Spotlight Indexing If a USB memory stick or hard drive is plugged into an Apple computer running OSX then it is likely that the system will have automatically created a folder called Spotlight-V100. By default, the folder also exists on the system drive itself. The Spotlight-V100 folder contains reates an index of all files and […]
Network Firewalls and the Open Systems Interconnect (OSI) Model
What is a Firewall? A Firewall is used to protect unauthorised access to a computer or a computer network. The firewall does this by sitting between the external network (e.g. the Internet) and the internal network or computer that it is protecting by filtering the packets sent to or from a network. Open System Interconnect […]
How To Identify When an IPhone or iPad was Factory Reset
When dealing with mobile phone evidence, it is common to encounter an iPhone and, occasionally, an iPhone can be examined that contains less information or communication on it than you were expecting. The phone may be an older model that contains either limited or only recent call records and messages. On these occasions it is […]
The Difference Between a Finalised and Open Compact Disc
When a compact disc is written using a computer, it is possible to finalise or ‘close’ the disc, so that no further information can be stored to it or the disc can be left ‘open’ so that other files and data can be stored to it at a later date if required. What Happens with […]
Common Password Attack Methods
Dictionary and Brute Force Attacks A dictionary password attack is when a list of words is used against the password in order to guess it. These lists of words containing likely passwords can even be downloaded from the Internet. A brute force attack is the use of all possible combinations of characters in order to […]