Rackspace
is one of the most popular cloud computing and hosting company. The main motive
of Rackspace is to save customer’s time; money and worry of managing their own
IT infrastructure. It has two service types - Managed (on-demand services are
provided and user can contact Rackspace whenever needed) and Intensive (active
services with additional consultations about their server configuration). Both
the services are received through email, phone, live chat etc. Majority of
Rackspace customers are cloud customers. The user of Rackspace gets the service
by giving payment on monthly basis and they may demand more as per their
requirement with extra charges.
The 'Digital Forensics Zone' blog is an effort to present the high and low tides of electronic discovery and forensics of data in the best simplified manner. Through this blog, we will help you out with solutions to understand forensics right from the level of beginners to that of an expert.
Wednesday, December 23, 2015
Sunday, November 8, 2015
Get To Know the Windows 10 Bugs and Issues That Need To Be Fixed
With its successful launch on 29th
July, 2015, Windows 10 has bagged over 75 million installations in its first
month. But what was assumed to be a glitch-free software, turned out to be
filled with a number of bugs. Microsoft acknowledges these bugs and has already
released several automatic software.
This article is mainly about all those
bugs, which have been discovered and confirmed by Microsoft itself. These are
not common bugs like crashing, freezing, etc., but bugs that are realistic.
Saturday, September 5, 2015
Wednesday, August 12, 2015
Carving Out Opera Browser Forensics
With the coming up of Internet era, the way of finding information
has become much easier. There are many web browsers available in the way for
searching the information and one such browser is Opera Mini. Opera Mini is the
faster browser found in Smartphones, Mobile phones and in PDAs. It is of free
and available along with the mobile phones and is found as the most used web
browser in phones.
Tuesday, August 4, 2015
Getting Acquainted With The Structure of Outlook PST File
MS
Outlook, one of the components of MS Office suite, is the most popular Personal
Information Manager and desktop based email client. It is a standalone application
and also works efficiently with organizational level server systems like
Exchange server and SharePoint Server. The data stored in it is maintained in a
storage file referred as PST or Personal Storage Table. The PST file maintains
the data of Outlook in a systematic and hierarchical form.
In
this write up we will shed some light on the structure of the Outlook PST
files. The PST file follows both Logical and Physical structure, which will
remain the highlights of this blog.
Monday, July 20, 2015
Looking Into The Structure of MBOX File
MBOX stands for Mailbox, which is a file format that holds a
collection of email messages in plain text format. All the messages are stored
in individual, long text format and the new messages are appended to the end of
the file. MBOX stores the messages in RFC 2822, original Internet Message
format, making it easily accessible.
Wednesday, February 18, 2015
Dig Out Evidences Through Control Panel Forensics
Windows Operating System Control Panel is implemented as a series
of applets and each of these applets is represented by .cpl file. These applets
are usually stored in %system
root%\System32 folder and can be opened through system binary ‘control.exe’
a control panel application. There are various ways available to access it and
each of these methods can destine you with different artifacts which are also
stored in varied places depending on the version of Windows.
Friday, February 6, 2015
An Introduction To Virtual Machine Forensics
The virtual machine is a software application using
which one can create separate OS environments. Each environment limits the use
of its hardware and software resources. In an ideal case, an individual virtual
machine behaves as an independent system possessing its personal operating
system and hardware. The control over each environment is provided to the user
independently.
Wednesday, January 21, 2015
Tricks To Simplify Exchange Email Forensics
Microsoft Exchange Server has provided a secure
messaging environment and offers a database to store the communication
information. The user database gets saved in two forms: mailboxes and the
public folders that gets saved as priv.edb and pub.edb file respectively and for simplification it required Exchange email
analysis.
For Exchange email forensics, most of the investigators
prefer using third party tools that helps to analyze Outlook data but Microsoft
has embedded options in this server applications for eDiscovery and compliance
purpose.
Subscribe to:
Posts (Atom)