±Partners and Sponsors
New Today: 4
New Yesterday: 7
· Webmail Forensics – Digging deeper into Browsers and Mobile Applications
· Operation Endeavour: The Tip of the Iceberg?
· Forensic analysis of the ESE database in Internet Explorer 10
· WhatsApp – discovering timestamps of deleted messages
· Man In The Middle Attack: Forensics
· Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
· Windows 8 File History Analysis
· Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
· Bitcoin Forensics Part II: The Secret Web Strikes Back
±Follow Forensic Focus
Search found 1240 matches
- Topic: I have been offered an interview opportunity with Deloitte
- Replies: 7
- Views: 753
The ADB daemon or server on the phone runs when it is enabled (debug/dev mode), and is built int ...
Unless you are "extracting" logical file, in this case a video file, how would you distinguish one block of data from an other without looking at it?
- Topic: chances of decrypt an encrypted volume in external HDD
- Replies: 9
- Views: 961