Spotlight Indexing If a USB memory stick or hard drive is plugged into an Apple computer running OSX then it is likely that the system will have automatically created a folder called Spotlight-V100. By default, the folder also exists on the system drive itself. The Spotlight-V100 folder contains reates an index of all files and […]
Network Firewalls and the Open Systems Interconnect (OSI) Model
What is a Firewall? A Firewall is used to protect unauthorised access to a computer or a computer network. The firewall does this by sitting between the external network (e.g. the Internet) and the internal network or computer that it is protecting by filtering the packets sent to or from a network. Open System Interconnect […]
How To Identify When an IPhone or iPad was Factory Reset
When dealing with mobile phone evidence, it is common to encounter an iPhone and, occasionally, an iPhone can be examined that contains less information or communication on it than you were expecting. The phone may be an older model that contains either limited or only recent call records and messages. On these occasions it is […]
Common Password Attack Methods
Dictionary and Brute Force Attacks A dictionary password attack is when a list of words is used against the password in order to guess it. These lists of words containing likely passwords can even be downloaded from the Internet. A brute force attack is the use of all possible combinations of characters in order to […]
How Digital Forensics Can Assist in Legal Cases
What is Digital Forensics? The term ‘digital’ relates to the examination of computers, phones, memory cards, USB memory sticks, digital cameras and any other type of device that contains digital storage. The ‘forensics’ aspect relates to the method of examination that, where possible, avoids alteration of the information contained on the digital devices so that […]