Digital Forensics Job Vacancies: Sr e-Discovery PM, London £55-70K plus good...
This is an excellent role with a global but expanding company. You will be an experienced e-Discovery PM with experience from end to end of the electronic reference discovery model. You will be working...
View ArticleEducation and Training: Best training for Mobile Phone Forensics?
jhup wrote: I am starting to see requests for degree in Forensics specifically, not just Computer Science. Some will say Forensics or Security, but Forensics is preferred.Sure, when you have a huge...
View ArticleGeneral Discussion: Outlook PST File Footer / Carving
Good luck, but carving a PST file is very unlikely to work. My reasons are that PSTs tend to be large. PSTs tend to grow. Both of these reasons mean that there is a very high chance that the PST will...
View ArticleServices Required: Digital Forensics in Geneva?
I'm looking for recommendations on digital forensics firms in (or nearby) Geneva, Switzerland. Thanks!
View ArticleMobile Phone Forensics: Password-Bypass for Iphone 4S and Iphone 5
Hello, everyone. I am currently doing research regarding the state of IOS forensics. Specifically, I am curious as to whether there is a good possibility of a password-bypassing tool for Iphone 4S and...
View ArticleMobile Phone Forensics: Nokia N8-00 copying emails (files *.CFS)
bigjon wrote: Have you tried going into your ufed extraction folder / Files / databases, this usually gives a list of all its extracted, however you may see files named 000000001.db 000000002.db These...
View ArticleMobile Phone Forensics: Android Physical Extraction questions
Just wondering if anyone could shed some light on any of the below questions? Slan / Ed
View ArticleGeneral Discussion: wiping free space in encrypted containers
electronic_x wrote: But still some doubts: Read again the previous answer AND the referenced previous-previous answer for #2. electronic_x wrote: 1-If the external drive is named F and the encryoted...
View ArticleGeneral Discussion: wipng free space(shadow copy, system restore)
I am not speaking of , simply, 'traces' left behing, but a fulll copy of , let´s say, a WAV file, on the computer.
View ArticleGeneral Discussion: What´s the best way for cleaning flash drives?
electronic_x wrote: How is it made? You apply 12/24/36 V (your choice) with no current limiter below (say) 2 A on the pins of the memory and controller chips. They make nice popping noises when...
View ArticleMobile Phone Forensics: Blackberry Z10 Analysis
jaclaz wrote: Yes, but the .bbb format is mentioned in the docs: http://www.elcomsoft.com/help/eppb/index.html?decrypt_iphone_blackberry_backup.html .bbb was used for Mac backups also, but those .bbb...
View ArticleGeneral Discussion: [Need] Software to convert spreadsheets to single TIFF
IPro and Law can both do this.
View ArticleForensic Software: Difference between Ctrl key and shift key in Encase
Thank you all. Just I want to know is there any difference between Ctrl key and shift key while selectively set include folders at different locations in Encase table view? Thanks
View ArticleEducation and Training: cfce certification
Hi guys I am looking to take the cfce training next year. What reading material do you recommend in addition to the training material provided in the class?
View ArticleGeneral Discussion: CHI - Useful module?
athulin wrote: In a later posting you say:> I don't understand why courses don't revolve around modules consisting of EnCase, FTK, Linux tools,>Linux Distro's e.g Deft or Kali etc Instead there's...
View ArticleMobile Phone Forensics: Cellebrite and SGH T139
I wanted to make a quick post to let everyone know that Ron Sarver from cellebrite did contact me and went above and beyond to help me with the problem. Not sure where else you could go to get better...
View ArticleMobile Phone Forensics: MPs warn of chaotic forensic landscape
Just for fun, some old(check the date - besides the year <img src="images/smiles/icon_wink.gif" alt="Wink" title="Wink" /> ) news: http://attrition.org/attrition/hoax_defacement-05-04-01.html jaclaz
View ArticleForensic Hardware: anyone knew more about TD2 e01 Compression Methodology?
one hundred million thanks for your explanation. now i am crystal clear.
View ArticleEmployment and Career Issues: I am looking to gain valuable Computer...
Hi Davies259, I am also studying this course at the University of Glamorgan, I am just heading into my second year. How did you find your second year? I would be interested to know the sort of things...
View Article