The Hidden World of Command Line Usage

The Hidden World of Command Line Usage

The Hidden World of Command Line Usage With the widespread use of the Graphical User Interface (GUI) based operating systems starting around the 1990s, most people have long forgotten the use of command line tools to perform data tasks. The GUI allows us to see icons,...
Google Vault Collections

Google Vault Collections

Google Vault Collections What is Google Vault? Google Vault is an eDiscovery and email archiving application covering the G Suite. It allows companies to manage, retain, search, and export data from the following applications: Google Mail, Google Hangouts, Google...
Windows Prefetch

Windows Prefetch

Windows Prefetch Accessing Prefetch Files for Forensic Analysis. A digital forensic investigation often aims to determine the activities of a user on a computer. Prefetch files are an important type of evidence, which provide detailed information about the programs...
Internet Browser Forensics

Internet Browser Forensics

Internet Browser Forensics Accessing Google Chrome browsing history for forensic examination. Google Chrome is the world’s most popular browser, with over 50% market share across all devices globally. Browser data can be critical to a digital investigation and Chrome...
Anti-Forensics

Anti-Forensics

Anti-Forensics Techniques bad actors use to hide their tracks. Businesses involved in fraud, employees involved in misconduct, and criminals engaged in computer-related crime all frequently take steps to destroy, conceal, or confuse digital evidence. Depending on the...