Beating “InPrivate” browsing mode
Private mode in modern Internet browsers sure are making live forensics harder, but… There are several ways to find some browsing history traces despite private mode being used. One of a simple method...
View ArticleNice link for Anti-Forensic basics
One of my students asked my recently, when he can find some basic explanation for antiforensic techniques. Well here it is, maybe not up to date information (from two years ago) but simple and can be...
View ArticleHow to Detect System Time Manipulation
There are several methods to detect time manipulation by e.g. log analysis or examining the MAC dates of the restore point records in the System Volume Information Directory… There is another simple...
View ArticleUSB Write Protect Defeating
VMware There is a trend to block USB ports in corporate computers. For sure there are some security arguments to do so… What is interesting, there is simple method to bypass this protection e.g by...
View ArticleAnti-Forensics Overview
©iStockphoto/Marc Dietrich Anti-forensic techniques are actions which goal is to prevent proper forensic investigation process or make it much harder. These actions are aimed at reducing quantity and...
View ArticleSSD Forensic
What is an impact of SSD on Computer Forensics? Solid State Drive Well, it turns out that quite different mechanisms to write and store information on the SSD disks causing a number of implications...
View Article
More Pages to Explore .....