 3 Bitcoins (i.e. costs INR. 1,78,000 approx.) on dated June 19, 2016. …

7251 views
Live: Real-Time Solutions, Start Here
Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Hey guys,

I need the capability to remote wipe a laptop and also see where it is. What software can do this?

1131 views

From what I understand, anything on WikiPedia is public domain, and therefore available for the taking. True?

Also, does WikiPedia have another site where images can be gotten?

What other sites …

7117 views

HI, we all know that Microsoft uses the Index.DAT file as a database for Internet caching (specifically for IE), but I was wondering what are the equivalent to the Index.DAT file in the other major …

6125 views

Hi, I'd like to know if any of you have a list of the different file paths where Microsoft stores the Index.DAT Internet Explorer cache file?

I know that different versions of the Windows O/S …

5111 views

Hi, we all know that the Microsoft Internet Explorer cache file begins with "Client UrlCache MMF Ver 5.x", so that got me to thinking...how many versions of the cache file are there, and what versions…

6125 views

If you use logs from a windows server (i.e. windows logs, IIS logs) for an investigation as evidence, and you image the drive on the server where the logs are located using something like FTP Imager -…

7160 views

Hi, I have a  forensic image of a hard drive that was created using the DD command line program (also know as GNU DD). The DD program, which is commonly used in Linux and Unix, basically creates a raw…

6299 views

What would be a forensically sound acquisition of a users mailbox from an exchange server 2010? we wouldn't have capacity to image the entire mailbox database server - nor should we be doing, if only …

3141 views

Hello Experts,

I have a Seagate 750GB SATA HDD that I need to recover data from. The HDD powers up fine and when connected to my computer via SATA to USB Converter Windows will list the Drive …

30174 views
Gigs: Get Your Project Delivered by an Expert
Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

We are configuring both the Examiner and SAFE server. The SAFE server does not require alot of resources, but I believe the Examiner does. I am trying to size the Examiner server and leave room for …

2147 views

Hi

How i can know if image has hidden file system ?

is there any command in linux can show that?

8528 views

Hi there, my apologies in advance if this is the wrong mailing list for
this type of question. I have a problem with a previously-RAID1'd
FreeBSD filesystem I was hoping someone could help me with. …

14594 views

Good evening experts,

I have a very bad situation at hand. I was in the process of moving thousands of jpg files ( an accumulating of family pics, screen shots, etc..) to another hard drive. I …

9174 views

what are some of the best utilities for analyzing a raw dd image for forensic analysis?

so far, i've used autopsy, belkasoft(trial), prodiscover, FTKImager, bulk extractor

all those have been …

1134 views

i'm doing a project for a forensics class, and i've extracted pagefile.sys from a raw image file

how do i view/ or parse the contents of the pagefile.sys once it's been extracted?

thanks

4773 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital
Top Experts In In
Digital Forensics
<
Monthly
>

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (23,345)
  2. OS Security
    (21,511)
  3. Encryption
    (6,926)
  4. Vulnerabilities
    (6,609)
  5. Storage
    (41,428)
  6. Windows XP
    (118,275)
  7. Disaster Recovery
    (7,306)
  8. Anti-Virus Apps
    (22,171)
  9. Windows 7
    (45,046)
  10. Software-Other
    (37,458)