Justin Tolman: Welcome to this week’s episode of FTK Feature Focus. This week we have another special episode with a special guest: Dan Sumpter, who’s the principal instructor at Exterro over North America. Dan, how are you doing?
Dan… Read more
Justin Tolman: Welcome to this week’s episode of FTK Feature Focus. This week we have another special episode with a special guest: Dan Sumpter, who’s the principal instructor at Exterro over North America. Dan, how are you doing?
Dan… Read more
Hello, everyone. Jordan here with the Oxygen Forensic training team. Today, I’m gonna show you how to search images for text values using optical character recognition. Let’s get started.
In today’s video, I’ll be discussing what OCR is and providing … Read more
Hey there, detectives. Welcome to Oxygen Forensics How-To series, where your Oxygen Forensic training team will provide you with detailed insight into focused areas within Oxygen Forensic Detective.
For this video, we are going to dive into using the Hex … Read more
When it comes to the forensic investigation of Apple devices, a Keychain analysis is of particular importance. Not only does Keychain contain passwords from websites and applications, but it can also provide computer forensics with access to the same user’s … Read more
After intensive development, Amped Software is pleased to start 2022 with the release of a powerful new filter for Amped FIVE: Speed Estimation 2d.
Below you can find a step-by-step guide on how to estimate the speed of … Read more
In this latest ‘How To’ article, Amped Software will show you how to use Variable Motion Deblurring, one of this year’s new filters within Amped FIVE.
One of the biggest challenges in Forensic Video Analysis (FVA), is the … Read more
Hi, I’m Kevin Kyono. I’m a technical sales engineer with MSAB, and this is XRY and XAMN in 5. In addition to extracting data from devices, XRY has the ability to import your returns from search warrants and other legal … Read more
Your company has a Microsoft Azure environment, and your forensics lab uses Magnet AXIOM Cyber. The next step is to combine the two by running AXIOM Cyber in Azure! … Read more
Hi, this is Amanda Mangan with Oxygen Forensics. In this video, we’re going to go over Oxygen Forensics’ Call Data Expert.
The first thing we’ll discuss is, what exactly is a CDR? A CDR is a call data record, and … Read more
Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review.
Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches … Read more
by Blake Sawyer, Amped Software
For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most … Read more
Learn how to conduct a Windows live scan with ADF Solutions Digital Evidence Investigator. Two USB ports are required to complete a scan, one for the Collection Key and one for the Authentication Key, once the scan has started … Read more
Beginning with version 19, Griffeye Analyze DI Pro and Core will start using the new Griffeye Intelligence Database, or GID, to replace the legacy intelligence manager.
In this video, we’re going to discuss the changes that the GID brings to … Read more
Did you know that Passware Kit can create a snapshot of a password recovery process at any time and resume it on a different computer?
Running a password recovery attack, especially for multiple files or drives, might be a long … Read more