Quantcast
Channel: Forensic Focus Forums - Recent Topics
Viewing all 20116 articles
Browse latest View live

General Discussion: external 2 bay raid enclosure recommendations

$
0
0
mgilhespy wrote: @jaclaz, thanks very much for all your feedback! It's really useful.You are welcome, I am sure <img src="images/smiles/icon_smile.gif" alt="Smile" title="Smile" /> Keep us posted with what you will end up with and about how it will (hopefully well) behave in your use. jaclaz

Forensic Software: X-Ways X-Tension C4All users-CETS & pic/vid library option

$
0
0
Update November 14, 2014 download link to version 3.6.2.d https://www.dropbox.com/s/zewn7myskf...6.2.d.zip?dl=0 This update changes the way the video stills are treated when extracting movies. -now video stills are extracted if the parent movie is extracted, regardless of whehter the video still has been type verified..

General Discussion: external 2 bay raid enclosure recommendations

$
0
0
I have been using some Icy dock enclosures. Lots of options and combinations.Icy Dock Chris

Education and Training: Question

$
0
0
Thank you for sharing this information with me. I really appreciate it! I will read them this weekend before I present some information with my Vocational Rehabs Counselor to see if they would help and retain the training service for me to attend. I have to be more carefully based on choosing a right career. I will use SWOT analysis based on those certifications and training services before I choose. Yes, I am big fan of forensic science and PC/MAC technology.

General Discussion: Keystroke Dynamics in DF?

$
0
0
Mr-B wrote: Ive made the question less specific as i assume users who reply will hopefully have an understanding, would be thankful if you could contribute :DSure <img src="images/smiles/icon_smile.gif" alt="Smile" title="Smile" /> , but you need to hopefully providefacts and some specific background as a base for your thesis (or hypothesis) or even only question. Generalizing your question, it amounts to more or less : "Would any info about authentication and/or identification of users of electronic devices be relevant in digital forensics?" and it would have obviously as answer a :"Yes, sure." On the other hand, is there a "real case" where/when this particular info is actually recorded (and later retrievable)? If no, the answer becomes:"Potentially, yes, but only WHEN it will be used THEN it may become relevant.". The background/reasons why you asked the question are important, I mean, is it connected to a research paper, to an under development software, it is just curiosity, etc..... jaclaz

Employment and Career Issues: Looking for a graduate job

$
0
0
Hello, I am a recent graduate, I studied a BSc Ethical Hacking and Network Security degree at Coventry University and finished with a 2.1. Although I studied Ethical Hacking throughout my years at university I undertook modules in forensics including network forensics and mobile forensics. I very much enjoy the subject area. I am looking for employment in the field and am willing to relocate. If you have any roles available please contact me for a copy of my CV. Regards

Mobile Phone Forensics: iOS Wi-Fi issue

$
0
0
luferox wrote: Hey mark_adp, thanks for your help. Yeah I recovered this file and read it, but unfortunately it doesn't log every login in WiFi networks, rather just the following:<key>lastAutoJoined</key><date>2013-12-11T18:56:37Z</date><key>lastJoined</key><date>2013-09-20T05:37:31Z</date> Still good to know, thanks. :) If you need to see historic instances on OS X then '/var/log/system.log' and the older .bzip versions would need to be analysed. Grep using something like grep en0 /var/log/system.log This is on OS X, would need to check to see if this is also available in iOS but I would be surprised if it wasn't. Obviously getting access to the files may also be a challenge.

Mobile Phone Forensics: Automotive key registration system

$
0
0
nsbuck wrote: We have a BMW key programmer and removed the chipset and read the contents using UP828. The results look encrypted and I was hoping that someone out there could confirm this or tell me what needs to be done to turn the data into something readable!! Thanks in advance. what type of chip is it?

General Discussion: Keystroke Dynamics in DF?

$
0
0
MDCR wrote: If you are talking about profiling users from their keystroke patterns/profile, then it could possibly be used to exclude users from suspicion, but not be used as absolute proof for something.In other words <img src="images/smiles/icon_wink.gif" alt="Wink" title="Wink" /> : Quote:: If it doesn't swim like a duck, and doesn't quack like a duck, then it probably is NOT a duck.http://en.wikipedia.org/wiki/Duck_test<img src="images/smiles/icon_biggrin.gif" alt="Very Happy" title="Very Happy" /> jaclaz

Forensic Software: what is the go to software?

$
0
0
Years ago i started with Encase and FTK. Now it is X-Ways. It is different feeling at first, but now Im not sure how i used the other ones. And it is much faster to accomplish my work. It includes WinHex, so you have the hex editor. Cell phones, i would say to start with a Cellebrite Touch. (or whatever the latest is) Then when you need more tools, add them based on the features that are needed that your 'go to' tools do not have (or do not do well)

Mobile Phone Forensics: Nokia Lumia 630

$
0
0
If you can not find the taps on this phone. I've done chip off on a couple Lumia phones and they are not too hard if you have the equipment. Cellebrite does a good job parsing out the .bin file from these phones using the Windows 8 chain.

Classifieds: Wanted: FTK or EnCase license

$
0
0
new small business in computer forensics needs a forensics platform...very interested in n-1 license of FTK or EnCase for a reasonable price.....

Mobile Phone Forensics: Elcomsoft Phone Password Breaker

$
0
0
Hello, I am using Elcomsoft Phone Password Breaker to decrypt a BlackBerry 10 backup that was created using BB Link. When decrypting the backup I receive an error ' Cannot connect to Server' Does this mean the password is incorrect or is there another issue? Thank you in advance

Digital Forensics Job Vacancies: EnCase - Technical Services, Guidance Software (UK)

$
0
0
Guidance Software is currently hiring Technical Support staff. Knowledge of EnCase software desired but not essential as full training will be given. Require: Experience of all Windows OS and overview of other OS such as MAC, Linux Experience of network troubleshooting Ability to speak clearly and confidently with worldwide customers Contact sharren.redmond@guidancesoftware.com for further information.

Employment and Career Issues: Interview - Technical Questions

$
0
0
Hi, If you don't mind me asking could you please describe what the test ended up consisting of. I graduate next year and would like to get a general idea of what i might come across in an interview/test.

Classifieds: Cellebrite UFED Touch Ultimate for immediate sale

$
0
0
Hi all, I have reduced the price on this unit to $2500. Please feel free to contact me. Renrick

Classifieds: FTK, MPE, Cellebrite and Write Blocker for sale

$
0
0
Hi...I am interested in the FTK license...please contact me off list at tomdevinenh@gmail.com. Thanks! Tom

Forensic Software: X-Ways X-Tension C4All users-CETS & pic/vid library option

$
0
0
Yeah I figured there was some kind of truncation going on.. weird! Anyway, thanks for the quick fix.

General Discussion: Recovering Mac user files like documents after reinstall

$
0
0
Are you sure that the Time Machine Time Capsule drive is fully functional/data is fully accessible? AFAIK it is perfectly possible to get an "as before" system using either Migration Assistant or Recovery mode: http://www.macworld.com/article/1165784/how_to_restore_data_from_time_machine.html if a Time Machine backup is available. jaclaz

General Discussion: Hiding data in bad blocks?

$
0
0
TheCableGuy... I came across another website last night that might be of interest to you... http://www.davidverhasselt.com/2009/04/22/hide-data-in-bad-blocks/
Viewing all 20116 articles
Browse latest View live