Employment and Career Issues: Forensics - EnCE Qualification
Post here -> http://www.forensicfocus.com/jobs
View ArticleGeneral Discussion: Question on USB drive
You check the cheat sheet for any locations you may of missed http://digital-forensics.sans.org/media/poster_fall_2013_forensics_final.pdf
View ArticleGeneral Discussion: SyncToy v2.1
Hi all, Does anyone have a solution to parse SyncToy (Microsofts free syncing tool) .DAT files? A sync process was carried out by the owner of a laptop and shortly afterwards some of the source data...
View ArticleGeneral Discussion: Public IP extraction
Hello, I examine PC's HDD with Windows 7 Ultimate and VNC 4.x server running as a service. PC was running in local network with NAT. Is any chance to know PC's public IP address (I mean router external...
View ArticleEmployment and Career Issues: In need of a CF professional in Indiana
All these years wrongly thinking that Gandhinagar,Gujarat,India was NOT in Indiana .... That's Southern Europe, right? jaclaz
View ArticleGeneral Discussion: need to analyze virtualbox image .vdi
soleil wrote: Hello everybody, i need to analyze a .vdi image. i tried to import it in virtualbox but boot told me about this error " error loading operating system"... Do you know if a special tool...
View ArticleMobile Phone Forensics: Deleted SMS from a SIM card
nsbuck wrote: We have been seeing the phrase "cannot decode SMS" alot with deleted text messages on a SIM. 'Cannot decode SMS' I believe is the phrase that XRY displays on any SIM/Handset data in...
View ArticleDigital Forensics Job Vacancies: e-Discovery Associate £38-48K +£2.5K bonus +...
e-Discovery Associate £38-48K +£2.5K bonus + outstanding benefits, London This is not for a fresh graduate (we do have graduate roles) but this role requires 2-5 years’ experience. We have a permanent...
View ArticleForensic Software: Lotus Notes mail recovery tool
Thank you! In fact I'm using a P2 Commander, which includes NEE functionality. However I have some trouble with viewing the NSF file contents and I've just opened a ticket with your support.
View ArticleMobile Phone Forensics: Deleted SMS from a SIM card
As a cause factor there can be handset dependent mechanisms, as well, whereby the handset deletes the entire content (overwrites) with FFFFF. This approach can be used to slow-delete the entire file...
View ArticleForensic Software: Lotus Notes mail recovery tool
OK, I've been told by Paraben support that Lotus Notes 8.5.2 is not yet supported by P2C. That's unfortunately common as many tools I've came across work only with 6 and 7 versions of LN...
View ArticleGeneral Discussion: virus Cryptolocker
Depends on which version of the virus you have. Pre April can be easily fixed and removed. Post April it can be still removed however more difficult to recover the locked files.
View ArticleGeneral Discussion: .PST/.OST analysis
To recover Server's OST file and Outlook's PST file, you may try inbuilt repair utilities provided by Microsoft: Scanost.exe and Scanpst.exe These programs scan and repair corrupt mailbox folder. One...
View ArticleGeneral Discussion: Router that anonymises internet activity
@novunix Yep <img src="images/smiles/icon_smile.gif" alt="Smile" title="Smile" /> , the "developer!" (please note the double quotes and the exclamation point <img...
View ArticleGeneral Discussion: Travel with encrypted drives/computers
I ran this past our Export Controls & Trade Compliance people, one of them came back saying that it's notoriously hard to this this kind of information out of the Chinese authorities. However he...
View ArticleForensic Hardware: External hard drive eSATA vs USB
I am attempting to image a 4 TB external hard drive with a Tableau T35es forensic bridge. I removed the hard drive from the external case and attempted to acquire via eSATA with the T35es. It would...
View ArticleForensic Hardware: External hard drive eSATA vs USB
Dndschultz wrote: I removed the hard drive from the external case and attempted to acquire via eSATA with the T35es. It would only recognize the physical drive with Unused Disk Area. However, when I...
View ArticleGeneral Discussion: Router that anonymises internet activity
... AND ... ... the funding was just suspended by the kickstarter guys: http://www.reddit.com/r/technology/comments/2je9ms/anonabox_scam_why_i_dont_trust_them/...
View ArticleGeneral Discussion: .PST/.OST analysis
I believe it is several things that are discussed here. 1) OST2PST conversion. Yes - it is possible offlien without the access to the Exchange server. Several tools can do it. A. Transend Migrator - a...
View ArticleMobile Phone Forensics: Android Keypad Records?
Hi, Im doing an Android investigation at the moment and looking to see if there is any keystroke/keypad activities of previous typed text as the user has typed, is there any memory kept of this within...
View Article