Welcome to this month’s round-up of recent posts to the Forensic Focus forums.
How would you find credit card numbers using EnCase?
Forum members help to locate network history and VPN profiles.
How would you image and examine a Chromebook? Share your thoughts on the forum.
Can you help loonaluna to recover data from a deleted TrueCrypt container?
What kind of malware do you think has been used on this machine?
How would you extract data from .img files from a Sony VAIO backup?
Is it possible to virtualise Mac on Windows, and if so, how would you do it? Add your thoughts on the forum.
Do you follow ESD procedures when examining mobile devices?
Why do we need a verification hash as well as an acquisition hash?
Forum members discuss current issues around discovery.
In which instances can we not track location data from Android devices?
Forum members help killikli to decrypt and export a WhatsApp database.