±Forensic Focus Partners
|New Today: 11||Overall: 29232|
|New Yesterday: 7||Visitors: 59|
· SADFE 2015 – Malaga 30th September – 2nd October
· Countering Anti-Forensic Efforts – Part 2
· Windows 8 Touch Keyboard Forensics
· Countering Anti-Forensic Efforts – Part 1
· Linux Timestamps, Oh boy!
· Standard Processes in Windows 10
· NAS Forensics Explained
· Project Spartan Forensics
· FT Cyber Security Summit Europe – London 22nd September
2015Back to top Back to main Skip to menu
I would be tempted to argue that you can tell a lot about a piece of software by how easy it is to install.
There are times when finding, downloading and installing a product update feels like repeatedly banging your head on a brick wall: constant freezing, confused Windows popups, license key errors...
Then there are times when you click 'Download', then 'Install', then tick 'Yes' in the little box, and boom! The software appears.
I am pleased to be able to report that the installation process of ReclaiMe Pro falls into the second category. It can be found on the Download page of the website, and it sets itself up in just a few minutes.
After that, of course, it's time to get down to business. more ...
On the 11th-13th of August 2015, AccessData ran a live online training course to teach FTK users how to get the most out of the software solution. The course was aimed at people who had already used FTK and completed some basic training beforehand, and aimed to expand investigators’ knowledge of the tool.
The training itself was managed by Syntricate which, although technically a part of AccessData, was created to offer training and education for digital forensics professionals. Syntricate aims to be as platform-agnostic as possible during training courses and provides a range of training options with many of the well-known digital forensics companies. more ...
Learning iOS Forensics is a practical textbook that aims to help digital forensics examiners of all levels to get to grips with the procedures involved in forensically analysing iOS devices.
The book opens with a preface, which describes how the various sections are set out and delineates the recommended audience. It explains that the book can either be read sequentially or used as a reference work in ongoing investigations. My own experience of reading the book would back this up – I read it from cover to cover and found it to be an excellent resource for iOS forensics, both as someone who has not yet come across an iOS device in an investigation, and as someone who is interested in digital forensics as a discipline. more ...
One of the things that I love about being in IT is that it is an ever changing field. I find myself coming across new things daily. This even occasionally applies to my own “infrastructure”, such as it is. Once upon a time, in a land far, far away (well, Scotland) I started my IT career as a Linux SysAdmin – bouncing around corporate IT departments and getting into security. I strayed for a long time from this true path. I covered my guilt by generally trying to use a Mac, because at least it had a BSD based operating system, but I have once again seen the light, and have returned to my “root”s (hopefully at least one or two UNIX people got that joke). Actually, the truth of the matter is that my MacBook Pro – the one that the first part of this review was written on – has become horribly unreliable and has had to be replaced. It is being put out to pasture at home, being a 17” model, as a NetFlicks streamer. However, this has left a big gap for me – one that I wasn't sure how to fill... more ...
Sadly, at the time I put the finishing touches to the first part of this review at the start of 2015, Paris has been rocked by terrorist attacks resulting in the deaths of 17 not including the three perpetrators themselves. Subsequent investigations have revealed that at least 500 calls had been exchanged between the two groups of individuals involved – someone, somewhere in France, is most likely examining their mobile phones for even more intelligence right now.
That mobile devices are going to be used in any criminal activity is almost a given now – although post Snowden, at least the more intelligent crook might give some pause to consider the NSA or GCHQ before making their call. No surprise really when there are more phones in the UK than there are people – according to OFCOM(1) that’s 83.1 million subscriptions for a population estimated at 64.5 million(2). 93% of adults have at least 1 mobile phone and 61% of those are so called “Smart Phones” (although if mine is anything to go by, “smart” is a bit of an exaggeration) – a Samsung S5 has a quad-core 2.5Ghz processor, 2GB of RAM and a 1920x1080 pixel display – you would be lucky to get somewhere close to this on the desktop 10 years ago. In 2005 an Apple PowerMac G5 would set you back £2,199 (inc VAT) – inflation adjusted that’s nearly £3k and it doesn’t include a display! more ...