[Case Study] Detailed Steps for Extracting Data from Burned & Watered Hard Drive of DVR System
[News] SalvationDATA was Awarded Another New Patent from USPTO
[News] Coming Soon! DF(Digital Forensics System) for Computer Forensics!
We're always working on new forensic systems based on forensic process flow for delivering the most reliable result for investigators. Let’s take a quick look at the features of this system before it is finally released.
[Technical Article] Extraction of Raw Data of GPS Location and Base Station on iOS/Android Devices
In this issue, data recovery experts from the Key Laboratory of Sichuan Province will explain the process from raw data scanning to specific data extraction for iOS/Android mobile devices. This issue covers the analysis of common locating trace data and its analysis methods, and methods of using GPS service and base station service provided by the third-party for further data analysis and map display.
[Technical Article] Research on Avoiding Data Wiping While Unlocking Cellphones
Data wiping of some cellphones during unlocking process adds to difficulties of mobile forensics, and the avoiding of which bears great importance. In this issue, data recovery experts from the Key Laboratory of Sichuan Province explains methods to avoid data wiping during cellphone unlocking by taking Samsung Note 5 and Huawei P7 as examples.
[News] New Mobile Forensic System Coming Soon
As an innovation-oriented company, we’re constantly innovating to meet customers’ demand. And we’re excited to announce today that our new SPA(SmartPhone Forensic Triage Acquisition) is coming out very soon.
[Technical Article] Data Extraction from Damaged Toshiba 500 Hard Drive
This issue covers technique application case study conducted by SalvationDATA technicians —— data extraction through secondary opening of Toshiba 500 hard drive. The hard drive involved in this case study was seriously bumped, with vital part of the disk pitted and its edge deformed. This drive had been opened before using unknown procedures and techniques under unknown opening environment, and possible damages to the disk and other hardware remain unclear, which led to difficulties and typical characteristics of the secondary opening.
[Technical Insights] Data on Crashed Raid 5 and RAID 6 to be Recovered and Extracted
In this issue, data recovery experts from the Key Laboratory of Sichuan Province explain their research on data recovery and extraction from crashed RAID 5 and RAID 6. This research provides a new method with higher efficiency and easier operations to address the problem of extracting data from crashed server arrays.
[Technical Article] Computer Forensics: Data on Defective HDD Recovered with Intensive Read
Intensive read, also referred to as compulsory read, is the data recovery method that increases the recovery intensity while extracting data from defective hard drives with bad sectors.
[Technical Insights] Cellphone Forensics: A Research on Cellphone Audio File Extraction
In this issue, data recovery experts from the Key Laboratory of Sichuan Province explain their research on technologies of cellphone audio file data extraction.
[Technical Insights] Fragmented Files Recovery Based on XFS File System
With the continuous development of data recovery technology, techniques for data recovery from logic layer of discs are constantly improving. Yet there remains a great challenge: how to recover fragmented files. Through a case study of fragmented files in XFS file system, data recovery experts from the Key Laboratory of Sichuan Province will explain in this issue how to recover fragmented files based on XFS file system.
[Technical Insights] A Discussion on Means of iPhone Data Extraction
In the former issues of Technical Insights, data recovery experts from the Key Laboratory of Sichuan Province(Subsidiary of SalvationDATA) explained their researches on extraction of cellphone audio files, the recovery of SQLite database files, the writing of forensic scripts for cellphone apps, and the mining of data through defensive cellphone apps etc. The focus of this issue is the various means of data extraction from iPhones (either jail-broken or not) that can give access to all types of data, including texts, images, audios and videos.