Dare to delete my files!
by Nikhil Wagholikar, NII ConsultingIntroduction One of the recommended file-system for Linux is Ext-3. Ext-3 file-system might not be as robust and powerful as compared […]
by Nikhil Wagholikar, NII ConsultingIntroduction One of the recommended file-system for Linux is Ext-3. Ext-3 file-system might not be as robust and powerful as compared […]
by Kush Wadhwa, NII Consulting In this article I will cover the basic concepts of NTFS file system. In NTFS (New Technologies File System) all […]
by Chetan Gupta, NII Consulting Many a times as an investigator, I have to deal with the issue of carving data from unallocated spaces in […]
by Chetan Gupta, NII Consulting Well, last week was abuzz with activity when we had to recover data from a corrupt Linux hard disk. Thought […]
By Kush Wadhwa, NII Consulting Have you ever thought of hiding data in such a manner that it cannot be deleted even after the hard […]
by Bhushan Shah, NII Consulting Mrs Carol L. Stimmel has taken upon her to start a Computer Forensic Volunteer Project to provide low-cost services to […]
by Bhushan Shah, NII Consulting The index.dat is a file which contains the list of the websites that one has visited. It comes from “indexing” […]
By Chetan Gupta, NII Consulting In accordance with NII’s mantra of innovation and research, we have developed our own tool to conduct initial response on […]
Securing your passwords against Rainbow Table Attacks By Bhushan Shah, NII Consulting In the previous article we looked at the Rainbow Tables and how it […]
NII Consulting’s Chetan Gupta (GCFA) has published an article at ForensicFocus on the Alternate Data Streams in NTFS, and how these can be detected. This […]