The old saying is if your data isn’t backed up at least twice, it’s not backed up at all. For those not wise enough to heed this adage, there are a number of options available to you if you wish your ...
Computer sleuths interested in running forensic PC operations on a Linux machines should take a look at an open source tool called Foremost. Computer sleuths interested in running forensic PC ...
Learn from my mistakes as I figure out how to gather forensics data on an ext4 filesystem. One great thing about writing technical articles is that you have a nice collection of documentation you can ...
MOUNTAIN VIEW, Calif., Dec. 4, 2014 /PRNewswire-USNewswire/ — Passware, Inc., a provider of password recovery, decryption, and electronic evidence discovery ...
This excerpt from Chapter 5 of File System Forensic Analysis is posted with permission from Addison-Wesley Professional. The last chapter provided an overview of volume analysis and why it’s important ...
You have just been presented with a daunting task: Here are several gigabytes of log files; let us know if they can tell you anything. OK, where do you start? Luckily there are a few free tools that ...