Join Us!

Analysis Of iOS Notes App

As part of my third year studying Digital Security,Forensics & Ethical Hacking at GCU, I took part in a group research project to study the artifacts created when using the notes app on an iPad Mini, and if they could … Read more

Mobile Phone Forensic Challenges

Introduction

A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts.  More often it is not enough to be an experienced expert in computer forensics to understand all the peculiarities and … Read more

Firefox Cache Format and Extraction

Introduction

In the forensic lab where I work, we frequently investigate malware-infected workstations.  As our user population started shifting from Internet Explorer to Firefox, we observed that one of our favorite forensic tools, Kristinn Gudjonsson’s log2timeline, wasn’t able to provide … Read more

Data Recovery Handling Tips & ESD Precaution

First published April 2005

by ActionFront Data Recovery Labs

www.ActionFront.com

Data Recovery Handling Tips & ESD Precaution

Mishandling is a leading cause of hard disk drive failure.

ESD (Electrostatic Discharge)

A familiar form of Electrostatic Discharge, often called “static electricity”, … Read more

Beware Do-it-Yourself Data Recovery Solutions and Products

First published April 2005

by ActionFront Data Recovery Labs

www.ActionFront.com

Do-It-Yourself data recovery software may complicate your problems and diminish the prospects of a successful recovery.

The object of many fix/doctor/repair programs is to try to make the drive, file-system … Read more

Hard Drive Crash? The Essential Data Recovery Report

First published January 2005

by Greg Duffield

Your worst nightmare just became a horrifying reality. You keep hearing that little voice in your head mockingly shout “you should have backed that stuff up” The voice keeps echoing throughout your head … Read more