Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user’s password and gain access to the contents of the device.
Bridging the Gap: Standardizing Representation of Inferences in Diverse Digital Forensic Contexts
Cellebrite's Monica Harris on Achieving Balance in Corporate Investigations and E-Discovery
What Can You Tell Us About Your Password? A Contextual Approach
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.