Jadsoftware - jadsoftware.com - Magnet Forensics

Latest News:

iOS artifacts – See what you might be missing! 8 Aug 2013 | 06:00 pm

Lance posted a great article on iOS forensics last week detailing common steps and details of an examination of an iOS device, and how IEF can be used once you have that physical image or file system ...

How does Chrome’s ‘incognito’ mode affect digital forensics? 7 Aug 2013 | 12:39 am

This post is a follow-up to a post I recently did about Internet Explorer’s ‘In-Private’ mode. I received a lot of messages asking about the private browsing modes in Chrome and Firefox and how it may...

Convert X-Ways TSV data into TLN data for IEF Timeline 30 Jul 2013 | 12:16 am

Today I’m pleased to announce a new free tool and a guest blog post from James Morris of the Queensland Police Service in Australia. James came to me a couple weeks ago with a request to help him get...

Investigating iOS Phone Images, File Dumps & Backups 30 Jul 2013 | 12:10 am

As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating sy...

How Private is Internet Explorer’s InPrivate Browsing?…First define “private” 23 Jul 2013 | 09:56 pm

As a follow-up to my recent posts about a suspect using CCleaner in an attempt to hide their Internet activity, I received several emails asking about Internet Evidence Finder’s ability to recover InP...

IEF Wins Computer Forensic Software Tool of the Year 15 Jul 2013 | 07:37 pm

Sometimes when I reflect back to what IEF did back in its very early stages (and what it looked like! Long-time users will remember how ugly it was at the beginning, and I believe Matt Shannon of F-Re...

Attracting the Worst Kind of Predator – Magnet Forensics is on the cyber-hunt for clues to stop crooks and creeps 13 Jul 2013 | 12:50 am

Owners and entrepreneurs understand that rare energy experience when passion produces profit, stimulates growth and attracts talent. It takes a particular kind of entrepreneur, the kind movies are mad...

Part 2: Oh no, the suspect wiped free space to get rid of the digital evidence 6 Jul 2013 | 01:30 am

This article is a follow-up from one I did last week on when a person may use a sanitation tool such as CCleaner to “clean” their Internet history and other activity. In that article, I discussed how ...

Internet Evidence Finder (IEF) v6.1: Understanding the New “Editions” and Licensing Options 1 Jul 2013 | 06:00 pm

With the launch of IEF v6.1 we have added a host of new features that we’re really excited about. We listened to feedback from our customers and delivered a great new set of mobile device forensic fea...

“Oh no, the suspect ran CCleaner to get rid of the evidence!” 28 Jun 2013 | 06:47 pm

I recently received a few questions about the effects of running Internet history sanitation tools such as CCleaner, when examining a computer looking for internet related artifacts. CCleaner is a pro...

Recently parsed news:

Recent searches: