Digital Forensics

884

Solutions

2

Articles & Videos

1K

Contributors

Digital forensics encompasses the recovery and investigation of material found in digital devices, often in relation to computer crime. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence.

Refine results

are there any specialist tools to analyse print spool files, i.e. shd and spl.

And does anyone know what kind of information they will contain, i.e. is it purely metadata such as user, print date/t…

360 views
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

are there any forensics tools that can take a replica copy of how a website looked at a particular point in time, e.g. users facebook profile. How can you actually prove that is how the website looked…

456 views

Do windows 7 and above devices give any clues on what documents a user sent to a printer, and if so where on the file system or registry would this evidence reside?

338 views

the artist name is
http://www.proantic.com/en/display.php?mode=obj&id=188866
mentioned..

the artist mentioned is rolier

is it possible to find the exact artist and history of other works and …

554 views

a user has accessed one of potentially 5 peoples calendars (it was a team meeting with several attendee's), and forwarded a meeting request on to a 3rd party. I can see from the tracking logs that the…

261 views

aside from c:\users\username\appdata\roaming\microsoft\windows\recent and c:\users\username\appdata\roaming\microsoft\office\recent

are there any others folders on a windows 7 machine that would g…

281 views

Hi,


I am victim of UK based company named as "Coinscrypt Ltd" having website : https://coinscrypt.net. I have invested there 3 Bitcoins (i.e. costs INR. 1,78,000 approx.) on dated June 19, 2016. …

7173 views

Hey guys,

I need the capability to remote wipe a laptop and also see where it is. What software can do this?

188 views

From what I understand, anything on WikiPedia is public domain, and therefore available for the taking. True?

Also, does WikiPedia have another site where images can be gotten?

What other sites …

782 views

HI, we all know that Microsoft uses the Index.DAT file as a database for Internet caching (specifically for IE), but I was wondering what are the equivalent to the Index.DAT file in the other major br…

689 views
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Hi, I'd like to know if any of you have a list of the different file paths where Microsoft stores the Index.DAT Internet Explorer cache file?

I know that different versions of the Windows O/S store…

574 views

Hi, we all know that the Microsoft Internet Explorer cache file begins with "Client UrlCache MMF Ver 5.x", so that got me to thinking...how many versions of the cache file are there, and what versions…

685 views

If you use logs from a windows server (i.e. windows logs, IIS logs) for an investigation as evidence, and you image the drive on the server where the logs are located using something like FTP Imager -…

7109 views

Hi, I have a  forensic image of a hard drive that was created using the DD command line program (also know as GNU DD). The DD program, which is commonly used in Linux and Unix, basically creates a raw…

6199 views

What would be a forensically sound acquisition of a users mailbox from an exchange server 2010? we wouldn't have capacity to image the entire mailbox database server - nor should we be doing, if only …

397 views

Hello Experts,

I have a Seagate 750GB SATA HDD that I need to recover data from. The HDD powers up fine and when connected to my computer via SATA to USB Converter Windows will list the Drive lette…

30140 views

We are configuring both the Examiner and SAFE server. The SAFE server does not require alot of resources, but I believe the Examiner does. I am trying to size the Examiner server and leave room for gr…

2109 views

Hi

How i can know if image has hidden file system ?

is there any command in linux can show that?

8481 views

Hi there, my apologies in advance if this is the wrong mailing list for
this type of question. I have a problem with a previously-RAID1'd
FreeBSD filesystem I was hoping someone could help me with. Th…

14548 views
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Good evening experts,

I have a very bad situation at hand. I was in the process of moving thousands of jpg files ( an accumulating of family pics, screen shots, etc..) to another hard drive. I shou…

9135 views

what are some of the best utilities for analyzing a raw dd image for forensic analysis?

so far, i've used autopsy, belkasoft(trial), prodiscover, FTKImager, bulk extractor

all those have been ex…

197 views

i'm doing a project for a forensics class, and i've extracted pagefile.sys from a raw image file

how do i view/ or parse the contents of the pagefile.sys once it's been extracted?

thanks

-dav…

4485 views

Hi, I connected my iPhone 5S to my Windows PC via a USB cable. Pursuant to that connection I was able to see the following folder/file structure:

     - Fulano iPhone                               …

7193 views

i think the title explains it all :)

I need to convert a raw dd image to vmdk for use on windows virtualbox

i am trying liveview right now but having some problems with it ... looks like it has …

4926 views

We had a successful phishing attempt whereby a couple users were tricked into clicking a link in an email and giving their username and passwords.
Really silly i know.

I can see on our Exchange CA…

6174 views
Show more content
201506-LO-Top-001

Vendor Experts

Western DigitalWestern Digital
Contact
Learn more about Western Digital
Top Experts In
Digital Forensics
<
Monthly
>

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (22,945)
  2. OS Security
    (21,449)
  3. Encryption
    (6,860)
  4. Vulnerabilities
    (6,587)
  5. Storage
    (41,176)
  6. Windows XP
    (118,250)
  7. Disaster Recovery
    (7,274)
  8. Anti-Virus Apps
    (22,108)
  9. Windows 7
    (44,624)
  10. Software-Other
    (37,348)