Forensic Software: Encase installation help
cert & dongle is correct. The cert file goes to C:\Program Files\[EnCase6xx version]\Certs (if default path used), and the dongle goes into the USB port <img src="images/smiles/icon_mrgreen.gif"...
View ArticleDigital Forensics Job Vacancies: Director Digital Forensics, London Sal:£50-55K
We need a Sr Digital Forensic Analyst with expert witness experience to take up the role of Director managing small teams. You will be dealing with corporate clients and have excellent polished...
View ArticleGeneral Discussion: Cyberbullying – a growing concern in a connected society
jhup wrote: There was no "good old times".Oh yes, there were. Those good ol' times were actually exactly like *any* time before, are exactly like the present and will be like *any* time after, but we...
View ArticleForensic Software: Encase 7 & FileVault2 disks
Greetings, I had a job come in the other day which was a Macbook air with FileVault2 "Disk" (well, volume) encryption enabled. I see in the release notes for EnCase 7.08 that FileVault2 partitions can...
View ArticleMobile Phone Forensics: ViaExtract Experience/Opinions
I am looking for information regarding ViaForensics' ViaExtract mobile forensics solution. We currently have a UFED Pro (generally happy with it) and use Blacklight for iOS devices but are always...
View ArticleEmployment and Career Issues: I am looking to gain valuable Computer...
Well i wish you luck in finding something for the future :), that's the part i'm not looking forward to, trying to find somewhere to work. I am enjoying the course so far, the tutors are good at their...
View ArticleGeneral Discussion: Just getting started sterilizing time
icyalkn1 wrote: The drive is connected directly to my machine via SATA interface. In addition to the comments made by others, two points to bear in mind: [1] The bandwidth of the interface. The...
View ArticleMobile Phone Forensics: iPhone 4S iOS 6 Data Recovery
You could do a file system extraction on the 4s, possibly recovering data which has been flagged for deletion( ie no longer accessible to the user) but not yet deleted in the biblical sense UFED will...
View ArticleMobile Phone Forensics: Facebook Personal Messages sent Twice?
Logging in to the account from a different device wouldn't cause duplicate messages to appear on the phone itself, however it would explain your client's husband's immediate reaction to facebook posts....
View ArticleGeneral Discussion: Something serious (and something not)
Adam10541 wrote: I just assume that all testimonials for software/hardware are fabricated :DHeck! I was thinking to put up a new plumbing service in Leicestershire <img...
View ArticleGeneral Discussion: Something serious (and something not)
harryparsonage wrote: There is rarely an absolute in real life situations regardless of who does the exam and with what tool. Good <img src="images/smiles/icon_smile.gif" alt="Smile" title="Smile"...
View ArticleMobile Phone Forensics: iPhone 4S iOS 6 Data Recovery
mscotgrove wrote: Do iPhones use TRIM/Garbage collection (or equivalent). If so, the deleted files will now be zeros spaces in the memory. The 4S uses Samsung K9PFG08U5M MLC NAND flash memory in a TLGA...
View ArticleEmployment and Career Issues: Penetration Tester
Degree. If he does not have a degree it would be the one in 10 million shot that he dazzles someone with his skill and lands a job.
View ArticleMobile Phone Forensics: Facebook Personal Messages sent Twice?
iXam is a solid iOS tool, I'd be interested to know what that reports.
View ArticleForensic Software: Unstable forensic software.
Samuel1: I'd love to hear more about the Autopsy crash. Can you contact me to get some logs to help debug it?
View ArticleDigital Forensics Job Vacancies: Head of Forensic Technology, Shanghai
Our client, a global consultancy firm based in China, is seeking to recruit a Head of Forensic Technology to lead the computer forensic practice in Shanghai. You will be responsible for leading and...
View ArticleGeneral Discussion: Angle grinders and power drills, as required by the UK gov
http://www.theguardian.com/world/2013/aug/20/nsa-snowden-files-drives-destroyed-london Quote:: Talks began with government officials on a procedure that might satisfy their need to ensure the material...
View ArticleGeneral Discussion: What´s the best way for cleaning flash drives?
thanks for your interesting and completr answer, jaclaz
View ArticleGeneral Discussion: Deleted truecrypt container
Per your $MFT record - the logical size of the record is 336 bytes and ends with FF FF FF FF 82 79 47 11. The allocation flag shows it to be a deleted file. The flag for where the data is stored shows...
View ArticleMobile Phone Forensics: Facebook Personal Messages sent Twice?
I agree that iXAM is a solid iOS tool. We have used it for years now and when we have a phone that it can acquire we use it first. The problem has been that whenever an iOS update is rolled out it...
View Article