• Training
  • Support
  • English
Explore Products
  • Products
    • Public safety
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Federal agencies
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Military & intelligence
      • Magnet OneYour Investigative Edge
      • Magnet AxiomRecover and analyze all your evidence in one case
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet GraykeyLawfully access and extract data from mobile devices
      • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
      • Magnet AutomateClose cases faster by automating your workflow
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
      • Magnet OutriderQuickly preview devices for CSAM and illicit apps
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet VerifyDiscover the truth behind media evidence
      • Your Investigative Edge

        Learn More
        • Magnet AxiomRecover and analyze all your evidence in one case
        • Magnet Axiom CyberSimplify your corporate investigations
        • Magnet GraykeyLawfully access and extract data from mobile devices
        • Magnet Graykey FastrakExtract data from multiple mobile devices simultaneously
        • Magnet AutomateClose cases faster by automating your workflow
        • Magnet ReviewAnalyze digital evidence from your browser
        • Magnet WitnessStreamline Your DVR Video Recovery and Analysis
        • Magnet OutriderQuickly preview devices for CSAM and illicit apps
        • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
        • Magnet VerifyDiscover the truth behind media evidence
    • Enterprise
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
    • Service providers
      • Magnet Axiom CyberSimplify your corporate investigations
      • Magnet NexusLarge-scale investigations, made easy
      • Magnet VerakeyAdvanced consent-based mobile data extraction
      • Magnet AutomateAutomate tools and tasks across your DFIR lab
      • Magnet ReviewAnalyze digital evidence from your browser
      • Magnet GriffeyeSwiftly process and analyze vast volumes of digital media
      • Magnet Verakey FastrakExtract data from multiple mobile devices simultaneously
  • Resources
    • All resources
          • All Resources

            Check out the latest resources and thought leadership for all resources.

            Explore All Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Resources By Industry

    • Enterprise
          • Enterprise Resources

            Check out the latest resources and thought leadership for enterprises and corporate digital investigations.

            Explore All Enterprise Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Public safety
          • Public Safety Resources

            Check out the latest resources and thought leadership for public safety.

            Explore All Public Safety Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Grants for law enforcement
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Investigators' Corner
            • Trust & Security
    • Service providers
          • Service Providers Resources

            Check out the latest resources and thought leadership for forensic service providers.

            Explore All Service Provider Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Federal agencies
          • Federal Agencies Resources

            Check out the latest resources and thought leadership for federal agencies and government.

            Explore All Federal Agencies Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • Cyber Unpacked
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
    • Military & intelligence
          • Military & Intelligence Resources

            Check out the latest resources and thought leadership for military, defense, and intelligence.

            Explore All Military & Intelligence Resources

            Content Types

            • Blogs
            • Case studies
            • White papers
            • Videos
            • Webinars
            • How-tos
            • Events
            • Customer stories
            • Efficiency Calculator
            • Free tools
            • Artifact exchange
            • Mobile Unpacked with Chris Vance
            • AI Unpacked
            • Legal Unpacked
            • Trust & Security
  • Our community
    • Officer wellness
    • Magnet Voices Program
    • Scholarship program
    • Agency Impact Award
  • Partners
    • Why partner with Magnet Forensics?
    • Strategic partners
    • Channel partners
    • Training partners
  • Why Magnet
  • Company
    • Our team
    • Careers
    • Press
  • Training
  • Support
    • English
  • English

Topic: Computer

Examiner & Investigator Modes

April 29, 2015

By Phil Froklage

As we continue to add analysis features to Magnet IEF, one of the most common pieces of feedback we receive is that we needed a simplified report viewer for sharing IEF results with non-technical stakeholders. These stakeholders may include other investigators, lawyers, analysts, managers, HR, or anyone else who may be involved with an investigation, … Continued

Magnet Web Page Saver

February 24, 2015

By Phil Froklage

Web Page Saver (WPS): What does it do? Magnet Web Page Saver (v3.3 released September 17th, 2020) is a perfect tool for…

Magnet Encrypted Disk Detector

February 24, 2015

By Phil Froklage

Empower frontline officers to collect and report on fleeting digital evidence from consenting victims and witnesses.

