±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 6
Overall: 26965
Visitors: 59

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

Why Are Prefetch Files Important to Your Digital Forensics Investigations?

Monday, August 25, 2014 (07:54:00)
Prefetch files are great artifacts for forensic investigators trying to analyze applications that have been run on a system. Windows creates a prefetch file when an application is run from a particular location for the very first time. This is used to help speed up the loading of applications. For investigators, these files contain some valuable data on a user’s application history on a computer.

Learn why prefetch files are important to your digital forensics investigation...

Read More (Magnet Forensics)

Computer Crime or Legitimate Research?

Friday, August 22, 2014 (11:20:06)
One researcher digs into Windows, discovers a flaw (and a fix), and receives $100,000 from Microsoft. Another, threatened with prosecution for alleged hacking, becomes despondent and takes his own life. At the Black Hat 2014 conference, an all-star panel discussed the tough decisions researchers have to make, and the legal landmines that can pop up.

The panel started by reviewing five significant legal landmines that could land researchers in a heap of trouble. They admitted this portion of the presentation might seem a bit dry, but encouraged attendees to hold on for full, open discussion...

Read More (PC Mag)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (997 reads)

Oxygen Forensic® Passware® Analyst Acquires Protected Mobile Devices Data

Wednesday, August 20, 2014 (11:37:19)
Oxygen Forensics announces the release of Oxygen Forensic® Passware® Analyst, a new mobile forensic tool integrating Oxygen’s award-winning acquisition and analytic tools with Passware’s password recovery and data extraction.

The new tool integrates mobile acquisition, data extraction, password recovery and evidence analysis into a single smooth workflow. The newly added password recovery module engages automatically if a password-protected or encrypted data backup or image is encountered, offering smooth automatic recovery and extraction of protected data with no manual operations required.

Forensic Focus Forum Round-Up

Tuesday, August 19, 2014 (08:48:45)
Welcome to this round-up of recent posts to the Forensic Focus forums.

A forum member unearths a very old hard drive; how can it be analysed?

Is it possible to retrieve IP information by logging into a Hotmail account?

Forum members discuss the reasons for using commercial vs. open source software.

An MSc student is interested in forensics professionals’ opinions about the key issues investigators face in cloud forensics.

Forum members give their recommendations for rebuilding RAID arrays.

How can an active file and a deleted file have completely identical timestamps?

Forum members discuss how to get a physical image of a Galaxy S3 handset using XRY.

Which are the best part-time training courses for forensics practitioners in the UK? Add your recommendations in the forum.

Why are LNK Files Important to Your Digital Forensics Investigation?

Monday, August 18, 2014 (13:32:55)
LNK files are excellent artifacts for forensic investigators who are trying to find files that may no longer exist on the system they’re examining. The files might have been wiped or deleted, stored on a USB or network share, so although the file might no longer be there, the LNK files associated with the original file will still exist (and reveal valuable information as to what was executed on the system).

LNK files typically contain the following items of evidentiary value...

Read More (Magnet Forensics)