Digital Forensics Job Vacancies: [CCL Group] Graduate Level - Mobile Device...
Graduate Trainee Opportunities Digital Forensics The Company www.cclgroupltd.com The company is CCL Group Ltd - one of the UK’s leading providers of digital forensic analysis and related services. Our...
View ArticleForensic Software: OST to PDF
Quote:: You could apply this concern to a bunch of other software. IEF for example pulls in a whole bunch of open source stuff (about 10 packages), check out the licenses.txt file in its program files...
View ArticleEducation and Training: Newbie Student Questions About Algorithms
jaclaz wrote: hc4n6 wrote: In order to make a pizza, you need to follow some steps. Lot of steps needed, flour, water, yeast, mixing them in the right proportion, an oven, timing issues, a mess....
View ArticleGeneral Discussion: Microsoft Messenger User Cache.plist
The allow and block lists were pre-Messenger 2011 lists. MSN had Allow Lists and Block Lists which were different than your contact list. The Allow List enabled you to maintain a separate list of...
View ArticleMobile Phone Forensics: Steam app for iOS and Android
Does the file mention NSKeyedArchiver? If so there's a good reason that it's not making a lot of sense when you view it. If so this post might be of interest:...
View ArticleDigital Forensics Job Vacancies: Computer Scientist - Chambersburg, PA, US
Job Title:Computer Scientist Department:Department of Defense Agency:Defense Information Systems Agency Job Announcement...
View ArticleEducation and Training: Newbie Student Questions About Algorithms
cterterian wrote: Thank you everyone for your information. I do understand the basic premise and certain algorithms - at this point we're learning about binary search algorithm and sequential search...
View ArticleMobile Phone Forensics: Steam app for iOS and Android
OK, that's almost certainly NSKeyedArchiver. You'll need to "unpack" it before it makes any sense. If you're happy using Python, we've open sourced a module which you can use to do the unpacking and...
View ArticleMobile Phone Forensics: FTK Mobile Phone Examiner
Adam10541 wrote: I should clarify (and it's possible this has changed in the last few months) but the physical download functionality is only viewable via FTK, the logical download can be stand alone....
View ArticleForensic Software: POLL Time to upgrade to EnCase 7 or not *** STILL ****
I can't still find a reason why they killed the V6 search feature. In V7 the search is a pain in the a$$ (not to mention the fact that there was no refresh button to see live results last time I used V7)
View ArticleDigital Forensics Job Vacancies: Technical Cyber Security Investigator -...
Role summary: A leading and successful company in the banking industry is looking to recruit a Senior Intelligence Manager. A large defence technology firm is looking to hire a Technical Cyber Security...
View ArticleGeneral Discussion: $MFT Resident data
randomaccess wrote: can you post up the files when they are at the maximum data attribute length for each process? (I dont know why that sentence was so difficult to phrase)OK, started again from...
View ArticleGeneral Discussion: how to find evidence of a trojan in an .exe file?
If the malware author was any good, you probably won't find it, unless you are an expert, even after being told which file is the malware. Assuming they were a rubbish author you could look for...
View ArticleGeneral Discussion: PDF Forensics - Help Required in Understadning Result
Dear Forensics Experts, I am learning forensics and as a part of this process I am analysing PDF file using pdfid on Backtrack. The PDF file looks perfect except the /AA value. I would like to...
View ArticleForensic Software: POLL Time to upgrade to EnCase 7 or not *** STILL ****
Why do people keep using broken stuff? 18 hours just to crash? Sounds like they contracted out to ftk coders Rather than upgrade to 7, try xways. Half th3 cost, twice the features, a million times...
View ArticleGeneral Discussion: Investigations as an Investigator
This applies mostly to LEO's: As a Computer Forensics Examiner/Analysis, do you also do other law enforcement investigations, out side of computer forensics, such as an on call crimes investigation?
View ArticleEducation and Training: Job Interview Question
Xennith wrote: For the record the fact that every line ends with a 0 should be very familiar to anyone who has programmed with C and its relatives, thats how strings work. Well, for the record, you...
View ArticleGeneral Discussion: PDF Forensics - Help Required in Understadning Result
blog.didierstevens.com Best place to learn about pdf security.
View ArticleEducation and Training: Introducing CyFor - a free portal for cyber forensic ed.
Hello all, I'd like to introduce CyFor. It's a free educational portal that's geared towards high school students, but anyone can use it. We're looking for ideas, help with content, "virtual" mentors,...
View ArticleMobile Phone Forensics: FTK Mobile Phone Examiner
MPE+ is a completely standalone product and the physical extracted files can be viewed from within the product. I have not needed to use FTK to complete a job, but it is handy to have as a resource!...
View Article