Quantcast
Channel: Magnet Forensics
Browsing all 1190 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IEF Feature Focus – Rebuilding Webpages

One of the easy-to-use and valuable features of Internet Evidence Finder (IEF) is how the tool rebuilds web pages. IEF has the ability to reconstruct web pages from the browser history and cache as...

View Article


Image may be NSFW.
Clik here to view.

Webmail Forensics Part II: Mobile Applications

Previously we discussed webmail artifacts and how they relate to traditional host-based forensic analysis and focused on how Internet Evidence Finder (IEF) analyzes the browser artifacts and provides...

View Article


Image may be NSFW.
Clik here to view.

Hash Analysis Demonstration in IEF v6.3 Video Tutorial

This video demonstrates how Internet Evidence Finder (IEF) v6.3 can now perform hash analysis for all the pictures in a case. Importing, exporting and categorization are all discussed and how it can...

View Article

Image may be NSFW.
Clik here to view.

New Mobile Chat Artifacts in IEF v6.3 Video Tutorial

This video demonstrates the new mobile chat artifacts supported in Internet Evidence Finder (IEF) Advanced v6.3. Support for AIM, BBM, LINE, Grindr, Growlr, Textplus, Touch, Viber, QQ Chat, and WeChat...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Kindle Fire with IEF v6.3 Video Tutorial

This video walks the user through a typical investigation involving Amazon’s Kindle Fire tablet, now supported in Internet Evidence Finder (IEF) Advanced v6.3. Additional artifacts including the Silk...

View Article


Image may be NSFW.
Clik here to view.

Using IEF v6.3 to Analyze Volume Shadow Copies Video Tutorial

New with version 6.3, Internet Evidence Finder (IEF) now supports native volume shadow copy mounting and analysis. In this video, we demonstrate what this means to your investigations and how to...

View Article

Image may be NSFW.
Clik here to view.

Using Hash Analysis to Identify and Categorize Pictures

Forensic investigators are well aware how common hashing algorithms such as MD5 and SHA-1 help them confirm that their forensic image is an exact copy of the original disk or volume. This assists the...

View Article

Image may be NSFW.
Clik here to view.

Techno Security & Forensics Investigations Conference

June 1-4, 2014 Myrtle Beach, SC The Sixteenth Annual International Techno Security Conference will be held June 1-4 in sunny Myrtle Beach at the Myrtle Beach Marriott Resort. This conference promises...

View Article


Image may be NSFW.
Clik here to view.

CEIC

May 19-22, 2014 Las Vegas, NV It’s no exaggeration to say that CEIC is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for...

View Article


Image may be NSFW.
Clik here to view.

Forensics Europe Expo

April 29-30, 2014 Olympia, London Forensics Europe Expo is the premier dedicated international forum for the entire forensics sector and supply chain, bringing together over 160 conference delegates...

View Article

Image may be NSFW.
Clik here to view.

IACIS

April 28-May 9, 2014 Orlando, FL IACIS is a non-profit, volunteer organization wholly dedicated to training, certifying and providing membership services to computer forensic professionals around the...

View Article

Image may be NSFW.
Clik here to view.

USA Cyber Crime Conference

April 28-30, 2014 Leesburg, VA The U.S. Cyber Crime Conference is continuing the 12 year tradition of success established by the former DoD Cyber Crime Conference. To keep up with the global cyber...

View Article

Image may be NSFW.
Clik here to view.

US Defense Cyber Crime Institute (DCCI) validates IEF v6.2

We are pleased to announce that Internet Evidence Finder (IEF) v6.2 has been validated by the United States Defense Cyber Crime Institute (DCCI). DCCI is the research, development and evaluation arm...

View Article


Image may be NSFW.
Clik here to view.

IEF Feature Focus: Exporting and Reporting

While most forensic examiners spend the majority of their time analyzing the evidence from their case, one of the most important steps in the investigative process – reporting – is often rushed....

View Article

Image may be NSFW.
Clik here to view.

Internet Evidence Finder nominated for TWO Forensic 4cast Awards in 2014!

After winning the Forensic 4cast award for Computer Forensic Software of the Year in 2013, we are excited to announce that Internet Evidence Finder (IEF) has once again been nominated in this category...

View Article


Image may be NSFW.
Clik here to view.

Magnet Forensics Named to Branham300 List as One of Canada’s Top Technology...

Waterloo, ON., April 22, 2014—Branham300 today ranked Magnet Forensics Inc. to its 21st annual list of the Top 250 Canadian ICT Companies, as ranked by revenue.  The Branham300 list illustrates the...

View Article

Image may be NSFW.
Clik here to view.

Working more efficiently with Internet Evidence Finder and EnCase Forensic

Caseloads for examiners are growing far beyond anything manageable with manual tools and traditional forensic processes. Investigators must find a way to maximize their time and energy by accelerating...

View Article


Image may be NSFW.
Clik here to view.

3 Ways to Make IEF and EnCase Work Better Together

We partnered with Guidance Software to demonstrate how combining Internet Evidence Finder (IEF) and EnCase Forensic can help investigators yield more thorough results in their investigations. If you...

View Article

Image may be NSFW.
Clik here to view.

Uncover the Truth About IEF in Less Than Two Minutes

In this new video, we show you how Internet Evidence Finder (IEF) digs deeper and searches wider to uncover more evidence than ever before – faster. Learn how IEF helps digital forensic investigators...

View Article

Image may be NSFW.
Clik here to view.

IP Theft: Collecting Artifact Evidence from the Cloud and Mobile

SANS and Magnet Forensics teamed up recently to collaborate on a case study of Intellectual Property (IP) theft. This webinar will walk you through an IP theft case study, investigating many of the...

View Article
Browsing all 1190 articles
Browse latest View live