Recent Posts

News | 6 Minutes Reading

Drone Forensics: An Unrevealed Dome

“Drone technologies used in Crime” this idea has cloaked the minds of the US government since the involvement of drones

author

October 26, 2017

Ashwani Tiwari

Updates | 5 Minutes Reading

Adobe Acrobat PDF Redaction Tool to Redact PDF Files

Redaction is the process of abolishing sensitive or classified information such as words, phrases, and images, from a document at

author

October 25, 2017

Ashwani Tiwari

Email Forensics | 3 Minutes Reading

Remove Local NSF Security & Open Encrypted NSF File – How To

ACL (Access Control Lists) is used by the techies to restrict and limit the actions of various users when access

author

October 24, 2017

Raj Kumar

Updates | 4 Minutes Reading

Microsoft Edge Forensics – Where to Find Artifacts?

Web surfing has marked a remarkable change with Microsoft’s next-generation browser- the Edge. Edge browser is a replacement for Internet

author

October 24, 2017

Raj Kumar

Updates | 4 Minutes Reading

Windows 8 File History Forensics

The Windows 8 File History Service (fhsvs) gave birth to new forensics i.e. Windows 8 File History Forensics. It defends

author

October 23, 2017

Ashwani Tiwari