Digital Forensics: Insight into SalvationDATA Certified Training Program 2018!
[Products Launch] Boost Your Imaging Speed With SalvationDATA New Generation Forensic Hardware: DCK 2 and Write-Blocker
[Pre-Sale] VIP 2.0: Special Offer of the Best-Selling DVR Forensics Tool of SalvationDATA
[Tips] How to Inspect a Smartphone’s Data without the Forensic Software?
At the end of each forensic extraction process, you would always want to export what you have extracted in a universal format, which can be transferred and inspected on any computers no matter this computer is installed with the forensic software or not. So in this article, let’s talk about data export and report generation in SPF Pro after you have finished a mobile forensic process.
[Case Study] Mobile Forensics: See How SalvationDATA Extracts and Decrypts from the Latest Wechat
Editor’s note: Wechat has recently released a major update on both Android and iOS, bringing plenty of new features and even updates on its data structure. This poses great challenges to digital forensics because the updates tend to make current forensic products obsolete. Well known for our good support of Chinese devices and apps, SalvationDATA definitely doesn’t want to be left behind. With the efforts of our digital forensic experts, we now proudly announce that we are the industry-first to support the extraction and decryption of the latest Wechat (v7.0.0).
[Software Update] Mobile Forensics: SPF Pro V6.85.28 New Version Release for Better User Experience!
Editor’s note: The latest update of SPF Pro (SmartPhone Forensic System Professional) is released now! Let’s have a look what new features have been added: You can download the software from our resources page of the website and have a free trial now. V6.85.27 Update Description
[Case Study] DVR Forensics: An Introduction to H.264 Compression and Digital Video Recorders (DVRs)
Editor’s note: Video surveillance system is an important part of digital forensics. In this article, SalvationDATA forensic expert will introduce the video surveillance technologies and the well-known H.264 compression format. The discussion covers the basic concept of how digital recorders utilize the H.264 video compression standard to compress signals, allowing increased storage of data and higher-quality transmission over networks, even those with lower bit rates.
[Tips] How to Verify Digital Evidence with Hash Value
Editor’s note: Hash is a crucial part of digital forensics. Hash values can be considered as the signatures or fingerprints of data strings, files or even entire hard disks. The hash value is produced that identifies the contents of the file. If the contents are modified in any way, the value of the hash will also change significantly. This is why Hash is widely used in digital forensics to verify the integrity and originality of evidence data.
[Software Update] Computer Forensics: DRS V126.96.36.1992 New Version Release for Better User Experience
Editor’s note: The latest update of DRS (Data Recovery System) is released now! Let’s have a look what new features have been added: You can download the software from our resources page of the website and have a free trial now. 1. Optimized imaging function module, increasing usability, avoiding data overwrite by misoperation.
[Case Study] Computer Forensics: A Method to Recover Data from MySQL Database by Utilizing Binlog
Editor’s note: Binlog is short for binary log, the binary log contains “events” that describe database changes such as table creation operations or changes to table data. It also contains events for statements that potentially could have made changes (for example, a DELETE which matched no rows), unless row-based logging is used. The binary log also contains information about how long each statement took that updated data.
[Tips] Mobile Forensics: How to Make Analysis on Smartphone Backups
Editor’s note: Welcome to read our first [Tips] article, we are planning to post this type of article to introduce the small tips of using our forensic tools from time to time. In this post, we are talking about a few things you should keep in mind when you want to make an analysis on smartphone backups.
[News] 2018 SecureCon Product Day and Cyber-Physical System (CPS) Control Security Forum
Editor’s note: On November 30, 2018, the launching ceremony of the 2018 Cyber-Physical System (CPS) Control and Security Forum and SecureCon Product Day was held at the Northwestern Polytechnical University.
[Case Study] Mobile Forensics: A Flaw of DJI Drones Can Expose Photos, Videos and Flight Logs
Editor’s note: DJI (Da-Jiang) is a Chinese technology company, well known as a manufacturer of drones used for aerial photography and videography. Today DJI is very popular around the world. With the rapidly growing use of drones, drone forensics is also becoming a hot topic in the DFIR community.