Mobile Phone Forensics: [WTA] Imaging Samsung Galaxy Note 2 [N7100] and...
Hi All, Thanks for the advice. I managed to do a File System Extraction for the Note 2 using Samsung CDMA version of the Note 2 instead of the GSM version. Rampage > Please correct me if I'm wrong...
View ArticleMobile Phone Forensics: iPhone 4 + iOS 6
Yes Colin. You are right. When iOS gets updated, it generates new set of encryption keys. So there is no way to recover previous data.
View ArticleMobile Phone Forensics: iPhone Backup is Password Protected
randomaccess wrote: law enforcement can us zdairski's tools.. I just Googled Jonathan Zdziarski. Pity I'll never get to use his iOS tools, but see that he's got a rather interesting blog: "The Case for...
View ArticleMobile Phone Forensics: iPhone Backup is Password Protected
tfink26 wrote: I am currently working with an iPhone 4s from a homicide investigation. The phone is not password protected but Cellebrite Physical and Oxygen Standard are unable to process it. Each...
View ArticleGeneral Discussion: Merry Christmas
Yep, a Merry Christmas and a Happy New Year to all!
View ArticleEmployment and Career Issues: Age Discrimination Forensic Field?
keydet89 wrote: Some [c]ontractors for the federal government, for example, are often looking to put butts in seats...and if they can fill a seat for less than they're getting paid, they make...
View ArticleEmployment and Career Issues: Gaining CF Experience in D.C.
Have you tried to contact Bethesda PD, Montgomery County PD, or similar offices? I think if you wrote a letter to a chief, with sufficient references they would let you do internship work.
View ArticleDigital Forensics Job Vacancies: Computer Forensic Examiner- Houston
We are seeking a highly motivated individual for the greater Houston area for a great opportunity as a full time 1099 consultant, working as a Computer forensic examiner for an immediate opening with a...
View ArticleDigital Forensics Job Vacancies: Sub-contractors Forensic...
Precision Discovery is seeking well-qualified, highly motivated individuals for the position of Computer Forensics Investigator in the capacity of sub-contractor in the greater Chicago, IL area to...
View ArticleEducation and Training: RFC – Digital Forensics within IaaS Environments
I would be interested in knowing your thoughts and opinions on the topic of “Digital Forensics within Infrastructure-as-a-Service (IaaS) Environments. For my sins I have chosen this as the subject for...
View ArticleEducation and Training: RFC – Digital Forensics within IaaS Environments
I appreciate that many of us see these types of requests either on public forums, Twitter or in the form of direct requests via email with questionnaires etc and then see very little, if anything from...
View ArticleMobile Phone Forensics: iPhone 4 + iOS 6
Has your friend resynchronized with photo stream? If they had it on previously there may be some backed up photos there? May they have at some point charged their phone in another persons laptop or...
View ArticleGeneral Discussion: Volume Shadow Copies
jaclaz wrote: DecipherTrent wrote: Hello, So I have found some great tools on here in regards to VSC, but it seems what I am trying to do is a bit different. DecipherTrent wrote: Sure I would be happy...
View ArticleMobile Phone Forensics: Mobile forensics TIPS [Knowledge Sharing]
Have you looked at Forensics Wiki? Maybe you can contribute/update their pages...
View ArticleEmployment and Career Issues: Gaining CF Experience in D.C.
Thanks for an excellent idea jhup I will do it.
View ArticleGeneral Discussion: Endpoint Encryption modify date time?
Hi, Just want to confirm my doubt on Endpoint Encryption. I have a disk that is not encrypted. If I install McAfee Endpoint Encryption to encrypt the drive, it will not modify the last accessed...
View ArticleForensic Software: Wipe Ram
Do it have a software to wipe o fill the unused ram in windows?
View Article