The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
From a forensic perspective, the Recycle Bin can be a “gold mine” for gathering probative evidence which can be extremely valuable for investigative purposes. There are many forensic tools available that are designed to recover deleted files from the Recycle Bin. Depending upon the length of time a file has been deleted, forensic tools can recover the entire file or parts of the file (if it was partially overwritten).
This paper examines a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic.
Generally when you install Windows, you either use the set up directly or use a DVD (burn the ISO) to boot and then install. But one of the simpler means of installing Windows on multiple PC is using a bootable USB drive. Since USB drive is available in all desktops and laptops unlike DVD drives,…
In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.
Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having to conduct digital forensics? What now?
Are you locked out of your own Windows PC because you cant remember the Administrator password, fear not Imgur user PeregrineX has posted a step-by-step tutorial showing how to log in to an administrative account on any Windows computer.
Skype recently introduced cloud based operation and started moving away from peer-to-peer messaging with a view, to paraphrase Skype, of improving the service that we receive.
Without going into the pros and cons of this, from a forensic point of view it is irrelevant anyway, the move has had the effect of introducing a new set of artefacts and in particular a new location for stored/cached image files (pictures).
More information here: https://support.skype.com/en/faq/FA12381/what-is-the-cloud This article deals with the SQLite tables that reference to these pictures, the locations of the pictures themselves and how to join the relevant tables, decode the data held in certain blob fields and create a report showing who sent what to whom including the pictorial evidence where possible.
At the end of the article I will have shown how the different tables fit together and will provide a Browser extension that will create the necessary tables and import the
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.