Zarafa Forensics to Carve Necessary Evidence
Mansi Joshi | August 3, 2016 | Forensics | 4 Minutes Reading
Databases are the key source of evidence, irrespective of size of organization or complexity in database used. There are different Read More…
Extract Forensic Evidences From Live@EDU Account
Mansi Joshi | August 1, 2016 | Forensics | 5 Minutes Reading
In this Article you will read about the topic “Extract Forensic Evidences from Live@EDU Account”. As we know that with Read More…
Mail Copa Email Forensics for Evidence Investigation
Mansi Joshi | July 10, 2016 | Forensics | 4 Minutes Reading
Email has become a source of interaction or communication among the users. Every day users send countless numbers of emails Read More…
Spicebird Email Forensics – Search for Evidence
Mansi Joshi | July 9, 2016 | Forensics | 4 Minutes Reading
In today’s world, the computer technology is playing an important role in everyone’s life. Since its usage is increasing therefore, Read More…
Search for Evidence in OST File – An Email Forensics Approach
Mansi Joshi | June 14, 2016 | Forensics | 5 Minutes Reading
The most popular topic of discussion among forensic experts is how to perform OST file forensics approach for searching an Read More…
Mansi Joshi | December 9, 2015 | Forensics | 4 Minutes Reading
To examine the stored messages in MSG File format of Zimbra Server, first, we have to understand the Zimbra Server Read More…
Rackspace Cloud Sites Analysis
Mansi Joshi | November 23, 2015 | Forensics | 3 Minutes Reading
Rackspace sites are a platform-as-a-service proffering which are similar to the traditional web hosting services. The only difference is that Read More…
DMG File Forensics Using MailXaminer
Mansi Joshi | October 6, 2015 | Forensics | 5 Minutes Reading
DMG is an acronym for Disk Image File that is created on Macintosh operating system. A DMG file is denoted Read More…
Get To Know USB Dongle Based License Advantages
Mansi Joshi | August 17, 2015 | Forensics | 3 Minutes Reading
USB Dongle License provides a dongle-based protection which enables to bind the application to the physical device which has been Read More…
Specialized Mailbox Reader For Any Mail File Format
Mansi Joshi | June 17, 2015 | Forensics | 4 Minutes Reading
With the increasing rate of digital crimes, the need for investigation of desktop – based and web – based mailboxes Read More…