Monday, February 8, 2016

Webmail Forensics: Collecting & Analyzing Artifacts

Almost everyone uses at least one or more web-based email client account for communication with one user to another. Increased usage of web based email client leads to the rise in the cybercrime rate drastically involving cases that require forensic email analysis of the webmail account. It is observed that introduction of virtual way of communication provided by internet has made our life lot easier and less complex by taking us to new level of effectiveness, productivity & connectivity.

Saturday, January 16, 2016

Browser History Forensics

People are aware of multiple web browsers that are being used almost every day on the World Wide Web to retrieve information, mail purpose, social networking, official works etc. Some common web browsers like Google Chrome, Mozilla Firefox, Internet Explorer, etc. are used daily by millions of people all over the world. Internet users use browsers on their mobile phones or laptops as well that contacts and requests information from the web server. The web server sends back the information back to the web browser and these database assist investigators in browser history forensics.

Wednesday, December 23, 2015

Rackspace Cloud Forensics: The Challenges

Rackspace is one of the most popular cloud computing and hosting company. The main motive of Rackspace is to save customer’s time; money and worry of managing their own IT infrastructure. It has two service types - Managed (on-demand services are provided and user can contact Rackspace whenever needed) and Intensive (active services with additional consultations about their server configuration). Both the services are received through email, phone, live chat etc. Majority of Rackspace customers are cloud customers. The user of Rackspace gets the service by giving payment on monthly basis and they may demand more as per their requirement with extra charges.

Sunday, November 8, 2015

Get To Know the Windows 10 Bugs and Issues That Need To Be Fixed

With its successful launch on 29th July, 2015, Windows 10 has bagged over 75 million installations in its first month. But what was assumed to be a glitch-free software, turned out to be filled with a number of bugs. Microsoft acknowledges these bugs and has already released several automatic software. 

This article is mainly about all those bugs, which have been discovered and confirmed by Microsoft itself. These are not common bugs like crashing, freezing, etc., but bugs that are realistic. 

Saturday, September 5, 2015

Android SQLite Database Forensics: A Tip to Digital Archeology

Mobile forensics is one of the fastest growing digital forensics discipline. This is due to the rapid growth in the usage of mobile phones by the people. One of the most significant breakthrough in the development of mobile phone industry is the emergence of android smartphones.

Wednesday, August 12, 2015

Carving Out Opera Browser Forensics

With the coming up of Internet era, the way of finding information has become much easier. There are many web browsers available in the way for searching the information and one such browser is Opera Mini. Opera Mini is the faster browser found in Smartphones, Mobile phones and in PDAs. It is of free and available along with the mobile phones and is found as the most used web browser in phones. 

Tuesday, August 4, 2015

Getting Acquainted With The Structure of Outlook PST File

MS Outlook, one of the components of MS Office suite, is the most popular Personal Information Manager and desktop based email client. It is a standalone application and also works efficiently with organizational level server systems like Exchange server and SharePoint Server. The data stored in it is maintained in a storage file referred as PST or Personal Storage Table. The PST file maintains the data of Outlook in a systematic and hierarchical form.

In this write up we will shed some light on the structure of the Outlook PST files. The PST file follows both Logical and Physical structure, which will remain the highlights of this blog.