Advertisement
 
Digital Forensic Software
Subscribe to Digital Forensic Software

The Lead

P2 Commander v4.1

May 28, 2015 10:44 am | Paraben Corporation | Product Releases

P2C v4.1 adds OCR support in indexing, file viewing, and searching. It also adds an RTF report, EXIF info to reports, and more. P2C is a comprehensive digital forensic examination tool with special focus on email, chat logs, internet history, registry data, and more. Not only is P2C affordable, you receive free video training with every license.

Acquiring Windows PCs

May 19, 2015 9:07 am | by Oleg Afonin, Danil Nikolaev and Yuri Gubanov, Belkasoft | Articles | Comments

The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out,...

Magnet ACQUIRE

May 15, 2015 9:17 am | Product Releases

Magnet Forensics has announced the beta availability of a new software product called Magnet...

Harvard Uses Forensics to Save Obsolete Digital Records

May 8, 2015 12:12 pm | by Kate Kondayen, Harvard university | News | Comments

Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio...

Wherever I get vmdk files, I take a deep breath and wonder what issues might pop up with them. I recently received some vmkd files and when I viewed one of these in FTK Imager (and some other mainstream forensic tools), it showed up as the dreaded "unreco

Dealing With Compressed vmdk Files

May 5, 2015 12:27 pm | by Mari DeGrazia | Blogs | Comments

Wherever I get vmdk files, I take a deep breath and wonder what issues might pop up with them. I recently received some vmkd files and when I viewed one of these in FTK Imager (and some other mainstream forensic tools), it showed up as the dreaded "unrecognized file system."

In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and

Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets

May 5, 2015 8:10 am | by Oleg Afonin, Danil Nikolaev and Yuri Gubanov | Belkasoft | Articles | Comments

In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.

Magnet IEF

May 4, 2015 8:30 am | Magnet Forensics | Product Releases

Magnet Forensics has released Magnet IEF v6.6. This release adds a number of new and advanced analysis features to IEF that will aid examiners in locating and validating recovered data. These features include Hex Viewer, Text Viewer, Profile development capabilities, Partial Artifact filter, Histogram View, and Examiner/Investigator Modes.

Advertisement
Before purchasing any tool, users should thoroughly research those available and select the tool which provides the best functionality to meet their requirements. The listing of a particular tool or vendor is not to be construed as an endorsement of that

Data Sanitization: Part 2

April 28, 2015 4:40 pm | by John J. Barbara | Articles | Comments

Before purchasing any tool, users should thoroughly research those available and select the tool which provides the best functionality to meet their requirements.

Nuix 6.2

April 24, 2015 8:09 am | Nuix | Product Releases

Nuix 6.2 is a major release of the Nuix Engine, our eDiscovery and Investigator products, and our Director and Web Review & Analytics web applications. It includes a vast range of new features and capabilities that will benefit all Nuix customers and partners.

Internet Examiner Toolkit v5

April 21, 2015 8:39 am | SiQuest Corporation | Product Releases

SiQuest has released Internet Examiner Toolkit (IXTK) Version 5. With this next generation of software, IXTK features FaceDNA, a sophisticated biometric facial recognition add-on (included at no additional cost) to their Internet Examiner Tookit.

UFED Field Series

April 10, 2015 8:09 am | by Cellebrite | Cellebrite | Product Releases

The UFED Field solution components unify workflows between the field and lab, reducing backlogs by enabling networked collaboration and analysis across the entire investigative team. This new suite of software and hardware solutions enables personnel at every level to efficiently gather, process and act on the critical data that will help speed investigations.

UFED Pro Series

April 9, 2015 8:22 am | by Cellebrite | Cellebrite | Product Releases

The UFED Pro Series is designed for forensic examiners and investigators who require the most comprehensive, up-to-date mobile data extraction and decoding support available to handle the rapid influx of new devices and data sources. Flexible and scalable to meet all operational needs and lab environments, it features industry trusted tools and analysis capabilities.

Advertisement
A new tool funded by DARPA promises to detect flaws in software before release to the general public.

DeepCode Tool Detects Software Flaws Before Release

March 19, 2015 8:08 am | by Charlie Osborne | Blogs | Comments

A new tool funded by DARPA promises to detect flaws in software before release to the general public.

SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browser

Forensic Analysis of SQLite Databases: Free Lists, Write Ahead Log, Unallocated Space and Carving

March 17, 2015 8:57 am | by David Makeev, Nikita Timofeev, Oleg Afonin and Yuri Gubanov | Belkasoft | Articles | Comments

SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype, WhatsApp, iMessage and many other messengers.

In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpe

Software Spots Online Child Sex Abuse

March 12, 2015 9:27 am | by Tilburg University | News | Comments

In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.

After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, i

The Possible Put Into Digital Forensic Practice With Grier Technology

February 18, 2015 12:44 pm | by Ernie Austin, Associate Editor | Articles | Comments

After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, it was another agency that saw its possibility.

