Explore Digital Forensics on Experts Exchange

Expert Solutions for Your Tech Problems

Digital Forensics

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital for...

Read more
  • 954 Content
  • 1.0K Contributors

Research Solution

Help with Assymetric encryption

byLak Ja
5
Hi Guys, I have 2 questions, hopefully you can help me please?
I am doing research about asymmetric …
Article

TOP 10 FREEWARE FORENSIC ANALYSIS UTILITIES

The foremost challenge encountered by an investigator at the very beginning of a forensics …
Courses
Post

Breaking News: The Latest New Petya isn't Ransomware. It's …

1
Breaking News: The Latest New Petya isn't Ransomware. It's actually a destructive wiper malware.
Troubleshooting Solution

skype for business call log

byPau Lo
3
Does skype for business keep any form of log somewhere on a W10 device of calls made/received, and …
Troubleshooting Solution

decrypt the attached file

39
HI experts...

I've been struggling to open the attached file... can any here decode it?

it's…
Post

And now the "Original Author of Petya Ransomware" wants to …

And now the "Original Author of Petya Ransomware" wants to help !!
Troubleshooting Solution

webcache.dat analyser

byPau Lo
5
Are there any good tools you can recommend for analysis the webcache.dat history file associated …
Troubleshooting Solution

How to wipe a drive that crashed in DBAN?

byJsmply
29
We have a few misc drives (internal and external) that seem to crash out in DBAN.  Most of them are …
Troubleshooting Solution

IE (windows 7) login artefacts.

byPau Lo
1
As a general rule, if a user logs into a web page, which has a login form (username/password), would …
Research Solution

ext4 file system forensic analysis

5
Could you please provide latest research papers (2018-20) and peered source of ext4 file system …
Article

Incident Handling and Response Plan

An Incident response plan is an organized approach to addressing and managing an incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
Post

And now UK Parliament becomes a victim of cyber terrorism !!…

And now UK Parliament becomes a victim of cyber terrorism !!
http://bit.ly/2taexPI
Troubleshooting Solution

Data Recovery

30
Hello Experts,

I have a Seagate 750GB SATA HDD that I need to recover data from. The HDD powers …
Troubleshooting Solution

excel file access audit trail

byPau Lo
5
I'm pretty sure I know the answer but to be 100% sure does an xlsx file itself (quite where I am not…
Troubleshooting Solution

Finding out how I am being digitally tracked

byAdam D
27
All systems show clean by Malwarebytes, Vipre, online testers, etc.
Mail server (Windows Server …
Troubleshooting Solution

evidence of file copy

byPau Lo
14
If somebody copied a file from a windows file server to elsewhere, e.g. desktop, USB drive, would …
Troubleshooting Solution

Audio recording: how check the software which maked it

3
Dear Expert,
I should check the software, which has created originally a voice recording file.

Research Solution

forensic investigation in Hadoop HDFS

1
 How a forensic investigation could be carried out and what data can be collected from Hadoop HDFS
Troubleshooting Solution

What does "Content" mean -- as it pertains to MS Office documents?

23
I would like to know what the technical definition of "content" is as it pertains to MS Office …

Do more with Experts Exchange.


Get Answers

Take a Class

Collaborate

Monitor your Site

Explore solutions and more