What is the future of digital forensics? Chime in on the forum.
Forum member joakims has provided an open-source example of how data can be hidden within NTFS system files.
Interpreting shellbags using TZWorks can yield confusing results.
Bypassing Android pattern locks – what is the most efficient method?
Forum members discuss the best tools for acquisition of website content.
Extracting image data from Keepsafe is tricky.
Is it possible for an ISP to retain MAC addresses for devices connected to a home router?
Forum members discuss how to verify message direction in Skype records.