Tips and Tricks
Most Recent
 
Read More
2017-01-02

X-Ways Forensics: Creating Data Schedules of Your Reviewed Evidence

Experts are faced with a huge amount of information that must be processed in a matter of moments. For this specialist to group all kinds of documents the parameters for the part it takes a very long time. To simplify the work of the experts by the German company X-Ways Forensics program was developed.

74
 
Read More
2016-12-20

How to catch a cyber-thief

Here are a lot of cybercrimes. If you want to catch a cyber-thief, you should know, how to did the cybercrime happen, when did it happen, etc.

 

79
 
Read More
2016-12-14

Forensic Analysis of Windows Event Logs (Windows Files Activities Audit)

Earlier in the article discusses the problems associated with the collection and analysis of input events to Windows. It is not a secret that the information on file activity is essential for many applications. As a starting point for the investigation into the events activity Windows files can be started with the Ofer Shezaf ‘s article. He is an currently a product manager at Varonis.

556
 
Read More
2016-10-21

Detecting Ransomware Attacks with Splunk

You probably either heard about Ransomware programs that encrypt user files and then ask to transfer money.

Michael Gough, a local “Malware Archeologist” published a blog post about using Splunk.

213
Latest Headlines
 
Read More
95
 
Read More
70
 
Read More
47

Trending Topics
digital forensics
computer forensics
mobile forensics
Articles
DFIR
digital forensics software
Android forensics
windows forensics
iOS forensics
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
Chip-off Technique in Mobile Forensics
 
3
How to Make the Forensic Image of the Hard Drive
 
4
Extracting WhatsApp database and the cipher key from a non-rooted Android device
 
5
Extracting data from a damaged iPhone via chip-off technique