Posts Tagged ‘digital image forensics’

Most Recent
 
Read More
2018-10-01

Internet threats and children

Nowadays, children spend much of their time on the internet visiting social networks and communicating with each other using instant messengers. Therefore, some of the relationships that children face in real life are transferred into the virtual world. In this article, we will look at some of the threats to psyche and health that children may encounter online.

 

371
 
Read More
2018-03-24

Forensic Acquisition Mac Computers

Kevin J. Ripa presents instructions for extracting Live Acquisition from a working Mac computer. Kevin tested it on Mountain Lion, Mavericks, Yosemite and El Captain. Testing was not on every OS Apple, but it should work on any Mac based on Intel.

732
 
Read More
2018-03-15

CorelDRAW Forensics: step by step

CorelDRAW is the best graphics editor, which is developed by a Canadian company Corel Corporation. This graphics editor has great functionality. Criminals can use it for illegal activities, such as fraud, money counterfeiting, etc. Today, we will describe how to detect CoralDRAW artefacts when examining a computer. We will use AXIOM by Magnet Forensics as a tool for analysis, which is one of the best tools for computer forensics.

512
 
Read More
2018-02-08

FTK Imager Command Line Physical Disk Hashing

DFIR.Science has shared new video ‘FTK Imager Command Line Physical Disk Hashing’. It tells us how to use FTK Imager command line for creating the hash of the hard disk.

452
Latest Headlines
 
Read More
664
 
Read More
371
 
Read More
741

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics