Digital Forensics Digital Forensics How to configure Windows Investigative Workstations I like Windows. There… I said it. I understand th…
Digital Forensics Digital Forensics Detecting time stamp manipulation At approximately 22:50 CDT on 20101029 I responded to a…
Digital Forensics Digital Forensic SIFTing Registry and Filesystem Timeline Creation Over the years, being able to examine filesystem timeli…
novel Chapter 39: The Quantum Heist of Schrödinger’s Vault 01: The Impossible Withdrawal It started with an ATM re…
Forensic tool assessment SQLite-Tools Professional Evaluation 2024 Comprehensive Analysis of Core Utilities and Enterprise…
Digital Forensics Digital Forensic SIFTing How to perform a read-only mount of filesystem evidence Over the years, there has been a clear need for some di…
Digital Forensics DFIR Sneak Peek Course Animations FOR585 Smartphone Forensic Analysis In-Depth Mobile devices are often a key factor in criminal cases…
Digital Forensics De-mystifying Defrag Identifying When Defrag Has Been Used for Anti-Forensics (Part 1 – Windows XP) I have seen the following Windows Prefetch entries in n…
Digital Forensics Cloud Storage Acquisition from Endpoint Devices Over the past several years, multiple tools have been r…