Quantcast
Browsing latest articles
Browse All 42 View Live

Image may be NSFW.
Clik here to view.

Considering A Career in Audio-Video Forensics? Enhance Your Prospects With...

Have you ever discovered a software feature that, had you known of it sooner, could have helped you in a prior case? Have you been using the same software methods and workflow procedures for the least...

View Article


Image may be NSFW.
Clik here to view.

Can You Get That License Plate?

We find ourselves analyzing new surveillance videos almost every day, and in most cases we can either solve the problem very quickly or understand (even quicker) that there is no information to recover...

View Article


Image may be NSFW.
Clik here to view.

Development of Digital Forensic Tools on Mobile Device, a Potential Area to...

Case Study: MobileTriage – JPEG Metadata Triage – Automated Extraction of Information using Mobile Forensic Tools Background Mobile devices are now becoming part of our daily lives. These devices can...

View Article

Image may be NSFW.
Clik here to view.

Extracting data from dump of mobile devices running Android operating system

In this article, we are going to tell about opportunities of utilizing programs that are used on a day-to-day basis in computer forensics and examination for analysis of mobile devices running Android...

View Article

Image may be NSFW.
Clik here to view.

Forensics and Bitcoin

This article does not attempt to provide a beginners guide to Bitcoin, nor an in-depth thesis on Bitcoin forensics. Rather, it will be an overview of the potential opportunities available to digital...

View Article


Image may be NSFW.
Clik here to view.

Using SQL as a date/time conversion tool

A few weeks ago I spent a little time looking at Triggers and to get to know them better I wanted to make use of them and so I knocked up a small application where if an integer is pasted into a cell...

View Article

Image may be NSFW.
Clik here to view.

SQLite Database Forensics – ‘Sleep Cycle’ Case Study

Recently one of our users, Dan Saunders, was kind enough to write up his experience using the Forensic Browser for SQLite on a database that was not supported by any other forensics tools – this is his...

View Article

Image may be NSFW.
Clik here to view.

Countering Anti-Forensic Efforts – Part 1

by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Computer forensic techniques allow investigators to collect evidence from various digital devices. Tools and techniques exist...

View Article


Image may be NSFW.
Clik here to view.

Windows 8 Touch Keyboard Forensics

Microsoft released Windows 8 in 2012. With this new version, Microsoft made a fundamental shift in Windows 8 as compare to older versions of Windows. It does not only target netbooks, laptops and...

View Article


Image may be NSFW.
Clik here to view.

The “I’ve Been Hacked” Defence

By: Yuri Gubanov, Oleg Afonin (C) Belkasoft Research, 2016 Abstract This article was inspired by an active discussion in one of the forensic listservs. Original post was asking on how to fight with an...

View Article

Image may be NSFW.
Clik here to view.

Who Is Spying On Android Users, Why Do They Do It And What Are They Doing...

If you’ve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone...

View Article

Image may be NSFW.
Clik here to view.

Nuix Web Review & Analytics: Process, Search And Review Evidence In A Single...

by Scar de Courcier, Forensic Focus Background Nuix Web Review & Analytics (WR&A) was created to enable analysts and non-technical investigators to collaborate on investigations. The tool...

View Article

Image may be NSFW.
Clik here to view.

The Future Of ENF Systems

by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of...

View Article


Image may be NSFW.
Clik here to view.

Imm2Virtual: A Windows GUI To Virtualize Directly From Disk Image File

by Nanni Bassetti Sometimes during a computer forensic investigation, we need to virtualize our image disk, because it could be useful for checking or finding something of interest. If we need to...

View Article

Image may be NSFW.
Clik here to view.

Database of Software “Fingerprints” Expands to Include Computer Games

by Richard Press, NIST One of the largest software libraries in the world just grew larger. The National Software Reference Library (NSRL), which archives copies of the world’s most widely installed...

View Article

Browsing latest articles
Browse All 42 View Live