Forensic Analysis of Windows Shellbags

This is the fifth and final blog post in a series about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Shellbags? While shellbags have been available since Windows XP, they...

Read more >

Forensic Analysis of Prefetch files in Windows

This is the fourth blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are Prefetch Files? Prefetch files are great artifacts for forensic investigators...

Read more >

Forensic Analysis of LNK files

This is the third blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. What are LNK Files? LNK files are a relatively simple but valuable...

Read more >

How to Analyze USB Device History in Windows

This is the second blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. Whether you’re a corporate examiner working an intellectual property theft, or a...

Read more >

IEF: Now Recovering Business Applications & OS Artifacts

Get More Digital Evidence with One Search This is the first blog post in a series of five about recovering Business Applications & OS Artifacts for your digital forensics investigations. With the June release of...

Read more >

Magnet Forensics Releases Internet Evidence Finder v6.4

With the release of Internet Evidence Finder v6.4, Magnet Forensics adds to its list of Internet and mobile-supported artifacts, and introduces a new Business Applications and OS Artifacts Module to enable the recovery of more...

Read more >

Finding and Analyzing Windows System Artifacts with IEF

New with the Business and OS artifacts module in Internet Evidence Finder (IEF) v6.4, we have added a number of valuable Windows operating system artifacts that will help investigators gain insight into details about a...

Read more >

Investigating User Activity with Windows Artifacts in IEF

Sometimes when conducting forensic examinations, investigators can lose sight of the fact that they’re investigating the actions of a person, not a computer. Almost every event or action on a system is the result of...

Read more >

Finding and Analyzing Email with IEF

Internet Evidence Finder (IEF) is well known for its ability to excel at recovering Internet artifacts from chat, social networking and browsers including webmail. New with IEF v6.4, we’ve expanded those capabilities to include desktop...

Read more >

Finding and Analyzing Document Files with IEF

Digital forensics has evolved from the examination of computers, storage and documents to the analysis of data from the Internet, smartphones and networks. This evolution has greatly expanded the scope of the forensic investigator’s responsibilities,...

Read more >