General Discussion: Server Image Filter Problem
Would hashing all your files, then using a filter by hash allow you as kbertens suggested to separate duplicate values? This would then allow you to see which files are unique i.e. "new files" and any...
View ArticleMobile Phone Forensics: Samsung S Plus PAttern Lock
I am operating on a Samsung S Plus I9001 that has a pattern lock and (usb debugging off) by default, is there anyway i can get past that?
View ArticleGeneral Discussion: HP Digital Senders
Hi, When documents are scanned using HP Digital Senders, is there a uniqui signature appended to the documents scanned from a particular digital sender? In short, is it possible to identify the digital...
View ArticleServices Required: Data Recovery Lab
You can contact Deepspar Data Recovery System (www.deepspar.com) to get a quote for the PC-3000 UDMA (with Data Extractor) system and the Deepspar Disk Imager system (with addons). Those system are...
View ArticleGeneral Discussion: Windows recent and link files
I'm sure that there might be calls to APIs that would result in this, but most often, it's the user interaction. I'm not sure what it is you're looking for, but it might be useful to use additional...
View ArticleGeneral Discussion: Where to save the image of disk and of ram in live forensics
finally understood Thanks
View ArticleMobile Phone Forensics: oxygen failed to extract certain parts of filesystem...
it was a nokia device it was a N95-01. Oxygen version was 2012 standard edition. the agent installed successfully on the device and started properly, but even if it was able to read messages ( i don't...
View ArticleMobile Phone Forensics: HELP!!!!Water Damaged iPhone
jhup wrote: I like that. PCB, cardboard and tin (aluminum) foil cutouts? Yep, I take a piece of cardboard from a box, cut a hole in it slightly larger than the chip, cover the whole card board with...
View ArticleGeneral Discussion: Data Recovery Lab
I'd not ask him. Do some research on a clean room probably class 100. The software used is 99% proprietary, so needing to get someone who can write a good program for you. Understanding the platter...
View ArticleServices Required: SEEKING SUB-CONTRACTOR FOR COMPUTER & DIGITAL FORENSICS
Did this ever go anywhere? Stevew wrote: We are a Private Investigations Firm based in Long Island, NY seeking a sub-contractor for current/future services. We are seeking a Computer/Digital Forensics...
View ArticleGeneral Discussion: Comodo timemachine forensics
I have forensic images of two HDD where there has been used comodo timemachine and all the disk usage after certain date is not commited to the disk. So the usage of the disk is not visible to forensic...
View ArticleGeneral Discussion: Data Recovery Lab
AFAIK Class 100 Clean Rooms are what is advertised and laminar flow benches are what are actually in use. Of course there are "big" firms that do have actual clean rooms, but they usually can be...
View ArticleMobile Phone Forensics: Samsung S Plus PAttern Lock
It will either have to be JTAG'ed or booted with a forensic bootloader using the UFED Cellebrite. Not sure whether the i9001 is supported, I've done a few i9000's with the UFED now. Be careful if you...
View ArticleGeneral Discussion: Windows recent and link files
I think that Chris and RandomAccess have raised some pretty important points... Your question regarding the creation of LNK files in the user profile's Recent folder is still a bit too vague...you have...
View ArticleMobile Phone Forensics: Asus R700 challenge
Hey guys (and gals), I have a small challenge and I would love for some input. I want to duplicate a GPS device (more a PDA actually), ASUS R700. The SDCard was the easy part, but here is my question,...
View ArticleForensic Hardware: TD3 and EXT file systems
Thanks! Normally we are trying to save time (copy to NAS, copy from NAS), but it sounds like I need to revise that process. I am not too concerned about the 3rd party utilities where it provides...
View ArticleMobile Phone Forensics: Asus R700 challenge
jhup, thanks for your reply. I couldn't locate the device in the list of the supported devices, so I don't think that it's gonna work. Cheers
View ArticleMobile Phone Forensics: oxygen failed to extract certain parts of filesystem...
For Series 60/Symbian/Belle devices we also read the deleted messages information from the phone's log. The conditions are the same (logs stores the data for 30 days, it is wiped on a SIM card change...
View ArticleMobile Phone Forensics: Open Source Mobile Forensics
I think that one of the issues that you're going to have here is that you're asking for an open source, free solution for something that really requires corporate backing to put together. iPhone -...
View ArticleMobile Phone Forensics: Samsung S Plus PAttern Lock
I don't think you've quite hit the nail on the head yet. You use the JTAG interface to read the memory of the device, at all costs you want to avoid writing anything to it if you can. If you had read...
View Article