Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Intrusion Detection System Logs as Evidence and Legal Aspects

First published January 2007 Fahmid Imtiaz School of Computer and Information Science Edith Cowan University E-mail: fimtiaz@student.ecu.edu.au Abstract Modern techniques and methodologies for detecting attacks and malicious activities on computers and networks has evolved a lot over the last couple

Forensic Image Analysis of Familiar-based iPAQ

Cheong Kai Wee School of Computer and Information Science, Edith Cowan University ckw214@yahoo.com Lih Wern Wong School of Computer and Information Science, Edith Cowan University lihwern@yahoo.com AbstractOne of the PDA forensic issues is the difficulty in maintaining image integrity as

Computer Monitoring: Software vs. Hardware Keyloggers

First published November 2006 Stephen Allen, Allen Concepts Inc., Chandler, AZ July 2006 www.keykatcher.com ABSTRACT John has been at his computer for hours, but his productivity has fallen lately. Is he emailing buddies, busy in chat rooms, or reading internet

The need for effective event management

First published November 2006 courtesy of GFI Software – www.gfi.com Introduction Underrated, undervalued and underutilized; events management is most often rated as a tedious and ungrateful task. System administrators shy away from event logs and the events contained within, citing

How Digital Detectives Deciphered Stuxnet

In June 2009, someone had silently unleashed a sophisticated and destructive digital worm that had been slithering its way through computers in Iran with just one aim — to sabotage the country’s uranium enrichment program and prevent President Mahmoud Ahmadinejad

Reflections on a first computer forensic investigation

First published October 2006 by Brian Marofsky What follows is a synopsis of the experience I had of conducting my first computer forensic investigation. It was my no means a text book investigation. I made my share of mistakes but

Examining Wireless Access Points and Associated Devices

First published October 2006 Sgt. Christopher Then, CISSP, EnCE September 17, 2006 Computer Crimes Unit Morris County Prosecutor’s Office Morristown, NJ 07963 cthen@co.morris.nj.us Wireless access for the home has become the preferred choice of connecting computers to the Internet. As

Unique File Identification in the National Software Reference Library

First published September 2006 Steve Mead National Institute of Standards & Technology 100 Bureau Drive, Stop 8970 Gaithersburg, MD 20899 smead@nist.gov Abstract: The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for

Dissecting NTFS Hidden Streams

First published July 2006 by Chetan Gupta NII Consulting, Mumbai www.niiconsulting.com   Cyber Forensics is all about finding data where it is not supposed to exist. It is about keeping the mind open, thinking like the evil attacker and following

VMWare as a forensic tool

First published May 2006 Brett Shavers May 2006 VMWare Workstation is one of the most up and coming software applications in both the corporate environment and in the computer forensic community. This paper will not detail the inner workings of

The Farmer’s Boot CD

First published May 2006 Preview Data in Under Twenty Minutes by Thomas Rude THE FARMER’S BOOT CD Preview Data in Under Twenty Minutes On January 1, 2006, THE FARMER’S BOOT CD, or FBCD for short, was officially released to the

Forensic Analysis of the Windows Registry

First published April 2006 Lih Wern Wong School of Computer and Information Science, Edith Cowan University lihwern@yahoo.com Abstract Windows registry contains lots of information that are of potential evidential value or helpful in aiding forensic examiners on other aspects of

Evidentiary Value of Link Files

First published March 2006 by Nathan Weilbacher I have been reading the posts in Forensic Focus for about a year now and on many occasions I have followed with great interest the threads of discussion on many topics. There are

Are non technical juries keeping criminals at large?

First published February 2006 by Carrie Moss, Marketing Assistant, CY4OR www.CY4OR.co.uk In England and Wales the only qualifications required of a jury member to be eligible to appear in a court of law are that they are registered on the