±Forensic Focus Partners

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 5
Overall: 27321
Visitors: 137

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: Announcements

[ Go to Home | Select a New Topic ]

Forensic Focus Forum Round-Up

Tuesday, September 16, 2014 (13:42:54)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Where to start with audio forensics training? Add your thoughts in the forum.

Forum members discuss how to extract data from an ICC card.

Does non-compliance with ACPO guidelines mean that evidence will be rejected?

How can a pattern lock be removed from an Android device when USB debugging is not enabled?

Forum members give their recommendations for social media collections tools.

Is it possible to pull data from anonymous chat apps such as Telegram and Line?

Which mouse would you recommend for digital forensics work? Chime in on the forum.

Forum members discuss how to recover emoji from Whatsapp messages on a Galaxy Note 3.

Forensic Focus Forum Round-Up

Tuesday, August 19, 2014 (08:48:45)
Welcome to this round-up of recent posts to the Forensic Focus forums.

A forum member unearths a very old hard drive; how can it be analysed?

Is it possible to retrieve IP information by logging into a Hotmail account?

Forum members discuss the reasons for using commercial vs. open source software.

An MSc student is interested in forensics professionals’ opinions about the key issues investigators face in cloud forensics.

Forum members give their recommendations for rebuilding RAID arrays.

How can an active file and a deleted file have completely identical timestamps?

Forum members discuss how to get a physical image of a Galaxy S3 handset using XRY.

Which are the best part-time training courses for forensics practitioners in the UK? Add your recommendations in the forum.

Interview with Emlyn Butterfield, Course Leader, Leeds Metropolitan University

Thursday, August 14, 2014 (14:23:02)
Emlyn, you’re currently Course Leader in Computer Forensics, Security & Ethical Hacking at Leeds Metropolitan University. Could you tell us more about the role and how you entered academia?

As course leader it is my responsibility to maintain a healthy set of courses. By healthy I mean happy students, staff, good student intakes each year and courses that are fit for purpose. I, along with my team, try to ensure that the courses are designed and refreshed in line with industry: to allow us to do this we utilise industry experts as advisors, providing ideas and critical feedback on the teaching material, assessments and methods – through this we try to ensure that students receive a varied and relevant learning experience.

Read More

Arnim Eijkhoudt, Lecturer in Digital Forensics, University of Applied Sciences

Tuesday, August 05, 2014 (18:37:17)
Arnim, please tell us about your role as a lecturer in digital forensics, and how you first became interested in the field.

I've been fascinated with 'tinkering' with computers from a young age: figuring out why things (don't) work, reverse-engineering, reconstructing what happened and so on. Therefore, it was natural for me to turn to the fields of Forensics and Security after I studied Informatics and became a lecturer. Before 2007 I was already incorporating Computer Security-related topics into my lectures and classes where possible. From 2007 to 2013, the Amsterdam University of Applied Sciences and the University of Amsterdam have offered a joint Minor in Forensic Intelligence & Security (MINFIS)...

Read more

The Complete Workflow of Forensic Image and Video Analysis

Tuesday, July 29, 2014 (11:00:10)
In this article we’ll describe the complete workflow for image and video forensics. In fact, just like computer forensics in not only dumb copying and looking at files, forensic video analysis is broad and complex and there are many steps that are commonly missed and rarely taken into account. It can be quite overwhelming if we think of all the tasks related to analysis.

As a forensic video analyst, it is important to be aware of all the possible steps needed for a really complete analysis. This way, you can stay organized and minimize the possibility of skipping or missing steps. Also, if you do have to go to court, you have an outline that serves as the basis of your presentation.

It is important to remember that the job of a forensic video analyst does not start and end with viewing and enhancing a video...

Read More