Acquiring Memory with Magnet RAM Capture

February 2, 2015

By Phil Froklage

Recently, we released a new free tool that allows investigators to acquire the memory of a live PC. Customers using our IEF Triage module will already be familiar with this tool, as it’s used to acquire evidence from live systems. In realizing that others could benefit from our RAM capture tool, we decided to release … Continued

Making a Difference, One Child at a Time

December 16, 2014

By Phil Froklage

By: Jad Saliba, Founder & CTO of Magnet Forensics It’s not an issue many like to talk about, or perhaps even know about. But child sex slavery is one of the fastest growing criminal enterprises in the world.  A perverse industry that preys on the poor, especially in economically disadvantaged countries, this kind of exploitation … Continued

Picture and Video Analysis Improvements in IEF v6.5

December 5, 2014

By Phil Froklage

This is the seventh and final blog post in a series about the new features included in IEF v6.5 http://www.youtube.com/watch?v=BYB1Fdzq3BY&feature=youtu.be Visual evidence often tells the most compelling story, which is why we have made some improvements to our picture and video analysis capabilities with the release of IEF v6.5. New features will help you review … Continued

Criminal Investigation of a DDos Attack

August 27, 2014

By Phil Froklage

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions Show clear intent Obtain a criminal conviction Designed for digital forensics professionals who investigate network-based attacks, this webinar demonstrates techniques … Continued

Forensic Analysis of Windows Shellbags

August 7, 2014

By Phil Froklage

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations.  What are Shellbags? While shellbags have been available since Windows XP, they have only recently become a popular artifact as examiners are beginning to realize their potential value to an investigation.  Shellbags … Continued

Investigating IP Theft – Computers, Smartphones and the Cloud

May 2, 2014

By Phil Froklage

In the first half of this IP forensics webinar, Heather Mahalik from SANS Institute offers tactical considerations for examining smartphone, cloud and computer artifacts in the event of intellectual property theft. She explores the challenges of investigating an IP theft case with the emergence of BYOD and cloud storage providers in the enterprise space. In … Continued

How to Uncover the Covered Tracks

April 22, 2014

By Phil Froklage

Download the white paper today! There are a variety of techniques used by suspects to erase and/or hide the things they do online. In this white paper, we will explore 3 different methods a person might use to conceal their online activity, before, during and after. Uncover “Hidden” Evidence Using Computer Forensics Tools We will … Continued

Posts navigation

Older posts
Newer posts
We use cookies on our website.

To learn more about cookies, which ones we use on our site, and how to change your cookie settings, please view our Privacy Policy*. By continuing to use this site without changing your settings, you consent to our use of cookies in accordance with the Privacy Policy.*

View Privacy Policy Accept
Magnet Forensics Logo
Products
  • Magnet One
  • Magnet Axiom
  • Magnet Axiom Cyber
  • Magnet Graykey
  • Magnet Graykey Fastrak
  • Magnet Nexus
  • Magnet Verakey
  • Magnet Verakey Fastrak
  • Magnet Witness
  • Magnet Automate
  • Magnet Review
  • Magnet Outrider
  • Magnet Griffeye
  • Magnet Griffeye Operations
  • Magnet Griffeye Enterprise
  • Magnet Verify
Partners
  • Strategic partners
  • Channel partners
  • Training partners
Community
  • The Auxtera Project
  • Magnet Forensics Scholarship Program
  • Agency Impact Award
  • Merchandise store
  • Magnet Idea Lab
Company
  • Careers
  • Our team
  • Magnet Idea Lab
  • Press
Resources
  • Resource center
  • Events
  • Blog
  • Free tools
  • Artifact exchange
  • Officer wellness
  • Customer stories
  • Grants for law enforcement
Support
  • Investigators’ Corner
  • Customer portal
  • Contact us
  • Subscribe to our emails
Training
  • Training overview
  • Courses and certifications
1 (844) 638-7884 sales@magnetforensics.com
  • Accessibility
  • Legal
  • Cookie Policy
  • Export approach
  • Trust & Security
  • Privacy Policy
  • California Collection Notice
  • Terms of Use
  • Email Preferences

Copyright© 2025 Magnet Forensics

Start modernizing your digital investigations today.

Complete the company & contact information form below and sales will be in touch with you shortly.