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be sea

Streamlining the Digital Forensic Workflow: Part 3

February 17, 2015 1:12 pm | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.

Advertisement
In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathn Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard

Grier Forensics Sifts Through the Data

February 11, 2015 12:31 pm | by Ernie Austin, Associate Editor | Articles | Comments

In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathan Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard drives by pinpointing usable data — the data important to a case. In this part, we find out from Jonathan Grier how this technology works.

It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benifit everyone. Forensic tools are no exce

Government Contract to Grier Forensics Speeds-Up Digital Investigation

February 9, 2015 11:54 am | by Ernie Austin, Associate Editor | Articles | Comments

It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benefit everyone. Forensic tools are no exception. To this end, Forensic Magazine spoke with Martin Novak, Program Manager at NIJ, and Jonathan Grier, principle of Grier Forensics, about Grier's recent contract award.

Nuix will include powerful email threading capabilities at no additional cost in the upcoming 6.2 release of its eDiscovery software. This makes Nuix a viable long-term alternative for Equivio users who are concerned that Microsoft may discontinue the pro

Nuix Safe Bet against Equivio's Uncertain Future

February 3, 2015 11:02 am | Nuix | News | Comments

Nuix will include powerful email threading capabilities at no additional cost in the upcoming 6.2 release of its eDiscovery software. This makes Nuix a viable long-term alternative for Equivio users who are concerned that Microsoft may discontinue the product after finalizing its acquisition of the company.

Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry's most popular mobile apps could put officers' lives in danger from woul

Sheriffs Want Popular Police-tracking App Disabled

January 27, 2015 8:08 am | by Eileen Sullivan, Associated Press | News | Comments

Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry's most popular mobile apps could put officers' lives in danger from would-be police killers who can find where their targets are parked.

Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic

Best Forensic Products of 2014

December 15, 2014 8:44 am | by Rebecca Waters | Articles | Comments

Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic subscribers selected the products that they found to be most effective and trusted in their work. Congratulations to our winners!

It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser his

Streamlining the Digital Forensic Workflow: Part 1

October 15, 2014 8:51 am | by John J. Barbara | Articles | Comments

It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser history, an SMS, or some other source. This leads to the obvious conclusion that examiners are going to need a new approach to streamline their workflow.

Streamlining the Digital Forensic Workflow: Part 2

September 30, 2014 5:18 pm | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

Often an examiner will analyze all the digital media only to determine that the probative data was limited to a browser’s history file, an e-mail, a document, the mobile devices’ logs, or an inappropriate graphic video or picture. Finding the critical probative data faster in a cost effective manner while reducing or eliminating case backlogs is going to require a more efficient methodology.

Civil Air Patrol officials say cell phone forensics have helped authorities narrow the search area for a missing small airplane which hasn't been seen since leaving the Headland airport in Henry County, Alabama.

Cell Phone Forensics Helps Narrow Search for Missing Plane

September 19, 2014 1:12 pm | by Matt Elofson, Dothan Eagle | News | Comments

Civil Air Patrol officials say cell phone forensics have helped authorities narrow the search area for a missing small airplane which hasn't been seen since leaving the Headland airport in Henry County, Alabama.           

Solid State Drives: Part 7

August 27, 2014 8:12 am | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

SSDs have been in use since the 1950s. When compared to a conventional HDD, they are totally different in architecture and functionality. These differences offer many advantages such as no moving parts, having low random access times, and being shock and vibration resistant. However, their architecture and functionality creates some difficult issues to deal with pertaining to their forensic analysis. 

Talk Forensics - Investigations in the Cloud

July 14, 2014 8:55 am | Videos | Comments

The software and data for cloud applications are stored on servers owned by a third party and not local to the user. As such, they are not under the end user's control—a key requirement in traditional network forensics, where the examiner has either physical control over the network, or can take control by installing a piece of code on the computer to be examined.

Solid State Drives: Part 6

June 25, 2014 8:29 am | by John J. Barbara | Digital Forensics Consulting, LLC | Articles | Comments

When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis. The SSD’s use of flash memory for data storage rather than rotating magnetic discs is the cause of the forensic issues.

In order to effectively investigate crimes involving social media, it is imperative that law enforcement understand “how” social media is stored, “where” such information is stored and found, and “how” to obtain such information using forensically sound p

Book Excerpt: Social Media Investigation for Law Enforcement

June 18, 2014 8:33 am | by By Joshua Brunty and Katherine Helenek | Elsevier | Articles | Comments

In order to effectively investigate crimes involving social media, it is imperative that law enforcement understand “how” social media is stored, “where” such information is stored and found, and “how” to obtain such information using forensically sound procedures. Social media requires a different mind-set to traditional investigative and current forensic methodologies. 

Advertisement
X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading