Criminal Investigation of a DDos Attack

Learn how digital evidence played a vital role in a real-life Distributed Denial of Service attack. Darren Sabourin, former RCMP Officer, and Jad Saliba explain how Internet evidence was used to: Determine a user’s actions...

Read more >

Find Important Business Apps & OS Artifacts for Your Digital Investigations

HERE’S OUR GUIDE TO FINDING IMPORTANT BUSINESS APPLICATIONS & OS ARTIFACTS FOR YOUR DIGITAL FORENSICS INVESTIGATIONS! Sometimes when conducting digital forensics examinations, investigators can lose sight of the fact that they’re investigating the actions of...

Read more >

Forensic Analysis of Windows Shellbags

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Shellbags? While shellbags have been available since Windows XP, they...

Read more >

Forensic Analysis of Prefetch files in Windows

This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Prefetch Files? Prefetch files are great artifacts for forensic investigators...

Read more >

Forensic Analysis of LNK files

This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK Files? LNK files are a relatively simple but valuable...

Read more >

How to Analyze USB Device History in Windows

USB device

This is the second blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. Whether you’re a corporate examiner working an intellectual property theft, or a...

Read more >

IEF: Now Recovering Business Applications & OS Artifacts

Get More Digital Evidence with One Search This is the first blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. With the June release of...

Read more >

Magnet Forensics Releases Internet Evidence Finder v6.4

With the release of Internet Evidence Finder v6.4, Magnet Forensics adds to its list of Internet and mobile-supported artifacts, and introduces a new Business Applications and OS Artifacts Module to enable the recovery of more...

Read more >

Finding and Analyzing Windows System Artifacts with IEF

New with the Business and OS artifacts module in Internet Evidence Finder (IEF) v6.4, we have added a number of valuable Windows operating system artifacts that will help investigators gain insight into details about a...

Read more >

Investigating User Activity with Windows Artifacts in IEF

Sometimes when conducting forensic examinations, investigators can lose sight of the fact that they’re investigating the actions of a person, not a computer. Almost every event or action on a system is the result of...

Read more >